Results (1510)
Search Parameters:
Keyword: CoMPEEG Mind Controlled Smart Prosthetic Arm – A Comprehensive Study
Recently, the field of prosthetics has seen many accomplishments especially with the integration of technological advancements. In this paper, different arm types (robotic, surgical, bionic, prosthetic and static) are analyzed in terms of resistance, usage, flexibility, cost and potential. Most of these techniques have some problems; they are extremely expensive, hard to install and maintain…
Read MoreThe main characteristics of five distributed file systems required for big data: A comparative study
These last years, the amount of data generated by information systems has exploded. It is not only the quantities of information that are now estimated in Exabyte, but also the variety of these data which is more and more structurally heterogeneous and the velocity of generation of these data which can be compared in many…
Read MoreA Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method
One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…
Read MorePreparation of Ni-C Ultrafine Composite from Waste Material
This work depicts the preparation of Ni-C ultrafine composite from used engine oil. The used oil was emulsified with detergent loaded with Ni (OH)2. The loaded emulsion was sprayed on electric plasma generated between two C electrodes to a DC main 28 V and 70-80 A. The purged Ni-doped carbon fume was trapped on a…
Read MoreComputer Aided Classification using Support Vector Machines in Detecting Cysts of Jaws
Jaw cyst is one of the most common pathology observed in the field of dentistry. Early detection of the cystic lesion will help the surgeons to take appropriate therapeutic measures after a thorough diagnostic procedure. One of the challenging task for surgeons is to differentiate the cysts from the other pathologies. The appearance of these…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MoreOptimizing the Decoding Complexity of PEG-Based Methods with an Improved Hybrid Iterative/Gaussian Elimination Decoding Algorithm
This paper focuses on optimizing the decoding complexity of the progressive-edge-growth-based (PEG-based) method for the extended grouping of radio frequency identification (RFID) tags using a hybrid iterative/Gaussian elimination decoding algorithm. To further reduce the decoding time, the hybrid decoding is improved by including an early stopping criterion to avoid unnecessary iterations of iterative decoding for…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MorePrincipal Component Analysis Application on Flavonoids Characterization
Flavonoid is one of the bioactive compounds that are currently used in pharmaceutical and medicinal industries due to their health benefit. The focus of current research is mainly on the extraction and isolation of bioactive compounds; however non to date has explored on the identification of flavonoids classes under the Fourier Transform Infrared spectroscopy (FTIR).…
Read MoreService Productivity and Complexity in Medical Rescue Services
The increasing impact of services on economic wealth and income in high wage countries calls for a detailed examination of service productivity and complexity in current research projects. This paper describes the development of a measurement model of service productivity and complexity within the domain of medical service provision. While the measurement model of service…
Read MoreComputational Intelligence Methods for Identifying Voltage Sag in Smart Grid
In recent years pattern recognition of power quality (PQ) disturbances in smart grids has developed into crucial topic for system equipments and end-users. Undoubtedly analyzing the PQ disturbances develop and maintain smart grids effectiveness. Voltage sags are the most common events that affect power quality. These faults are also the most costly. This paper represents…
Read MoreThe Model of Adaptive Learning Objects for virtual environments instanced by the competencies
This article presents the instantiation of the Model of Adaptation of Learning Objects (MALO) developed in previous works, using the competencies to be developed in a given educational context. MALO has been developed for virtual environments based on an extension of the LOM standard. The model specifies modularly and independently two categories of rules, of…
Read MoreA Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks
A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…
Read MoreToward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…
Read MoreChannel Inversion Schemes with Compensation Network for Two-Element Compact Array in Multi-User MIMO
In this paper, we investigate the performance of channel inversion schemes for interference cancellation with compensation network in multi-user MIMO broadcasting channel. To achieve good performance, mutual coupling between two-element compact arrays is characterized by the receiving mutual impedance method (RMIM) to formulate the compensation network-operating matrix. A prototype of two-element compensation network with an…
Read MoreComputer Aided Medical Diagnosis for the Treatment of Sexually Transmitted Disease (Gonorrhea)
The World Health Organization (WHO) report on the circumstances of clinical facilities in developing countries indicates that, there is considerable efficient delivery of medical services to the rural inhabitants where the services are available, these services are very expensive and not affordable to the average citizen. This has risen inadequacies such as prolonged suffering and…
Read MoreImplementation Of Carlson Survey Software2009 In Survey Works And Comparison With CDS Software
The automation surveying is one of the most influential changes to surveying concept and profession has had to go through, this has taken effect in two major courses, hardware (instrumentation used in data collection and presentation), and the software (the applications used in data processing and manipulation). Automation is majorly computer based and just like…
Read MoreEffects of the Metropolitan Civil Resilience Program: Comparison of the SAT Resilience Program and an Exercise Program
Purpose: To conduct preliminary research for developing a program to enhance resilience, a topic that has generated attention of late. Methods: We compared the Structured Association Technique (SAT) resilience program and an exercise program. The citizen’s lecture on stress management occurred 1 month after East Japan Earthquake, and the intervention was carried out in the afternoon of…
Read MoreA Comparative Study For Color Systems Used In The DCT-DWT Watermarking Algorithm
This paper presents a comparative study of using different color systems on watermarking algorithms. This comparison aim is to determining the robustness and the stability of the color systems used in the watermarking scheme. The watermarking algorithm that is used in this paper is a hybrid scheme using the Discrete Wavelet Transform (DWT) in the…
Read MoreAn Application of ANN Model with Bayesian Regularization Learning Algorithm for Computing the Operating Frequency of C-Shaped Patch Antennas
In this paper, an application of artificial neural network (ANN) using bayesian regularization (BR) learning algorithm based on multilayer perceptron (MLP) model is presented for computing the operating frequency of C-shaped patch antennas (CPAs) in UHF band. Firstly, the operating frequencies of 144 CPAs having varied dimensions and electrical parameters were simulated by the XFDTD…
Read MoreCompressive Strength of Cement Mortar blended with Coconut Fibers and Human Hair
Mortar is used all over the world for construction purpose. It consists of cement paste and fine aggregates and admixtures if required are also incorporated to modify some of its properties. In this study coconut fibers and human hair were used as an additive materials in the mortar and its effects on compressive strength of…
Read MoreTL-SOC: A Hybrid Decision-Centric Intrusion Detection Framework for Security Operations Centers
Security Operations Centers (SOCs) require intrusion detection systems that achieve high detection accuracy while maintaining a low false-positive rate and robustness to evolving attack patterns. However, most existing machine learning-based approaches primarily focus on detecting known threats and often overlook distribution shifts and the reliability of generated alerts. In this paper, we propose TL-SOC, a…
Read MoreHybrid Feature Selection for Anomaly Detection in IoT Network Intrusion Detection Systems
The rapid growth of Internet of things (IoT) devices have heightened the need for effective Intrusion Detection System (IDS) to combat evolving cyber threats. The IoT networks has the security challenges due to the heterogeneous and high-dimensional nature of network traffic data, redundant features, and class imbalance which hinder detection accuracy and efficiency. Effective IDS…
Read MoreAn Ensemble Learning Approach for Student Performance Analysis of a Higher Educational Institute using a SHAP-Based Feature Selection and Optuna Optimization
Forecasting and assessing student performance are crucial for allowing educators to pinpoint deficiencies and promote grade improvement. A thorough comprehension of feature contributions is crucial for improving model interpretability and facilitating informed decision-making in academic institutions. Explainable artificial intelligence encompasses methodologies and strategies designed to deliver transparent and accessible rationales for the decisions rendered by…
Read MoreGC4miRNA - a Pipeline for Examining Impact of GC Content in miRNA Seed Sequences on Expression in Tumor Samples
MicroRNAs (miRNAs) are small RNA molecules that play a crucial role in regulating gene expression by binding to and degrading targeted mRNAs. miRNAs targeting a specific mRNA have a region known as the “seed sequence”, which typically has a high affinity for its complementary sequence in the targeted mRNA. Single Nucleotide Polymorphisms (SNPs) are mutations…
Read More
