Results (880)
Search Parameters:
Keyword: ICIImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreStudy of Wrinkling and Thinning Behavior in the Stamping Process of Top Outer Hatchback Part on the SCGA and SPCC Materials
The objective of the research is to determine the changes in wrinkling and thinning behavior in the stamping process of the top outer hatchback. The study was conducted using two types of materials, i.e., SCGA (Steel Cold rolled Galvanized Annealed) and SPCC (Steel Plate Cold rolled Coiled) with a thickness of 0.80 mm. During the…
Read MoreA Review on Autonomous Mobile Robot Path Planning Algorithms
The emerging trend of modern industry automation requires intelligence to be embedded into mobile robot for ensuring optimal or near-optimal solutions to execute certain task. This yield to a lot of improvement and suggestions in many areas related to mobile robot such as path planning. The purpose of this paper is to review the mobile…
Read MoreEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreMachine Learning Model to Identify the Optimum Database Query Execution Platform on GPU Assisted Database
With the current amount of data nowadays, the need for processing power has vastly grown. By relying on CPU processing power, current processing power is depending on the frequency and parallelism of the current CPU device. This means this method will lead to increased power consumption. Current research has shown that by utilize the power…
Read MoreAutomated Abaca Fiber Grade Classification Using Convolution Neural Network (CNN)
This paper presents a solution that automates Abaca fiber grading which would help the time-consuming baling of Abaca fiber produce. The study introduces an objective instrument paired with a system to automate the grade classification of Abaca fiber using Convolutional Neural Network (CNN). In this study, 140 sample images of abaca fibers were used, which…
Read MorePiezoelectric Teeth Aligners to Accelerate Orthodontics Treatment
In this paper, we are proposing a device that generates vibration to possibly reduce the duration required for the orthodontic treatment by enhancing the tooth movement. This is achieved by harmonically exciting a bio-compatible material, namely polyvinylidene fluoride (PVDF) to generate vibration and consequently a cyclic force at a low frequency of 30 Hz. (PVDF)…
Read MoreDigestibility, Digestible and Metabolizable Energy of Earthworm Meal (Eisenia Foetida) Included in Two Levels in Guinea Pigs (Cavia Porcellus)
The increasing cost of fishmeal and soybean meal forces us to look for unconventional sources of protein to feed guinea pigs, being able to use earthworm meal Eisenia foetida (EF) with 60-80% high quality raw protein; for this, the contribution of digestible nutrients and metabolizable energy must be known to formulate rations. The objective is…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreA Perturbation Finite Element Approach for Correcting Inaccuracies on Thin Shell Models with the Magnetic Field Formulation
This research makes the improvement of the errors surrounding edges and corners of thin electromagnetic regions by means of the magnetic field finite element formulation. Classical thin shell electromagnetic models are usually replaced by impedance-type interface conditions throughout surfaces that ignore errors in the calculation of the local fields (magnetic vector potentials, magnetic fields, eddy…
Read MoreAnalysis and Improvement of an Innovative Solution Through Risk Reduction: Application to Home Care for the Elderly
The increase in the number of elderly people requires multiple efforts to maintain their well-being and health. A wide variety of products and services have been created to enable seniors to live at home for as long as possible. The market success of these solutions depends on acceptance by the different stakeholders. Older people are…
Read MoreAlternative Real-time Image-Based Smoke Detection Algorithm
Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…
Read MorePersonality Measurement Design for Ontology Based Platform using Social Media Text
Human behavior quantification is an essential part of psychological science. One of the cases is measuring human personality. Social media provide rich text, which can be beneficial as a data source to get valuable insight. Previous researches show that social media offered favorable circumstances for psychological researchers by tracking, analyzing, and predicting human character. In…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreUsing Leader Election and Blockchain in E-Health
The development of electronic healthcare systems requires to adopt modern technologies and architectures. The use of Electronic Personal Health Record (E-PHR) should be supported by efficient storage such as cloud storage which enables more security, availability and accessibility of patients’ records. Actually, the increase of availability of E-PHR enhances parallel access, which improves the performance…
Read MoreLow Carbon Sustainable Building Material: Maximizing Slag Potentials for Improved Lime Mortar Mechanical Properties
Prior to the 19th century discovery of Portland Cement (PC), Lime Based Mortar remained popular due to its flexibility, permeability and more importantly, associated low carbon emissions. However, lime’s characteristic delayed setting/hardening time, low mechanical strength, poor internal cohesion and some volumetric changes have overshadowed significance of its outstanding features particularly, flexibility, and consequently put…
Read MoreMobile Based for Basic English Learning Assessment with Augmented Reality
Nowadays Augmented Reality (AR) is very popular in teaching and learning, especially in leading student to observe learning material targets which supported by online learning resources using mobile device and wireless technology. Because English is a foreign language, most students have problems in learning English. Generally, their problems were related to low motivation, bad study…
Read MoreLegal Regulation as Driver for Sustainable Development of Nigeria’s Solid Mineral Sector
The need to optimally explore Nigeria’s diverse mineral resource endowments via sustainable value chain practices has, in recent times, been the focus of the Nigerian government and relevant stakeholders. This development has amongst other things, been made a necessity since the decline in Nigeria’s crude oil export and earnings, as well as the increased effort…
Read MoreA Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques
Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…
Read MoreComparison of the RC-Triggered MOSFET-Based ESD Clamp Circuits for an Ultra-low Power Sensor System
This paper uses the RC-triggered MOSFET-based electrostatic discharge (ESD) power clamp to conduct ESD from ESD events and not affect the ultra-low power sensor system. Then using the stacked device include stacked MOSFET or stacked BJT to reduce the leakage current which increases with temperature. Moreover, we compare gate-driven method and two-level–driven with both gate-driven…
Read MoreEvaluation of Vapor Jet Refrigeration Cycle Driven by Solar Thermal Energy for Air Conditioning Applications: Case Study
The need for air conditioning in rural areas where there is no source of electricity, leads to look for alternative solutions. Usage of Solar thermal system drive vapor jet refrigeration cycle (VJRC) instead of the traditional air conditioning systems, contributes in the reduction of the Global Worming and Ozone Depletion. The main objective of this…
Read MoreStatistical Aspects of the Environment of Albanian Students Who Were Admitted to Higher Public Education Institutions in the Year 2014
The research presents a statistical analysis that characterize the environment of the admitted students to Higher Public Education Institutions, by providing an overview of student’s distribution to the courses of studies offered by universities in Albania, such as, economy, medicine, technical etc., and grouping them according to the relative density of 38 (thirty eight) administrative…
Read MoreAn ISO 25010 Based Quality Model for ERP Systems
Higher Education Institutions (HEIs) have begun rapidly adopting, selecting and implementing ERP systems due to the call by various governments to streamline their processes and practices. While ERPs are expanding at much faster rate, there is pressure on most HEIs to ensure quality. For quality model, ISO/IEC 25010 is an international standard for software and…
Read MoreSecuring Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model
In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…
Read MoreApproach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection
Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…
Read More
