Results (2356)
Search Parameters:
Keyword: SEPromotion of the Research Activities at the Image Processing Research Laboratory (INTI-Lab) of the UCH as Knowledge Management Strategy
In Peru, approximately since 2013, a necessary change has begun in the importance given to research, science, technology, and technological innovation. Likewise, in 2014, a new University Law was approved that among other aspects also promotes research production in universities. Against this context, the universities begin to improve with more emphasis activities related to research.…
Read MoreEfficient Discretization Approaches for Machine Learning Techniques to Improve Disease Classification on Gut Microbiome Composition Data
The human gut environment can contain hundreds to thousands bacterial species which are proven that they are associated with various diseases. Although Machine learning has been supporting and developing metagenomic researches to obtain great achievements in personalized medicine approaches to improve human health, we still face overfitting issues in Bioinformatics tasks related to metagenomic data…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreMeasurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia
The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…
Read MoreMonte Carlo Estimation of Dose in Heterogeneous Phantom Around 6MV Medical Linear Accelerator
In this work, we completed a validation of the Varian Clinac IX equipped with the High Definition Multi-Leaf Collimator (HD 120 MLC) instead of the removable jaws, using GATE Monte Carlo Platform version 8.2. We validated the multileaf collimator (MLC) geometry by simulating two dosimetric functions (Percentage Depth Dose (PDD) and Dose Profile (DP)), for…
Read MoreDegradation Process in Pipeline and Remaining Useful Lifetime Estimation Based on Extended Kalman Filtering
Degradation measurements are often treated and analyzed for improvement the reliability of system. Our objective in this paper is to study a class of non linear systems, whose dynamics and observations are non linear functions of the state. Obviously, we develop an Extended Kalman Filtering (EKF) algorithm for detecting the additive failures in a two…
Read MoreA Solution Applying the Law on Road Traffic into A Set of Constraints to Establish A Motion Trajectory for Autonomous Vehicle
With a model predictive control approach and to set the motion trajectory for an autonomous vehicle in situations where emergency braking cannot be performed, in this paper, we propose a solution to apply the law on road traffic into a set of constraints and thereby build an objective function to create motion trajectory for autonomous…
Read MorePerformance of Robust Confidence Intervals for Estimating Population Mean Under Both Non-Normality and in Presence of Outliers
We proposed two robust confidence interval estimators, namely, the median interquartile range confidence interval (MDIQR) and the trimean interquartile range confidence interval (TRIQR) for the population mean (µ) as an alternative to the classical confidence interval. The proposed methods are based on the asymptotic normal theorem (ANT) for the sample median (MD) and the sample…
Read MorePrognosis of Failure Events Based on Labeled Temporal Petri Nets
To reduce the risk of accidental system shutdowns, we propose to control system developers (supervisor, SCADA) a prediction tool to determine the occurrence date of an imminent failure event. The existing approaches report the rate of occurrence of a future failure event (stochastic method), but do not provide an estimation date of its occurrence. The…
Read MoreEnhancing Decision Making Capabilities in Humanitarian Logistics by Integrating Serious Gaming and Computer Modelling
The field of humanitarian logistics has in recent times gained an increasing attention from both academics and practitioners communities alike. Although various research groups have addressed theoretical and technical developments in humanitarian logistics using conventional research tools, applied research appears to be often dependent on practitioners’ inputs. This paper is an attempt to fill the…
Read MoreApplications of Causal Modeling in Cybersecurity: An Exploratory Approach
Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…
Read MoreA Model for Operationalizing the Information Technology Strategy Based on Structuration View
Many organisations adopt and implement information technology (IT) but fail to operationalise it. As a result, the process of implementation is continually repeated without achieving the goals and objectives, which are often to gain competitive advantage and sustainability. This study employs structuration theory as lens to examine and understand the factors that influence operationalisation of…
Read MoreSentence Retrieval using Stemming and Lemmatization with Different Length of the Queries
In this paper we focus on Sentence retrieval which is similar to Document retrieval but with a smaller unit of retrieval. Using data pre-processing in document retrieval is generally considered useful. When it comes to sentence retrieval the situation is not that clear. In this paper we use TF-ISF (term frequency – inverse sentence frequency)…
Read MoreEstimation of Influential Parameter Using Gravitational Search Optimization Algorithm for Soccer
Competitive sport has one phenomenal or fundamental aspect of selecting players into playing squad for a game that can influence a Club or a team in almost all major aspects. Various Characteristics or behavioral aspects of players will be instrumental towards the selection of a specific player into a team depending on the nature, level,…
Read MoreBalance as One of the Attributes in the Customer Segmentation Analysis Method: Systematic Literature Review
The banking industry is very competitive. To utilize the information, they have in order to be a competitive advantage winner is reasonably very crucial for the company. At present, the company does not only focus on the company’s strategy that prioritizes products (e.g. product or service oriented), however also necessitates to focus on the company’s…
Read MoreANN Based MRAC-PID Controller Implementation for a Furuta Pendulum System Stabilization
Nowadays, process automation and smart systems have gained increasing importance in a wide variety of sectors, and robotics have a fundamental role in it. Therefore, it has attracted greater research interests; among them, Underactuated Mechanical Systems (UMS) have been the subject of many studies, due to their application capabilities in different disciplines. Nevertheless, control of…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreAnalysis of Local Rainfall Characteristics as a Mitigation Strategy for Hydrometeorology Disaster in Rain-fed Reservoirs Area
The Gembong reservoir in Pati Regency, Java, Indonesia is a rain-fed reservoir, which experiences a depletion of it carrying capacity. The characteristic of local rainfall is one of the important factors in assessing the potential of hydrometeorology disasters in its area. Sedimentation in watersheds and reservoirs has covered water sources, so local rainfall determines the…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreTrajectory Tracking Control of a DC Motor Exposed to a Replay-Attack
This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreMachine Learning Model to Identify the Optimum Database Query Execution Platform on GPU Assisted Database
With the current amount of data nowadays, the need for processing power has vastly grown. By relying on CPU processing power, current processing power is depending on the frequency and parallelism of the current CPU device. This means this method will lead to increased power consumption. Current research has shown that by utilize the power…
Read MoreDigestibility, Digestible and Metabolizable Energy of Earthworm Meal (Eisenia Foetida) Included in Two Levels in Guinea Pigs (Cavia Porcellus)
The increasing cost of fishmeal and soybean meal forces us to look for unconventional sources of protein to feed guinea pigs, being able to use earthworm meal Eisenia foetida (EF) with 60-80% high quality raw protein; for this, the contribution of digestible nutrients and metabolizable energy must be known to formulate rations. The objective is…
Read MoreAlternative Real-time Image-Based Smoke Detection Algorithm
Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…
Read More
