Results (202)
Search Parameters:
Keyword: EfficiencyHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreEnergy Management Policy and Strategies in ASEAN
This research analyses the challenges faced by ASEAN countries in managing its energy efficiencies and resources due to rapid economic growth, increasing energy demand, and diverse energy infrastructures across member states. This paper explores the energy management policies and strategies within the ASEAN region, focusing on the integration of energy efficiency measures, renewable energy initiatives,…
Read MoreDigitalization Review for American SMEs
SME big data maturity models will be reviewed in this study to identify systematic publications related to the subject. For SMEs to remain competitive, digitalization is essential. Due to limited resources, SMEs need to be more proactive in digitalization. Still, the benefits, such as operational efficiency, cost reduction, quality improvement, and innovative culture, make digitalization…
Read MoreMalaysia’s Renewable Energy Policy and its Impact on ASEAN Countries
As the global community increasingly shifts its focus towards sustainable development and combating climate change, renewable energy policies have become pivotal in shaping national and regional energy landscapes. Malaysia, as a developing nation with a rapidly growing economy, has recognized the importance of renewable energy sources in achieving its socio-economic goals while addressing environmental concerns.…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreImproved Candidate-Career Matching Using Comparative Semantic Resume Analysis
A resume is a prevalent and generally employed method for individuals to showcase their proficiency and qualifications. It is typically composed using diverse customized, personalized methods in multiple inconsistent formats (such as pdf, txt, doc, etc.). Screening candidates based on the alignment of their resume with a set of job requirements is typically a labori-…
Read MoreVerify of Left and Right Differences in Sleep Index using the Ring-type Sensor
In this study, two healthy women in their 40s wore Oura Rings on both fingers and verified left and right differences in sleep index. Bed time, sleep time, rem sleep, sleep score, and heart rate had small left and right differences in both subjects, and a high correlation of 0.8 or more was observed(subjectA:P<0.001,subjectB:P<0.01). Subject…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreImplementation of a GAS Injection Type Prefabricated Lifting Device for Underwater Rescue Based on Location Tracking
In this paper, we have developed a gas injection-type prefabricated lifting device based on location tracking to efficiently lift the human body in the event of an accident that occurs underwater on the sea or land. The efficiency of the lifting system is very important to ensure the golden time of the rescue and the…
Read MoreResonance Coil Design for a Novel Battery Cell Balancing with using Near-Field Coupling
In this paper, we delve into the pressing necessity for proficient battery cell balancing, an imperative in the context of the escalating adoption of renewable energy and electric vehicles. While traditional methodologies, including the passive technique, offer a straightforward and cost-effective solution, they compromise on efficiency. The active technique, though superior in efficiency, is hindered…
Read MoreFuzzy MPPT for PV System Based on Custom Defuzzification
Due to the variations in weather conditions, photovoltaic systems adopt a technique based on maximum power point tracking to extract the maximal power of the solar module. In the literature, there are many different methods classical and intelligent of maximum power point tracking (MPPT). But, due to the semiconductor effect, the current-voltage characteristics of the…
Read MoreThe Design, Optimization, and Experimental Study of Hub and Axial Flux BLDC Motor Under Operating Conditions For Light Electric Vehicles
In this study, we conducted an experimental study and efficiency optimization of the outer rotor (hub) BLDC (brushless direct current) motor and axial BLDC motor for light electric vehicles. Both motors were investigated in the simulation environment and experimentally. The axial flux BLDC motor had a rated power of 10 KW, and a rated speed…
Read MoreThe Influence Analysis of Internet Finance on China’s Banking Industry Development
This article presented an overview of the evolution of China’s internet financial industry, emphasizing the critical importance of fintech, a novel economic sector improving the efficiency of financial services through innovative technology applications. The systems referred to encompass those technologies, applications, and tools that enhance the efficiency and accessibility of financial services. The historical trajectory…
Read MoreSocial Financial Technologies for the Development of Enterprises and the Russian Economy
The main contradiction identified in the study is that the existing scientific and methodological solves of economy development management processes does not create prerequisites for improving the efficiency of their work, the introduction of progressive technologies for material and moral stimulation of the work of performers and administrative and managerial personnel, advanced social mechanisms for…
Read MoreOn the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor
In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…
Read MoreDesign of an Off-Grid Hybrid Energy System for Electrification of a Remote Region: a Case Study of Upper Blink Water Community, South Africa
Electrifying or connecting remote and isolated communities to the national grid is very difficult and expensive. This challenge is due to the geographic locations of these isolated communities and terrain that needs navigation when installing transmission lines to transmit power to the communities. This article presents a case study of the design of a hybrid…
Read MoreDeep Learning in Monitoring the Behavior of Complex Technical Systems
The article is devoted to the methods of monitoring and control of vibration processes occurring in the structure and units of complex and unique electromechanical equipment. The monitoring object is considered as a dynamic multidimensional information object, for the study of which analytical and numerical methods of modeling and simulation of multidimensional chaotic systems are…
Read MorePhysical and Emission Properties of Blended Bio-Coal Briquettes Derived from Agro-Wastes in Nigeria
Nigeria has one of the highest deforestation rates in the world, due mainly to felling of trees for fuelwood and charcoal production. This challenge could be managed if agricultural waste briquettes are used to augment the fuelwood demand for cooking energy provisioning. Energy density of biomass fuels can be raised by blending with coal, but…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreOn the Construction of Symmetries and Retaining Lifted Representations in Dynamic Probabilistic Relational Models
Our world is characterised by uncertainty and complex, relational structures that carry temporal information, yielding large dynamic probabilistic relational models at the centre of many applications. We consider an example from logistics in which the transportation of cargoes using vessels (objects) driven by the amount of supply and the potential to generate revenue (relational) changes…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreA Novel Algorithm Design for Locating Fault Distances on HV Transmission Lines
The transmission network has been considered among the globe’s prevalent complex systems, comprised of hundreds of electrical transmission lines and other equipment used to transmit electrical energy from one location to another. Over a decade, power engineers have worked tirelessly to ensure that the transmission network operates reliably, transmitting electrical energy from the power station…
Read MoreThermoelectric Generators (TEGs) and Thermoelectric Coolers (TECs) Modeling and Optimal Operation Points Investigation
Sustainable energy is gradually becoming the norm today due to greenhouse warming effects; as a result, the quests for different renewable energy sources such as photovoltaic cells as well as energy efficient electrical appliances are becoming popular. Therefore, this article explores the alternative energy case for thermoelectricity with focus on the steady-state mathematics, mixed modelings…
Read MoreData Stream Summary in Big Data Context: Challenges and Opportunities
With the advent of Big Data, we are witnessing a rapid and varied production of huge amounts of sequential data that can have multiple dimensions, we speak of data streams. The characteristics of these data streams make their processing and storage very difficult and at the same time reduce the possibilities of querying them a…
Read More
