Results (44)
Search Parameters:
Keyword: ProtectionA Toolkit for the Automatic Analysis of Human Behavior in HCI Applications in the Wild
Nowadays, smartphones and laptops equipped with cameras have become an integral part of our daily lives. The pervasive use of cameras enables the collection of an enormous amount of data, which can be easily extracted through video images processing. This opens up the possibility of using technologies that until now had been restricted to laboratories,…
Read MoreEssential Features/Issues of a Multi-Phase Switching Synchronous Buck Regulator
This paper addresses essential features/issues and proposes solutions that would improve the overall performance of a multi-phase buck converter. Low efficiency at light load is addressed with phase shedding, load fast transient and regulated output voltage spiking/dipping is addressed with novel helper technique at the point of load (output node). An Integrated current sensing is…
Read MoreCase Study to Determine the Causes of Fire in Agriculture
The aim of this paper is to identify a critical link in the man – machine – environment system in the case of an adverse event, such as a hay baling fire, based on a comprehensive risk assessment method. The rate of spread of fires in agriculture depends on meteorological conditions, with large areas affected…
Read MoreDesign of Aerial Panoramic Photography: Contrast between Industrialized and Natural Zones
This study utilized aerial panoramic photography and 3D virtual reality to demonstrate the environmental changing issues. Environmental problems have occurred in the surroundings for a long time, but the public has gradually become numb. The wide view through aerial photography helps to show the difference. The proposed self-assembled drone equipped with an antishock bracket containing…
Read MoreMachine Learning for Network Intrusion Detection Based on SVM Binary Classification Model
Recently, the number of connected machines around the worldwide has become very large, generating a huge amount of data either to be stored or to be communicated. Data protection is a concern for all institutions, it is difficult to manage the masses of data that are susceptible to multiple threats. In this work, we present…
Read MoreA Support Vector Machine Based Technique for Fault Detection in A Power Distribution Integrated System with Renewable Energy Distributed Generation
The integration of renewable energy distributed generation (REDG) into the energized distribution power grid has become more popular in recent years. This has been escalated by the general global energy shortages. The REDG has proven to be effective for energy sustainability and reliability. However, there are technical challenges which arise from integrating REDG into the…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreComparison of the RC-Triggered MOSFET-Based ESD Clamp Circuits for an Ultra-low Power Sensor System
This paper uses the RC-triggered MOSFET-based electrostatic discharge (ESD) power clamp to conduct ESD from ESD events and not affect the ultra-low power sensor system. Then using the stacked device include stacked MOSFET or stacked BJT to reduce the leakage current which increases with temperature. Moreover, we compare gate-driven method and two-level–driven with both gate-driven…
Read MoreA Framework for Plans Permeable Breakwater Eco-Friendly Building Identification and Characteristics Materials Construction Study Case at Demak Village
Demak is located on the north coast of Java, precisely in Central Java Province, Indonesia which has many problems related to erosion and shoreline degradation. This study attempts to analyze, identify, and select the materials to build eco-friendly permeable breakwater in Demak. The research was conducted during 2014, consist of several activities, i.e. identified the…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read MoreNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read MoreEnabling 3D Heterogeneous Structures Towards Smart Chips: A Review
This review paper discusses recent research outcomes of fabricating three-dimensional (3D) heterogeneous structures in complementary metal-oxide-semiconductor (CMOS) integrated circuit (IC) technologies to enable smart future chips. The CMOS-based 3D heterogeneous structures demonstrated are vertical magnetic-cored inductors for radio-frequency (RF) ICs, through-back-end-of-line (BEOL) metal wall structures for global flying noise isolation, above-IC nano crossbar array electrostatic…
Read MoreEffectiveness and Comparison of Digital Substations Over Conventional Substations
The entire electrical system is changing at an abrupt speed since its beginning. With the rapid advance of renewable energies (which are constantly subject to fluctuations), the electricity generation is distributed to countless locations. The traditional model of the unidirectional flow of electricity is leaning towards multidirectional flows. This situation needs significant changes in the…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreAdaptation of Electronic Book Publishing Technology by The Publishers in Southeast Nigeria
This paper investigates the electronic book production and distribution practices adopted by the Publishers in Southeast Nigeria because of the global growing interest in writing new book titles in digital form as well as converting paper titles to digital content. To investigate this study, the researcher formulated three research questions to guide the study. A…
Read MoreEvolving AL-FEC Application on 5G NGMN-Edge Computing Systems
Fifth generation of mobile networks (5G) comes to cope with the context of the new mobile telecommunications era. Edge computing is a new collaborative technology under standardization utilizing end-user devices or near-end-user edge devices to operate processing, communication, or control operations. The achievement of efficient error control is a very critical aspect in the successful…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read More
