Results (738)
Search Parameters:
Keyword: GREMulti-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System
Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…
Read MoreReview of Pedagogical Principles of Cyber Security Exercises
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…
Read MoreNumerical Study of Gas Microflow within a Triangular Lid-driven Cavity
A rarefied gas flow is modeled inside two cases of triangular lid-driven microcavity using single (SRT) and multi-relaxation time (MRT) lattice Boltzmann approaches. In the first one, the right angle is in the top-left corner and the upper wall moves with positive horizontal velocity. However, in the second case, the right angle is in the…
Read MoreGenetic Organization and Evolution of Electromechanical Objects with Adaptive Geometry of Active Zone
The paper is devoted to the presentation of a new methodological approach (new philosophy) to the formulation and solution of directed search and synthesis of electromechanical objects for a given function problems. The object under the study is a class of electrical machines and electromechanical devices which operation is carried out with a variable structure…
Read MoreReview of Orange Juice Extractor Machines
There is some agricultural equipment for post harvesting of Orange fruit Juice, all the machine is geared towards extraction of the fruit juice. Fruit juice extraction is the act of wringing out the juice content of fruits by way of an effective processing and storage which enhance reduction in wastage. Fruit juices which literally have…
Read MoreNew Algorithm for the Development of a Musical Words Descriptor for the Artificial Composition of Oriental Music
The Music Composition Library of the great composers constitutes an intellectual heritage. This article introduces an algorithm of artificial Oriental composing music based on the descriptors determined on a large learning base to automatically write Oriental music as the logic identical to any composer. Musical words are called a grammatical alphabet. Each word derived is…
Read MoreA Hybrid Mod
The ability to verify the critical risk factors related to an effective diagnosis is very crucial for improving accuracy on coronary heart disease prediction. The objective of this research is to find the best predictive model for coronary heart disease diagnosis. Three approaches are set up to achieve the goals (1) investigating the classifier algorithms…
Read MoreStrain–Displacement Expressions and their Effect on the Deflection and Strength of Plate
This paper studied the bending analysis of an isotropic rectangular plate for the effects of aspect ratio, shear and deflection on the critical lateral load of the plates using the polynomial shear deformation theory (PSDT). One of the plate is clamped at opposite edge clamped and the other opposite edge simply supported (CSCS). The other…
Read MoreUsing Envelope Analysis and Compressive Sensing Method for Intelligent Fault Diagnosis of Ball Bearing
Bearings are the key components of many rotating machines, in which serious failure or even major breakdown may occur due to their abnormal operation and defects. Thus, accurate fault diagnoses of bearing elements are essential for proactive predictive maintenance. However, the using of multiple sensors with high sampling rate reveal considerable shortages in the analysis…
Read MoreComponent of Trust for Developing Crowdwork System: A Systematic Literature Review
Crowdwork is a system that brings job providers and crowdworkers in a portal. Nowadays, many companies are turning to freelancing rather than hiring full-time employees. In addition, the workers have also switched to working as freelancers. New problems also arise in the crowdwork system. Trust is one of the main issues that arise in the…
Read MoreWater Availability for a Self-Sufficient Water Supply: A Case Study of the Pesanggrahan River, DKI Jakarta, Indonesia
The research will explore the challenges of using local water sources inside the city for a self-sufficient urban water supply by developed a system dynamics model. This study aims to evaluate and understand the Pesanggrahan River appropriateness as a raw drinking water source through a conceptual model that can accurately represent the interactions between the…
Read MoreFactors Influencing the Intention to Use Technology Services to Implement Self-Service Technology Case Study: Situation Pandemic Covid-19
This study aims to analyze a person’s intention in using self-service technology (SST) services during the pandemic COVID-19. Where this time, raising problems one of the social distancing that affects a service provided, especially on services that use technology that applies SST. This study develops from previous research where the customer has satisfaction in using…
Read MoreDesign and Implementation of Reconfigurable Neuro-Inspired Computing Model on a FPGA
In this paper we design a large scale reconfigurable digital bio-inspired computing model. We consider the reconfigurable and event driven parameters in the developed field-programmable neuromorphic computing system. The various Intellectual Property (IP) cores are developed for the modules such as Block RAM, Differential Clock, Floating Point, and First In First Out (FIFO) for the…
Read MoreISR Data Processing in Military Operations
This paper provides an overview of Intelligence, Surveillance, and Reconnaissance (ISR) data with respect on NATO standards and recommendations; further presents methods, tools, and experiences in ISR data processing in military operations. The steps of the Intelligence cycle and disciplines Business Intelligence (BI), Data Warehousing, Data Mining, and Big Data are presented in the introduction.…
Read MoreEconomic and Environmental Analysis of Life Expectancy in China and India: A Data Driven Approach
A data analytic approach presented in this work covers both data descriptive and predictive modeling with two main objectives: (1) discovering factors related to longevity of populations in the two most populated nations, China and India, and (2) generating life expectancy predictive models for both countries. Descriptive modeling methods to explore major environmental and economic…
Read MoreImplementation of a Levitation System for the Visualization of the Magnetic Phenomenon
The phenomenon of magnetic fields is affected depending on the polarity, the positive and negative poles will give a response of attraction and repulsion that can be easily observed. Being also important as an educational element where the theory materializes and is observed, which enriches all science. The objective of this work is to create…
Read MoreA Didactic Balance to Solve Equations
Solving equations does not require only to well master the techniques but also to well understand the different underlying concepts and processes. Many of the mistakes made by the students are often due to misinterpretation of the concepts taught, especially the use of letters which the main conceptual obstacle that students have to overcome. We…
Read MoreSupervised Machine Learning Based Medical Diagnosis Support System for Prediction of Patients with Heart Disease
Application in the field of medical development has always been one of the most important research areas. One of these medical applications is the early prediction system for heart diseases especially; coronary artery disease (CAD) also called atherosclerosis. The need for a medical diagnosis support system is to detect atherosclerosis at the earlier stages to…
Read MoreA Novel Demand Side Management by Minimizing Cost Deviation
In the recent times power shortage has been a major setback to deal for the effective operation of power systems. Bridging the gap between generation and demand is known as Demand Side Management (DSM). For an effective DSM strategy to be implemented, it is crucial that both utility and customers be involved. By DSM, the…
Read MoreAssessing Heutagogical Elements in Learning of Engineering Education: Instrument Validation
Practically level of design element (i.e., explore, sharing, connect) is an essential of heutagogical approach. The self-determined learning process can be at ease with the implementation of these elements, and the critical step is reliability to measure teaching and learning feedback. Although various instruments were proposed in the literature to assess heutagogy elements, the specific…
Read MoreA Review of RPL Objective Function based Enhancement Approaches
Since the release of of the IPv6 Routing protocol for Low-Power and Lossy Networks by the IETF ROLL working group, several enhancement schemes were proposed. In fact, They aim to extend the network lifetime, reduce congestion, mitigate end to end delay and moderate energy consumption. In fact, considering the vast area of Low-Power and Lossy…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MoreFour-Dimensional Sparse Data Structures for Representing Text Data
This paper focuses on a string encoding algorithm, which produces sparse distributed representations of text data. A characteristic feature of the algorithm described here, is that it works without tokenizing the text and can avoid other data preparation steps, such as stemming and lemmatization. The text can be of arbitrary size, whether it is a…
Read MoreTowards Directing Convolutional Neural Networks Using Computational Geometry Algorithms: Application to Handwritten Arabic Character Recognition
Suppose we want to classify a query item Q with a classification model that consists of a large set of predefined classes L and suppose we have a knowledge that indicates to us that the target class of Q belongs to a small subset from L. Naturally, this filtering will improve the accuracy of any…
Read MoreThe Ludocreative Expression for the Production of Texts in Children of Early Education
The text’s production carried out in this research aimed to 5-year-old children from the IE 555 Inmaculada Concepción, under the modality dictated to adult, had a design and application of 22 sessions during three months with the experimental group. On their methodological approach was based on the expression ludocreative, articulating the written experience jointly with…
Read More
