Results (502)
Search Parameters:
Keyword: NetworkTrajectory Tracking Control of a DC Motor Exposed to a Replay-Attack
This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreNon Parallelism and Cayley-Menger Determinant in Submerged Localization
This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…
Read MoreEvolution of Privacy Preservation Models in Location-Based Services
Location-based services have become increasingly prevalent with the advancement in the positioning capabilities of smart devices and their emergence in social networking. In order to acquire a service, users must submit their identity, query interest and location details to service providers. Such information shared by users are accumulated continuously, stored and analyzed in order to…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MorePerformance Effects of Algorithmic Elements in Selected MANETs Routing Protocols
Over time, several routing protocols have been suggested for use in Mobile Ad Hoc Networks (MANETs). Because of availability of so many MANETs routing protocols, network engineers and administrators face difficulties in identifying an appropriate routing protocol for a particular scenario. This challenge results from the unavailability of adequate technical analytic studies designed to examine…
Read MoreReview on Smart Electronic Nose Coupled with Artificial Intelligence for Air Quality Monitoring
With the advent of the Internet of Things Technologies (IOT), smart homes, and smart city applications, E-Nose was created. Almost of gas sensors consisting the electronic nose system suffer from cross sensitivity and lack of selectivity. Coupling smart gas sensors with artificial intelligence algorithms can thus empower conventional gas sensing technologies and increase accuracy in…
Read MoreFace Recognition on Low Resolution Face Image With TBE-CNN Architecture
Face recognition in low resolution images has challenges in active research because face recognition is usually implemented in high resolution images (HR). In general, research leads to a combination of pre-processing and training models. Therefore, this study aims to classify low-resolution face images using a combination of pre-processing and deep learning. In addition, this study…
Read MoreROS Based Multimode Control of Wheeled Robot
This research work mainly presents the design and development of a small-scaled wheeled robot, which can be controlled using multiple controlling interfaces using some new technological trends. Raspberry Pi 3 as the main controller, Python as the programming language integrated with the Robot Operating System (ROS) and Virtual Network Computing (VNC) for screen sharing are…
Read MoreClassification of Timber Load on Trucks
All trucks heading into the paper mill MONDI, Slovakia, have to pass an automatic security check. It controls if storage of its wood load meets all standards of safety. Each truck is scanned by a group of 2D scanners. After that the inspection of timber load is done by a software with use of the…
Read MoreActiverest: Design of A Graphical Interface for the Remote use of Continuous and Holistic Care Providers
One of the most prevalent physical limitations of both aging and accidents is immobility. Being bedridden requires great care to avoid the formation of pressure ulcers. Thus, the ‘ActiveRest’ project aimed to develop a textile mattress guard that will contribute to the prevention of pressure ulcers. This textile mattress guard integrates a monitoring system, based…
Read MoreCommercialization Process of Disruptive Innovations in Corporate Ventures and Spinoff Companies: A Comparison
One of the most critical challenges that large companies, small enterprises and research institutes face, when commercializing their innovations, is the transfer process at the moment of scaling up. These organizations often transfer their innovation to either existing business units or create a new business entirely. The process of transferring innovations to an existing unit…
Read MoreSecuring Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model
In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…
Read MoreA Sustainable Multi-layered Open Data Processing Model for Agriculture: IoT Based Case Study Using Semantic Web for Hazelnut Fields
In recent years, several projects which are supported by information and communications technologies (ICT) have been developed in the agricultural domain to promote more precise agricultural activities. These projects account for different kinds of key ICT terms such as internet of things (IoT), wireless sensors networks (WSN), cloud computing (CC). These projects are used for…
Read MoreEnhancing an SDN Architecture with DoS Attack Detection Mechanisms
A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…
Read MoreA Study on the Effects of Combining Different Features for the Recognition of Handwritten Bangla Characters
This paper studies and compares the effectiveness of four different features and their combinations on the recognition accuracy of handwritten Bangla characters. The longest run, chain code histogram, shadow, and Gabor filter-based features and their eleven (11) combinations were tested on a standard Bangla database of 15; 000 basic handwritten characters to compare their recognition…
Read MoreTransfer Learning and Fine Tuning in Breast Mammogram Abnormalities Classification on CBIS-DDSM Database
Breast cancer has an important incidence in women mortality worldwide. Currently, mam- mography is considered the gold standard for breast abnormalities screening examinations, since it aids in the early detection and diagnosis of the illness. However, both identification of mass lesions and its malignancy classification is a challenging problem for artificial intelligence. In this work,…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read MoreAttacks Classification and a Novel IDS for Detecting Jamming Attack in WBAN
Wireless Body Area Network (WBAN) aims to monitor patient’s health remotely, by using mini medical sensors that are attached on the human body to collect important data via the wireless network. However, this type of communication is very vulnerable to various types of attacks, poses serious problems to the individual’s life who wears the nodes.…
Read MorePerformance Evaluation and Examination of Data Transfer: A Review of Parallel Migration in Cloud Storage
Recent years have seen a continued pattern of development in the cloud computing field. Numerous approaches to maximize file transfer capacity are still completely standing for use on cloud computing storage; however, they do not maximize the advantage of data migration scalability and elasticity in cloud storage. One potential problem is that elasticity takes time;…
Read MoreDesign and Validation of a Meter Band Rate in OpenFlow and OpenDaylight for Optimizing QoS
Technological developments in the Internet and communications have created a vastly complex and dynamic context with diverse heterogeneous networks and fast growth of mobile devices and multimedia. As the Internet becomes the primary mode of communication for many organisations there is requirement to enhance quality of service (QoS) from heterogeneous systems and networks. Traditional networks…
Read MoreDesign of Efficient Convolutional Neural Module Based on An Improved Module
In order to further improve the feature extraction performance of the convolutional neural networks, we focus on the selection and reorganization of key features and suspect that simple changes in the pooling layers can cause changes in the performance of neural networks. According to the conjecture, we design a funnel convolution module, which can filter…
Read MoreSkin Tissue Oxygen Saturation Prediction: A Comparison Study of Artificial Intelligence Techniques
Noninvasive measurement of skin tissue oxygen saturation, StO2, is of interest especially in the studies of wound healing and detection of vascular diseases. This work aims to compare Partial Least Square (PLS) regression, K-Nearest Neighbor (KNN) and Artificial Neural Network (ANN) technique in the prediction of StO2 using spectral data obtained from Monte Carlo simulations.…
Read MoreImplement Wireless and Distributed Vibrator for Enhancing Physical Activity of Visually Impaired Children
Learning and mental and physical counselling for visually impaired children are important. However, due to the lack of visual sense assistance, Physical Activity will gradually degenerate without proper enhancement, which may require the care of others for life. Inner fear and sensitive psychological factors hinder the development of living ability. Strengthening physical activity of visually…
Read More
