Results (468)
Search Parameters:
Keyword: BERSelection of Rotor Slot Number in 3-phase and 5-phase Squirrel Cage Induction Motor; Analytic Calculation
With the spread of inverters, the attention of designers naturally turned to 5-phase motors, due to their advantageous properties. In this regard, perhaps the most important issue in the design of such machines is the selection of the correct rotor slot number. Many articles have been published on multiphase machines, however, only few of them…
Read MoreTrue Random Number Generator Implemented in ReRAM Crossbar Based on Static Stochasticity of ReRAMs
True Random Number Generators (TRNG) find applications in various fields, especially hardware security. We suggest a TRNG that exploits the intrinsic static stochasticity of Resistive Switching Random Access Memories (ReRAMs) to generate random bits. Other suggested designs use stochasticity in the switching mechanism, which requires high precision over input voltage and time. In the proposed…
Read MoreVisualization of the Effect of Additional Fertilization on Paddy Rice by Time-Series Analysis of Vegetation Indices using UAV and Minimizing the Number of Monitoring Days for its Workload Reduction
This research is an extension of the research (ISEEIE 2023), which dealt with Time-Series Clustering (TSC) of Vegetation Index (VI) for paddy rice. The novelty of this research is “Visualization of growth changes before and after additional fertilization,” “Analyzing the appropriate amount of additional fertilizer,” and “Optimization of monitoring period to minimize the number of…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreDoubling the Number of Connected Devices in Narrow-band Internet of Things while Maintaining System Performance: An STC-based Approach
Narrow-band Internet of Things (NB-IoT) is a low-power wide-area network (LPWAN) method that was first launched by the 3rd generation partnership project (3GPP) Rel-13 with the purpose of enabling low-cost, low-power, and wide-area cellular connections for the Internet of Things (IoT). As the demand for over-the-air services grows and with the number of linked wireless…
Read MoreAssessment of Scattered-Bend Loss in Polymer Optical Fiber (POF) Displacement Sensor
This work investigated the coupling behavior of the scattered-bend loss in displacement sensor during the bending of the fiber by using a multimode polymer optical fiber (POF). To utilize the scattered-bend effect for displacement measurement, a side coupling technique can be used by twisting a pair of POF fibers and bent the structure into a…
Read MorePrototype to Identify the Capacity in Cybersecurity Management for a Public Organization
Public organizations are subjected to a complex security situation, which can be addressed by permanently strengthening and evaluating their cybersecurity capabilities. The objective of this research is to develop a model to identify the cybersecurity management capacity of public organizations. The deductive method was applied for the review and analysis of criteria, factors and variables…
Read MoreOn the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor
In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…
Read MoreAn Improved Model to Analyze the Impact of Cyber-Attacks on Power Systems
In this paper, an improved model has been proposed for investigating the impact of cyber-attacks on power systems regarding frequency disturbances and voltage disruption while changing the load called ICAPS. The proposed ICAPS model is formulated by five different controllers, such as LFC, AGC, AGC-PID, AVR, and AVR-PID, implemented in two sets of the system…
Read MoreBER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks
In the time past, virtually all the contemporary communication systems depend on distinct source and channel encoding schemes for data transmission. Irrespective of the recorded success of the distinct schemes, the new developed scheme known as joint source channel coding technique has proven to have technically outperformed the conventional schemes. The aim of the study…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreAnalysis of Reading Time and the Number of Characters within One Gazing Point
Concomitant with the ubiquity of lightweight electronic terminals, such as smartphones and tablets, e-books have increased in popularity. However, studies have shown that their display method and information-presentation efficiency need improvement. We investigated visual information processing during reading to develop a more efficient display method that presents information in an easier to see fashion than…
Read MoreAssociated Risk Factors for the Development of Extensively Resistant Pulmonary Tuberculosis in the First Level of Health Care: From a Public Health Perspective
To determine the risk factors associated with the development of extensively resistant pulmonary tuberculosis in the DIRIS Lima Sur, 2017. The type of research was observational, quantitative, analytical, retrospective case-control approach. The population consisted of 158 patients with MDR-TB treatment schedule between 2016 and 2017. The sample consisted of 24 cases diagnosed with extensively drug-resistant…
Read MoreCyberbullying Detection by Including Emotion Model using Stacking Ensemble Method
Cyberbullying is a serious problem and caused an immense impact to the victim. To prevent the cyberbullying, the solution is to develop an automatic detection system. In this research, we propose a combined model for cyberbullying detection and emotion detection by using stacking method. The experiment is to create a better model for cyberbullying detection…
Read MoreCyber Incident Handling and the Perceptions of Learners on Cyber Incidents in South African Schools
With increases in technological usage, cyber incidents are also on the rise and have become a major concern in schools across the globe. What is of significant concern is that cyber incidents in South African schools are also on the rise. Existing evidence suggests that, in South Africa there are no clear procedures that are…
Read MoreEnhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection
Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…
Read MoreVehicle Number Plate Detection and Recognition Techniques: A Review
Vehicle number plate detection and recognition is an integral part of the Intelligent Transport System (ITS) as every vehicle has a number plate as part of its identity. The quantity of vehicles on road is growing in the modern age, so numerous crimes are also increasing day by day. Almost every day the news of…
Read MoreCurved Pyramidal Metamaterial Absorber: From Theory to an Ultra-Broadband Application in the [0.3 – 30] GHz Frequency Band
For its importance nowadays in a wide range of applications such as the anechoic chamber, we introduce a microwave ultra-broadband polarization-independent metamaterial absorber (MA) in the Ultra High Frequency (UHF)/ Super High Frequency (SHF) frequency bands. Through this work, we improved the Relative Absorptive Bandwidth (RAB) of the conventional pyramidal absorber (CPA) by modifying its…
Read MorePerformance Evaluation Reprogrammable Hybrid Fiber-Wireless Router Testbed for Educational Module
Fiber-Wireless (FiWi) network is an integration of fiber optic and wireless connections in the same network. It is one of the best solutions to overcome rapid increment of Internet users and bandwidth-hungry services. To facilitate fundamental knowledge and further understanding on FiWi for students and researchers at the university level, this article proposes the development…
Read MoreText Mining Techniques for Cyberbullying Detection: State of the Art
The dramatic growth of social media during the last years has been associated with the emergence of a new bullying types. Platforms such as Facebook, Twitter, YouTube, and others are now privileged ways to disseminate all kinds of information. Indeed, communicating through social media without revealing the real identity has emerged an ideal atmosphere for…
Read MoreRanking the Most Important Attributes of using Google Classroom in online teaching for Albanian Universities: A Fuzzy AHP Method with Triangular Fuzzy Numbers and Trapezoidal Fuzzy Numbers
This paper has conducted the study of the impact and effectiveness of Google Classroom in online teaching and learning. Based on the unified theory of acceptance and use of technology (UTAUT2), the first aim was to rank the 8 constructs namely: Performance Expectancy, Effort Expectancy, Social Influence, Facilitating Conditions, Hedonic Motivation, Habit, Behavioral Intention, and…
Read MoreJapanese Abstractive Text Summarization using BERT
In this study, we developed and evaluated an automatic abstractive summarization algorithm in Japanese using a neural network. We used a sequence-to-sequence encoder-decoder model for practical purposes. The encoder obtained a feature-based input vector of sentences using the bidirectional encoder representations from transformers (BERT) technique. A transformer-based decoder returned the summary sentence from the output…
Read MoreEmpirical Probability Distributions with Unknown Number of Components
We consider the estimation of empirical probability distributions, both discrete and continuous. We focus on deriving formulas to estimate number of categories for the discrete distribution, when the number of categories is hidden, and the means and methods to estimate the number of components in the Gaussian mixture model representing a probability density function given…
Read MoreComparison of Support Vector Machine-Based Equalizer and Code-Aided Expectation Maximization on Fiber Optic Nonlinearity Compensation Using a Proposed BER Normalized by Power and Distance Index
Advances in optimizing optical fiber communications have been on the rise these recent years due to the increasing demand for larger data bandwidths and overall better efficiency. Coherent optics have focused on many kinds of research due to its ability to transport greater amounts of information, have better flexibility in network implementations, and support different…
Read MoreCognitive Cybernetics in the Foresight of Globalitarianism
This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…
Read More
