Results (798)
Search Parameters:
Keyword: FACBuilding an Efficient Alert Management Model for Intrusion Detection Systems
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…
Read MoreModels accounting for the thermal degradation of combustible materials under controlled temperature ramps
The purpose of this conference is to present and analyze di_erent models accounting for the thermal degradation of combustible materials (biomass, coals, mixtures…), when submitted to a controlled temperature ramp and under non-oxidative or oxidative atmospheres. Because of the possible rarefaction of fossil fuels, the analysis of di_erent combustible materials which could be used as…
Read MoreCyclical Wave Bolt for Sound Waves in a Gas Stream
This article is devoted to the problem of blocking the propagation of sound in a gas stream. This can be useful in the problems of pipeline acoustics and the design of automotive silencers, when it is necessary to ensure the opacity of the boundary (cross section of the pipe) for sound simultaneously with the free…
Read MoreA Study on Isomorphic Properties of Circulant Graphs
denotes circulant graph of order for a set where Circulant graph is said to have the Cayley Isomorphism (CI) property if whenever is isomorphic to , there is some for which . In this paper, isomorphic properties of circulant graphs that includes Self-complementary circulant graphs; Type-2 isomorphism, a new type of isomorphism other than already known Adam’s isomorphism of circulant graphs and Cartesian product and factorization of…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreSteel heat treating: mathematical modelling and numerical simulation of a problem arising in the automotive industry
We describe a mathematical model for the industrial heating and cooling processes of a steel workpiece representing the steering rack of an automobile. The goal of steel heat treating is to provide a hardened surface on critical parts of the workpiece while keeping the rest soft and ductile in order to reduce fatigue. The high…
Read MoreNumerical evaluation of ABS parts fabricated by fused deposition modeling and vapor smoothing
The automotive industry has focused to use polymer materials in order to increase energy efficiency. So, the industry pays attention to use 3D printing technologies using several polymers. Among several 3D printer technologies, fused deposition modeling (FDM) is one of the popular 3D printing technologies due to an inexpensive extrusion machine and multi-material printing. FDM…
Read MoreA Relational Database Model and Tools for Environmental Sound Recognition
Environmental sound recognition (ESR) has become a hot topic in recent years. ESR is mainly based on machine learning (ML) and ML algorithms require first a training database. This database must comprise the sounds to be recognized and other related sounds. An ESR system needs the database during training, testing and in the production stage.…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreSmartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches
Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…
Read MoreApplication of Computational Fluid Dynamics Model in High-Rise Building Wind Analysis-A Case Study
Over the years, wind loading codes has been a crucial tool in determining design wind loads on buildings. Due to the limitations of these codes especially in height, wind tunnel testing is recommended as the best approach in predicting wind flow around buildings but carrying out wind tunnel testing in the preliminary as well as…
Read MoreBig Data Analytics for Healthcare Organization: A Study of BDA Process, Benefits and Challenges of BDA
Day by day, data grows exponentially large using advanced technology and it requires effective analytical techniques to analyze the unknown and useful facts, patterns, associations and new trends which will provide new way for giving treatment to diseases and to provide good quality healthcare at low cost for everyone. This paper describes uncover valuable insights,…
Read MoreA novel beamforming based model of coverage and transmission costing in IEEE 802.11 WLAN networks
IEEE 802.11 WLAN indoor networks face major inherent and environmental issues such as interference, noise, and obstacles. At the same time, they must provide a maximal service performance in highly changing radio environments and conformance to various applications’ requirements. For this purpose, they require a solid design approach that considers both inputs from the radio…
Read MoreMonitoring power breakers using vibro acoustic techniques
Speaking about the commutation’s equipment, it can be said that the best solution in increasing reliability and lowering the maintenance costs is a continuous monitoring of the equipment. However, if the price/quality ratio is considered, it is obvious that, for the moment, the diagnosis can be also an acceptable solution. Nowadays the predictive maintenance for…
Read MoreFinite Element Modeling for Wind Response of Aluminum Wall Cladding in Tall Building
This paper analyzed wind loading responses of Aluminum Wall cladding panels in Tall Building using Ikeja Lagos State Nigeria. The wind loads were calculated according to Standard and Specification From BS6399-2:1997 Using the wind speed data of Lagos state Nigeria and finite element analysis, we predicted the responses of these Aluminum wall Cladding panels to…
Read More1-D Wavelet Signal Analysis of the Actuators Nonlinearities Impact on the Healthy Control Systems Performance
The objective of this paper is to investigate the use of the 1-D wavelet analysis to extract several patterns from signals data sets collected from healthy and faulty input-output signals of control systems as a preliminary step in real-time implementation of fault detection diagnosis and isolation strategies. The 1-D wavelet analysis proved that is an…
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read MoreA prospective design of a social assistive electronic system for the elderly
Aging is a natural process that progressively introduces limitations in a person’s life, which can have dramatic effects on the person’s lifestyle and wellbeing and in most cases is related to the strength of the person’s social bonds with the family and friends group. Therefore, it is important to maintain these bonds in the various…
Read MoreA Reliable, Non-Invasive Approach to Data Center Monitoring and Management
Recent standards, legislation, and best practices point to data center infrastructure management systems to control and monitor data center performance. This work presents an innovative approach to address some of the challenges that currently hinder data center management. It explains how monitoring and management systems should be envisioned and implemented. Key parameters associated with data…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MoreClean Energy Use for Cloud Computing Federation Workloads
Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing…
Read MoreLookup Tables-based mean level detection of spatially distributed targets in non Gaussian clutter
In this paper, Constant False Alarm Rate (CFAR) detection of spatially distributed targets embedded in compound Gaussian clutter with Inverse Gamma texture is addressed. By taking into account the fact that clutter parameters are unknown in practical situations, we propose mean level based on Lookup Tables detectors, that operate as a two-step approach, which consists…
Read MoreSystem for the Automatic Estimation of the Tilt Angle of a Flat Solar Collector
In this work, a compact system for the automatic estimation of the tilt angle at any location of the world is presented. The system components are one computer, one GPS receiver and one Python program. The tilt angle is calculated through the maximization of the flux of direct radiation incident upon a flat solar collector.…
Read MoreEmbedded C Programming Using FRDM to Enhance Engineering Students’ Learning Skill
Computer programming course that utilizes languages such as C/C++ is always packed with dreary syntax details that consume most of the students’ learning time to obtain ‘grammatically’ correct source code. Consequently, it is difficult for most of the students to apply the theory they have learned in a real life context. Thus, this project proposed…
Read MoreScalability Dilemma and Statistic Multiplexed Computing — A Theory and Experiment
The For the last three decades, end-to-end computing paradigms, such as MPI (Message Passing Interface), RPC (Remote Procedure Call) and RMI (Remote Method Invocation), have been the de facto paradigms for distributed and parallel programming. Despite of the successes, applications built using these paradigms suffer due to the proportionality factor of crash in the application…
Read More
