Results (114)
Search Parameters:
Keyword: IndividualDismantle Shilling Attacks in Recommendations Systems
Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…
Read MoreThe Perceptions of Students and Teachers When using ICTs for Educational Practices Matter: A Systematic Review
Before succumbing to the 2019 Coronavirus pandemic, information and communication technologies (ICTs) have sustained a ubiquitous presence in human lives and society. ICTs have changed the standards and dynamics of educational practices (EPs). Many academic institutions had already integrated technological-based pedagogical instructions into their educational practices but, in various cases, faced challenges of failing to…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreAutomated Robotic System for Sample Preparation and Measurement of Heavy Metals in Indoor Dust Using Inductively Coupled Plasma Mass Spectrometry (ICP-MS)
Dust is ubiquitous in our daily environment—outdoor and indoor. In modern times, people often spend the majority of their time at home, in offices, at work or in schools. Suspended particles such as tiny crumbs up to long fibers generate indoor dust deposits. Inhouse sources are the interior releasing abraded fibers from carpets, bedding and…
Read MoreA CMOS On-Chip High-Precision PVTL Detector
A novel PVTL (Process, Voltage, Temperature, Leakage) detection circuit consisting of four individual detectors is proposed in the investigation. Voltage Variation Detector is composed of a feedback control block comprising multi-stage delay cells using high Vth devices such that 0.5% of VDD variation can be detected. Temperature Detector based on a current to pulse converter…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreOn the Construction of Symmetries and Retaining Lifted Representations in Dynamic Probabilistic Relational Models
Our world is characterised by uncertainty and complex, relational structures that carry temporal information, yielding large dynamic probabilistic relational models at the centre of many applications. We consider an example from logistics in which the transportation of cargoes using vessels (objects) driven by the amount of supply and the potential to generate revenue (relational) changes…
Read MoreStability Analysis of a DC Microgrid with Constant Power Load
DC Microgrids (DCMGs) aggregate and integrate various distribution generation (DG) units through the use of power electronic converters (PECs) that are present on both the source side and the load side of the DCMGs. Tightly regulated PECs at the load side behave as constant power loads (CPLs) and may promote instability in the entire DCMG.…
Read MoreAssociated Risk Factors for the Development of Extensively Resistant Pulmonary Tuberculosis in the First Level of Health Care: From a Public Health Perspective
To determine the risk factors associated with the development of extensively resistant pulmonary tuberculosis in the DIRIS Lima Sur, 2017. The type of research was observational, quantitative, analytical, retrospective case-control approach. The population consisted of 158 patients with MDR-TB treatment schedule between 2016 and 2017. The sample consisted of 24 cases diagnosed with extensively drug-resistant…
Read MoreControl and Monitoring Systems in Medium Voltage Distribution Networks in Poland – Current Status and Directions of Development
The paper describes the control and monitoring systems installed in medium voltage networks by Polish distribution network operators. It also outlines the expected directions of development of these systems, specifies the functions of the individual system components and describes the requirements applicable to them. In particular, attention is paid to the implementation of functions to…
Read MoreInnovations in Recruitment—Social Media
The main objective and contribution of the paper is to describe the creation of a model to support recruitment using social media information and its deployment in practice. The model includes the design of an automated solution for downloading social media data and a proposal for the subsequent analysis and creation of a predictive model…
Read MoreTraditional and Deep Learning Approaches for Sentiment Analysis: A Survey
Presently, individuals generate tremendous volumes of information on the internet. As a result, sentiment analysis is a critical tool for automating a deep understanding of user-generated information. Of late, deep learning algorithms have shown endless promises for a variety of sentiment analysis. The purpose of sentiment analysis is to categorize different descriptions as good, bad,…
Read MoreInitial Experiments using Game-based Learning Applied in a Classical Knowledge Robotics in In-Person and Distance Learning Classroom
This paper addresses experiments with Scratch-developed games in the robotics introduction course at the Federal University of Technology – Paraná. It aims at assisting learning of classical and initial robotics concepts. This proposal, similar to the classic 80s war tanks game on Atari 2600, was developed using an autonomous vehicle. In the first experiment, applied…
Read MoreVibration and Airflow Tactile Perception as Applied to Large Scale Limb Movements for Children
This study aimed to develop an airflow-vibrator motivated facility and assess exercise behaviors. The combination design involved computer-controlled airflow/ vibrators, a user interface program, and an adjustable structure presenting interaction options. The teacher and the participants can choose specific music with adjustable speed. The researcher did interviews during the initial test and field study. During…
Read MoreUse of Unmanned Aerial Vehicles in Aircraft Inspection
The article further extends the researched issue of the unmanned aircraft use in the pre-flight and post-flight visual check of aircraft. Procedures of pre-flight inspection are fulfilled by the aircraft maintenance certified staff or the crew member before flight. The process is similar for all categories of aircraft, but its implementation differs for individual specific…
Read MoreBlockchain-Based Decentralized Digital Self-Sovereign Identity Wallet for Secure Transaction
Blockchain (BC) as the widespread innovations in the 21st century has recognized itself to be immutable, tamper-resistant, decentralize and secure. This emerging technology is used as a functional technology for refining present technology and forming new applications for its robustness and disintermediation. Decentralized Digital Self-Sovereign Identity (DDSSI) is an identity mapped with individual identity information…
Read MorePerformance Evaluation of Convolutional Neural Networks (CNNs) And VGG on Real Time Face Recognition System
Face Recognition (FR) is considered as a heavily studied topic in computer vision field. The capability to automatically identify and authenticate human’s faces using real-time images is an important aspect in surveillance, security, and other related domains. There are separate applications that help in identifying individuals at specific locations which help in detecting intruders. The…
Read MoreLED Lighting and the Impact on the PLC Channel
Light Emitting Diode (LED) lamps are used as a replacement of “old-fashioned” or incandescent lighting sources, as they reduce the amount of energy consumed. As a side-effect of more efficient energy usage they produce electrical noise. This noise reduces the efficiency of information signal transfer when Power Line Communications (PLC) are used. This study focuses…
Read MoreFrequency Scaling for High Performance of Low-End Pipelined Processors
In the Internet of Things era it is expected that low-end processor domination of the embedded market will be further reaffirmed. Then, a question will arise, on whether it is possible to enhance performance of such processors without the cost of high-end architectures. In this work we propose a better-than-worst-case (BTWC) methodology which enables the…
Read MoreA Novel Approach for Evaluating Eddy Current Loss in Wind Turbine Generator Step-Up Transformers
South Africa is aiming to achieve a generation capacity of about 11.4GW through wind energy systems, which will contribute nearly 15.1% of the country’s energy mix by 2030. Wind energy is one of the principal renewable energy determinations by the South African government, owing to affluent heavy winds in vast and remote coastal areas. In…
Read MoreSurvey of Agent-Based Simulations for Modelling COVID-19 Pandemic
On the 11th of March 2020, the World Health Organization (WHO) declared COVID-19 as a pandemic. Part of controlling measures of the pandemic is to understand the disease’s trajectories. There are several possible interventions that can prevent and control its spread. Determining an optimal strategy is critical for policymakers to understand the impact of different…
Read MoreAnalyzing the Adoption of E-payment Services in Smart Cities using Demographic Analytics: The Case of Dubai
This paper is an extension of previous research that has been done on factors affecting digital payment adoption in the UAE. This study focuses on analyzing which relevant demographic factors affect new e-payment technologies, mainly in the smart city Dubai, with more complexities and dynamics of variables that affect users’ behavior toward adopting new technologies.…
Read MoreAutomatic Comprehension and Summarisation of Legal Contracts
Contracts may range from a simple agreement between a tenant and a landlord or a gym contract, or it could be as important as an employment or marital contract. No matter the level of importance, individuals are legally obligated to obey and carry out all clauses in the contract. In this paper, we have identified…
Read MoreEvaluation of Personal Solar UV Exposure in a Group of Italian Dockworkers and Fishermen, and Assessment of Changes in Sun Protection Behaviours After a Sun-Safety Training
Solar ultraviolet radiation (UVR) is considered a relevant health risk for the workers of the maritime and port sectors, but scant data are available on actual exposure measured using personal dosimeters. Moreover, in outdoor workers sun protection habits are usually poor, while some promising data suggest that sun-safety campaigns can be effective in increasing self-protection…
Read MoreDeaf Chat: A Speech-to-Text Communication Aid for Hearing Deficiency
Hearing impairments have a negative impact in the lives of individuals living with them and those around such individuals. Different applications and technological tools have been developed to help reduce this negative impact. Most mobile applications that have been developed that use Speech-to-Text technology have been inconsistent such that they are not inclusive of all…
Read More
