Results (217)
Search Parameters:
Keyword: AnalyzeMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read MoreBlockchain Applications in Suning and PingAn
The emergence of blockchain technology has facilitated the digital transformation of many businesses and thereby increased the competitiveness of China in the global market. As a cutting-edge technology, Blockchain has significantly influenced the practices across all business sectors. Focusing on the retail and insurance sectors, this paper analyzes the blockchain technology applications in two companies…
Read MoreSensitive Analysis in Holding and Penalty Costs for the Stochastic Sequencing Problem in Agile Manufacturing
In agile manufacturing, due to the desire to meet customer’s requirements, processing times are stochastic because operations could be done by robots or humans. This can cause several problems in scheduling the jobs, and it is necessary to select the dispatch rule with the least change in costs and times, to respond quickly to different…
Read MoreEffect of Knee Orthosis on Lateral Thrust in Patients with Knee Osteoarthritis
To examine the effects of wearing a flexible knee orthosis (FKO) on the lateral thrust in patients with knee osteoarthritis (OA) by changing the wearing pressure. This study was a cross-sectional study. Thirteen patients (mean age: 82.8 ± 7.5years with Kellgren Lawrence Stages I and II knee OA were included and prescribed FKO. Patient with…
Read MoreDeep Learning in Monitoring the Behavior of Complex Technical Systems
The article is devoted to the methods of monitoring and control of vibration processes occurring in the structure and units of complex and unique electromechanical equipment. The monitoring object is considered as a dynamic multidimensional information object, for the study of which analytical and numerical methods of modeling and simulation of multidimensional chaotic systems are…
Read MoreEstimating a Minimum Embedding Dimension by False Nearest Neighbors Method without an Arbitrary Threshold
The false nearest neighbors (FNN) method estimates the variables of a system by sequentially embedding a time series into a higher-dimensional delay coordinate system and finding an embedding dimension in which the neighborhood of the delay coordinate vector in the lower dimension does not extend into the higher, that is, a dimension in which no…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreLean Six Sigma Implementation in the Food Sector: Nexus between Readiness-Critical Success Factors
Lean Six Sigma (LSS) is a renowned approach for boosting operational excellence and competitive advantage through integrated core objectives of value creation and variation reduction. Despite its proven benefits in many leading companies, LSS implementation in the food sector is still behind compared with other sectors. LSS implementation is costly, and most businesses have failed…
Read MoreLight Modulation Enhancement by using an Impedance Matching Scheme for a Subcarrier Multiplexed Light Transmitter
We propose and analyze new impedance matching schemes to enhance applied voltage to an optical modulator and light modulation for a subcarrier multiplexed light transmitter or a radio-on-fiber transmitter that carries radio-frequency signal through an optical fiber. Our proposal includes two methods using a quarter-wavelength impedance transformer and a tapered microstrip line for impedance matching…
Read MoreAnalysis of Grid Events Influenced by Different Levels of Renewable Integration on Extra-large Power Systems
In this work, the impact of implementing a large amount of decentralized renewable energy sources (RES) of different scales on an extra-large power grid is investigated. Three scenarios are created, substituting 10%, 20%, and 30% of the conventional energy production by RES. For this purpose, the initial dynamic model of Continental Europe in combination with…
Read MorePredicting School Children Academic Performance Using Machine Learning Techniques
The study aims to assess the machine learning techniques in predicting students’ associated factors that affect their academic performance. The study sample consisted of 5084 middle and high school students between the ages of 10 and 17, attending public and UNRWA schools in the West Bank. The ‘Health Behaviors School Children’ questionnaire for the 2013-2014…
Read MorePerformance of Vertical Axis Wind Turbine Type of Slant Straight Blades
There is no doubt that energy is one of the most important requirements of life, and its importance increases with the passage of time, and this is what make countries to harness the capabilities and scientists in developing energy systems of all kinds, one of the most important energy systems these days is what is…
Read MoreMultidisciplinary Systemic Methodology, for the Development of Middle-sized Cities. Case: Metropolitan Zone of Pachuca, Mexico
This paper analyzes the challenges a middle-sized city faces, particularly the Metropolitan Zone of Pachuca (MZP), which has not had the expected development given its current geographic, competitiveness, and crisis circumstances. The research proposes a systemic methodology for the analysis of the aforementioned Metropolitan Area. It emphasizes its internal and external behavior, the competitive environment…
Read MoreSmart Mobility: Opportunities and Challenges for Colombian Cities
The following document analyzes the current situation in mobility and intelligent transportation in Colombia and in some cities around the world. Presenting several cases of success and implementation of technologies and protocols that seek to improve the problems with the greatest impact in today’s cities, such as traffic congestion, environmental impact, accessibility, and road safety.…
Read MoreThe health Sector Between Innovation and Organizational Performance: Applied Research in Moroccan Hospitals
In the context of globalization and the crises that we are experiencing today, innovation becomes the engine of acceleration and resolution of all kinds of organizational dysfunctions. Different alternatives have been proposed by all researchers and practitioners. The role of this paper is to determine the peculiarities of innovation, including the role played by organizational,…
Read MoreSupporting the Management of Predictive Analytics Projects in a Decision-Making Center using Process Mining
A Decision-Making Centers (DMCs) Environment facilitates stakeholders’ decision-making processes using predictive models and diverse what-if scenarios. An essential element of this environment is the management of Decision Support Components (e.g., models or systems) that need to be created with mature methodologies and good delivery time. However, there has been a gap in the understanding of…
Read MoreAn Analysis of the Reliability of Reported COVID-19 Data in Western Balkan Countries
More than one year after the outbreak of the COVID-19 pandemic the behavior of figures published by official sources of the countries are skeptical for the public. Many probability tests are used to detect the reliability of information among which Benford’s Law. This study focused on the Western Balkan countries, as one of the foremost…
Read MoreA New Video Based Emotions Analysis System (VEMOS): An Efficient Solution Compared to iMotions Affectiva Analysis Software
The Micro-facial expression is the most effective way to display human emotional state. But it needs an expert coder to be decoded. Recently, new computer vision technologies have emerged to automatically extract facial expressions from human faces. In this study, a video-based emotion analysis system is implemented to detect human faces and recognize their emotions…
Read MoreCoronal Spinal Postural Alignment Screening Tool using Markerless Digital Photography
Early detection and proper management of adult degenerative scoliosis (ADS) are important for health promotion. This study aims to develop an ADS screening tool from markerless digital photography and verify its reliability. The study included 17 participants. Outer canthus–horizontal angle (OHA) and trapezius–horizontal angle (THA) were calculated from the image of the upper body of…
Read MoreComparative Analysis of Land Use/Land Cover Change and Watershed Urbanization in the Lakeside Counties of the Kenyan Lake Victoria Basin Using Remote Sensing and GIS Techniques
The ecosystems and landscape patterns in Lake Victoria basin are increasingly being modified by changes in land use/land cover. Understanding dynamics of these changes is essential for appropriate planning. This study evaluated changes in landscape environment, of the lakeside counties of the Kenyan Lake Victoria basin, which have occurred over a forty-year period (1978-2018) and…
Read MoreApplication of Piecewise Linear Approximation of the UAV Trajectory for Adaptive Routing in FANET
A significant problem of routing protocols in the Flying Ad Hoc Networks (FANET) is a significant overhead cost due to the high mobility of networking nodes. The problem is caused by a need to send information messages about locations of unmanned aerial vehicles (UAVs). In order to reduce the amount of service information, the following…
Read MoreOpen Access Research Trends in Higher Education: A Literature Review
This study is a review of the literature on open access (OA), seeking to identify trends in research on the subject. This review was conducted in the SCOPUS database and focused on the following as the main topics: 1. Financial aspects, 2. Repositories, 3. Education, 4. Academic community’s perception of OA resources, 5. Tools, 6.…
Read MoreArchitecture of Real-Time Patient Health Monitoring Based on 5G Technologies
Worldwide, the epidemiological situation is constantly changing and with the exponential increase in the number of confirmed coronavirus cases, the number of health care workers has decreased significantly and this is due to the direct and daily contact of patients. One of the major challenges of the last few months is to prevent the spread…
Read More
