Results (1507)
Search Parameters:
Keyword: CatDeep venous thrombus characterization: ultrasonography, elastography and scattering operator
A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…
Read MoreApplications of Case Based Organizational Memory Supported by the PAbMM Architecture
In the aim to manage and retrieve the organizational knowledge, in the last years numerous proposals of models and tools for knowledge management and knowledge representation have arisen. However, most of them store knowledge in a non-structured or semi-structured way, hindering the semantic and automatic processing of this knowledge. In this paper we present a…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read MoreCross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs
To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…
Read MoreDesign and Fabrication of a Dielectrophoretic Cell Trap Array
We present a design and fabrication of an integrated micro-fabricated dielectrophoretic (DEP) cell trap array in a microfluidic channel. The cell trap array is capable of isolating target cells in high-throughput manner and producing cell clusters of tunable cell numbers. In this work, we have used commercially available polystyrene beads to show the concept. Bead…
Read MoreFenceBook a Geofencing based Advertisements Application Using Android
Geo-fencing (geofencing) is a great feature in a software program that uses Global Positioning System (GPS) or radio frequency identification (RFID) to define the geographical boundaries feature. Actually geofence is a virtual barrier. Geofencing is an innovative technology, an online marketplace for proactive contextual services that allows users to easily find interesting services, can easily…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read MoreAn Application of ANN Model with Bayesian Regularization Learning Algorithm for Computing the Operating Frequency of C-Shaped Patch Antennas
In this paper, an application of artificial neural network (ANN) using bayesian regularization (BR) learning algorithm based on multilayer perceptron (MLP) model is presented for computing the operating frequency of C-shaped patch antennas (CPAs) in UHF band. Firstly, the operating frequencies of 144 CPAs having varied dimensions and electrical parameters were simulated by the XFDTD…
Read MoreEffect of Foliar Application of Zinc on Growth and Yield of Guava (Psidium Guajava L.)
In depth study focusing to ascertain the effect of different rates of Zinc (Zn) fertilization in improving the quality and yield of Guava fruit was carried out at Gharo, Sindh – Pakistan during year 2014-15. The outcome of the research revealed that there was no significant effect on the yield as well as quality, without…
Read MoreTL-SOC: A Hybrid Decision-Centric Intrusion Detection Framework for Security Operations Centers
Security Operations Centers (SOCs) require intrusion detection systems that achieve high detection accuracy while maintaining a low false-positive rate and robustness to evolving attack patterns. However, most existing machine learning-based approaches primarily focus on detecting known threats and often overlook distribution shifts and the reliability of generated alerts. In this paper, we propose TL-SOC, a…
Read MoreHybrid Feature Selection for Anomaly Detection in IoT Network Intrusion Detection Systems
The rapid growth of Internet of things (IoT) devices have heightened the need for effective Intrusion Detection System (IDS) to combat evolving cyber threats. The IoT networks has the security challenges due to the heterogeneous and high-dimensional nature of network traffic data, redundant features, and class imbalance which hinder detection accuracy and efficiency. Effective IDS…
Read MoreHLLSet Theory: A Unified Framework for Probabilistic Knowledge Representation
This paper introduces HLLSet (HyperLogLog Set), a probabilistic data structure that behaves like a set under all standard operations while containing no explicit elements. Unlike traditional HyperLogLog, which only estimates cardinality, HLLSets support full set operations (union, intersection, difference) through enhanced register structures and provide a principled framework for representing semantic relationships. We establish a…
Read MoreGC4miRNA - a Pipeline for Examining Impact of GC Content in miRNA Seed Sequences on Expression in Tumor Samples
MicroRNAs (miRNAs) are small RNA molecules that play a crucial role in regulating gene expression by binding to and degrading targeted mRNAs. miRNAs targeting a specific mRNA have a region known as the “seed sequence”, which typically has a high affinity for its complementary sequence in the targeted mRNA. Single Nucleotide Polymorphisms (SNPs) are mutations…
Read MoreInvestigating the Influence Biomass Additive on the Thermal Performance of a Fired-Clay for Producing the Inner Liner of a Biomass Cook-Stove
This study investigated the influence of a biomass additive on the thermal performance of the inner liner of fired-clay cook-stoves. Fired-clay cook-stoves are essential cooking devices, particularly in areas with limited access to modern energy resources. The study aimed to enhance the thermal efficiency of the cook-stoves by incorporating rice husk into the inner liner…
Read MoreMulti Attribute Stratified Sampling: An Automated Framework for Privacy-Preserving Healthcare Data Publishing with Multiple Sensitive Attributes
The accumulation and analysis of large-scale patient data have led to breakthrough discoveries in potential flags for diseases based on pattern recognition, highlight medication efficacy, and local population health trends that would be impossible with traditional paper-based records. However, these benefits come with unique challenges posed by the application of data sharing for research and…
Read MoreEfficient Pattern Recognition Resource Utilization Neural Network
Neural Networks derives intelligent systems and modern autonomous applications. With the complexity introduced in today’s systems, designing architectures remains open research problem in all fields. Despite many efforts to generalize, the resources required by neural architectures remain challenge. Robots design, Smart cities, IoTs …etc. become the leading industry and driving the fourth industrial revolutions. All…
Read MoreBeyond Fitness: Revolutionary Exercise Tracker Combining Pose Recognition with Heart Rate Monitoring using Remote Photoplethysmography (rPPG)
Heart rate (HR) is a critical indicator in fitness monitoring, athletic performance evaluation, and injury prevention. However, traditional motion-sensitive wearable devices are highly susceptible to movement artifacts, which degrade measurement accuracy during physical activity. Remote photoplethysmography (rPPG) offers a non-contact alternative for HR measurement, though it too remains sensitive to motion. This study proposes a…
Read MoreDetection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase
Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…
Read MoreDesign and Electronic Interfacing of FR4 and Polyimide PCB-based Electromagnetic Resonating Micro-mirrors
This paper presents the design and fabrication of an electromagnetically actuated PCB-based resonating scanning micro-mirror for LiDAR applications, with optimization targeted towards low-cost fabrication and a high scanning angle. Traditional silicon MEMS-based micro-mirrors, while offering high precision and compatibility with CMOS processing, are limited by fragility at low scanning frequencies and costly fabrication processes. To…
Read MoreA Multi-class Acoustic Dataset and Interactive Tool for Analyzing Drone Signatures in Real-World Environments
The rapid proliferation of drones across various industries has introduced significant challenges related to privacy, security, and noise pollution. Current drone detection systems, primarily based on visual and radar technologies, face limitations under certain conditions, highlighting the need for effective acoustic-based detection methods. This paper presents a unique and comprehensive dataset of drone acoustic signatures,…
Read MoreSystem-Level Test Case Design for Field Reliability Alignment in Complex Products
Achieving targeted reliability for complex products in real-world field environments remains a persistent challenge, even when laboratory validation suggests high performance. A significant reliability gap often emerges during the initial deployment phase, typically within the first one to five years where field failure rates can be up to twice those predicted in controlled settings. Compounding…
Read MoreIdentifying Comprehension Faults Through Word Embedding and Multimodal Analysis
This study establishes a method for determining whether learners have an understanding of data science. Data science requires knowledge in various fields, which makes many learners give up. To prevent learners from being discouraged, it is necessary to judge the comprehension of the principles in each specified skill. It is important to assess not only…
Read MoreStradNet: Automated Structural Adaptation for Efficient Deep Neural Network Design
Deep neural networks (DNNs) have demonstrated remarkable success across a wide range of machine learning tasks. However, determining an effective network architecture, particularly the sizes of the hidden layers, remains a significant challenge and often relies on inefficient trial-and-error experimentation. In this paper, we propose an automated architecture design approach based on structurally adaptive DNNs,…
Read MorePrivate 5G MIMO for Cable TV IP Broadcasting
Private 5G utilization by cable TV is expected to be an alternative to wired services, especially for multi-dwelling units and rural communal TV receiving areas. On the other hand, the 100 MHz of the sub-6 frequency band for private 5G is not sufficient for cable TV services consisting of multi-channel broadcasting and Internet, and some…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read More
