Results (468)
Search Parameters:
Keyword: BEREffect of Cover Number on Distilled Water Production of Distillers with a Novel Water Feeding
An experimental study on the effect of a cover number of solar distillers with a continuous seawater feeding system was conducted. The seawater feeding in this study was a continuous feeding, which was not utilized yet in the previous studies. Three identical distillers i.e. single caver distiller, double cover distiller, and triple cover distiller were…
Read MoreReview of Pedagogical Principles of Cyber Security Exercises
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…
Read MoreAn Explanatory Review on Cybersecurity Capability Maturity Models
Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreApplications of Causal Modeling in Cybersecurity: An Exploratory Approach
Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…
Read MoreAutomated Abaca Fiber Grade Classification Using Convolution Neural Network (CNN)
This paper presents a solution that automates Abaca fiber grading which would help the time-consuming baling of Abaca fiber produce. The study introduces an objective instrument paired with a system to automate the grade classification of Abaca fiber using Convolutional Neural Network (CNN). In this study, 140 sample images of abaca fibers were used, which…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreClassification of Timber Load on Trucks
All trucks heading into the paper mill MONDI, Slovakia, have to pass an automatic security check. It controls if storage of its wood load meets all standards of safety. Each truck is scanned by a group of 2D scanners. After that the inspection of timber load is done by a software with use of the…
Read MoreIn-Plane Shear Behavior of Unreinforced Masonry Walls Strengthened with Fiber Reinforced Polymer Composites
Unreinforced masonry (URM) wall is one of the oldest types of walls used around the world. During earthquakes, URM walls present a real danger to life safety due to their behavior characterized by a brittle failure caused by their feeble shear resistance to in-plane loads, which make their strengthening necessary. Numerous studies had been used…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read MoreAnalysis of Reducing Defect Waste in Rubber Product for Magnetic Disk Drive Industry
Productivity is increasing when less input was used in getting the same outcomes. Thus, the effectiveness of productive effort, especially in industry, as measured in terms of the rate of output per unit of input. As in derivative rubber industry which is producing the seal product for final assembly of Disc Drive. The function of…
Read MoreIntelligent Wireless System for PV Supervision Based on The Raspberry Pi
Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…
Read MoreThe Influence of Adhesive on Roof Tiles Product from Water Hyacinth Fiber Residues
Problem statement: In general, the water hyacinth is a biennial aquatic plant for many seasons with propagated quickly to become serious weeds in general water sources. The water hyacinth is caused carbon dioxide in the atmosphere as a greenhouse effect, which leads to climate change, the environmental concerns of the world today. The agricultural residue…
Read MoreA Proposal of TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point
The IEEE802.11n based Wireless Local Area Networks (WLANs) have been extensively deployed due to the flexible coverage, the easy installation, and the lower cost. To reduce the energy consumption while increasing the performance, the elastic WLAN system has been studied, such that it can dynamically change the network configuration according to traffic demands. As well,…
Read MoreFully Homomorphic Encryption Scheme Based On Complex Numbers
In this paper, we present a new Somewhat Homomorphic Encryption (SHE) scheme using computation over complex numbers. We then use Bootstrapping technique to make the scheme Fully Homomorphic (FH) and supports unbounded number of circuit depth. In addition to its homomorphic properties and security level, a main characteristic of the proposed new scheme is its…
Read MoreExperimental Evaluation of Transmission between Two XBee Modules Using Radio-over-Fiber Technique
An experimental transmission between two XBee modules using Radio over Fiber technique is demonstrated. Data issued from an XBee module coded on a wireless microwave carrier at 2.44GHz is transmitted through an optical link of 25.24 km. The optical transmission is based on an external modulation scheme over a dispersive channel. Frequency response of the…
Read MoreLinearity Improvement of VCSELs based Radio over Fiber Systems utilizing Digital Predistortion
The article proposes a Digital Predistortion (DPD) methodology that substantially meliorates the linearity of limited range Mobile Front Haul links for the extant Long-Term Evolution (LTE) and future (5G) networks. Specifically, the DPD is employed to Radio over Fiber links that contrive of Vertical Cavity Surface Emitting Lasers (VCSELs) working at 850 nm. Both, Memory…
Read MorePAPR and BER Performances of OFDM System with Novel Tone Reservation Technique Over Frequency Non-Selective Fading Channel
An Orthogonal Frequency Division Multiplexing (OFDM) system with Quadrature Phase Shift Keying (QPSK) mapper is considered. A novel low-complexity Tone Reservation (TR) technique is proposed for reduction of Peak-to-Average Power Ratio (PAPR) of the system. The technique is easy-to-implement and minimizes the search space of phases of reserved tones in the system. The ability of…
Read MoreProbabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots
This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…
Read MoreElliptical Printed Dipole Antenna Design using ANN Based on Levenberg–Marquardt Algorithm
A design of elliptical printed dipole antenna based on neural network approach is presented in this paper for recent WiMAX, Bluetooth, WLAN, LTE, and future 5G applications. The dipole patch is printed on top of substrate which has relative permittivity of 2.2 and 0.787mm of thickness. The elliptical dipole antenna is single band and the…
Read MorePerformance Enhancement of MIMO-OFDM Using Redundant Residue Number System
The data transmitted over wireless communication systems are affected by various elements as noise, interference or distortion, and to be able to combat these factors the paper propose the utilization of Redundant Residue Number System (RR NS) coding as a Forward Error Correction (FEC) technique to enhance the performance of MIMO-OFDM communication system compared to…
Read MoreA Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security
During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…
Read MoreDesign of True Random Numbers Generators with Ternary Physical Unclonable Functions
Memory based ternary physical unclonable functions contain cells with fuzzy states that are exploited to create multiple sources of physical randomness, and design true random numbers generators. A XOR compiler enhances the randomness of the binary data streams generated with such components, while a modulo-3 addition enhances the randomness of the native ternary data streams,…
Read MoreNumerical Solution of Fuzzy Differential Equations with Z-numbers using Fuzzy Sumudu Transforms
The uncertain nonlinear systems can be modeled with fuzzy differential equations (FDEs) and the solutions of these equations are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by utilizing the fuzzy Sumudu transform (FST) method. Here, the uncertainties…
Read MoreVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read More
