Results (468)
Search Parameters:
Keyword: BERA Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning
With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. Cyberbullying is affecting a lot of children around the world, especially Arab countries. Thus concerns from cyberbullying are rising. A lot of research is ongoing with the purpose of diminishing…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read MoreFactors Affecting the Adsorption of Trivalent Chromium Ions by Activated Carbon Prepared from Waste Rubber Tyres
Economic gains are generally the outcome of industrialization and consequently urbanization. However, positive fiscal index generates a negative impact on natural environment sources heaving pollutant burden on soil, air and water. Industries throw tones of contaminated water into soil and water bodies without proper treatment and create a potential threat for both living and non-living…
Read MoreAnalytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs
A Linear Wireless Sensor Network (LWSN) is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be…
Read More10 Gbps Full Duplex Cost Effective Architecture GPON Network with Single Fiber
In this paper, a full duplex Gigabit Passive Optical Network (GPON) architecture supporting 10Gbps data transmission through single fiber cable network is proposed and demonstrated. A Non Return to Zero Differential Phase Shift Keying (NRZ-DPSK) is utilized for downstream and re-modulate the downstream signal using intensity modulator (on-off keying OOK) in Return to Zero (RZ)…
Read MoreCompressive Strength of Cement Mortar blended with Coconut Fibers and Human Hair
Mortar is used all over the world for construction purpose. It consists of cement paste and fine aggregates and admixtures if required are also incorporated to modify some of its properties. In this study coconut fibers and human hair were used as an additive materials in the mortar and its effects on compressive strength of…
Read MoreCIRB-Edge for Secure, Energy-Efficient, and Real-Time Edge Computing
In this work, we present CIRB-Edge, a novel integer compression method designed specifically to overcome the limitations of traditional techniques such as Huffman coding, Delta encoding, and dictionary-based algorithms. These legacy methods often fall short in meeting the stringent requirements of secure, energy-efficient, and real-time edge computing due to their high computational overhead, memory demands,…
Read MoreComplete System and Interactions of MMF Harmonics in a Squirrel Cage Induction Motor; Differential Leakage; Analytic Calculation
The importance of MMF space harmonics in squirrel-cage induction motors has been recognized in the literature since the beginning. Their details have been analyzed over the years, but only partly systematized. In this article, however, not only the origin and the entire system of that harmonics are described, but also their interaction causing the asynchronous…
Read MoreThe First Study on Ionospheric Peak Variability over Equatorial Africa (COSMIC-2)
In regions like the African equatorial region, where ground-based sensors like ionosondes and incoherent scatter radars are limited, satellite-based radio occultation (RO) observations offer a new alternative for ionospheric data collecting and optimization. Using RO measurements from the mostly newly launched COSMIC-2 (Constellation Observing System for Meteorology, Ionosphere, and Climate-2) mission, hence, the equatorial Africa,…
Read MoreA Review of Natural Language Processing Techniques in Under-Resourced Languages
Natural language processing (NLP) techniques have transformed a number of tasks in the modern age of information explosion where millions of gigabytes of data are generated every day. Despite achieving state-of-the-art performance in high-resource languages, current techniques struggle with processing under-resourced languages which are characterized by data scarcity, linguistic diversity, computational limitations, ambiguity of language…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreEvaluation of a Classroom Support System for Programming Education Using Tangible Materials
In recent years, the utilization of tangible educational materials has attracted attention on educational settings. They provide hands-on learning experiences for beginners. This trend is especially notable in the field of programming education. Such educational materials are employed in many institutions worldwide. They liberate learners of programming from programming languages that are confined in a…
Read MoreEnergy Management Policy and Strategies in ASEAN
This research analyses the challenges faced by ASEAN countries in managing its energy efficiencies and resources due to rapid economic growth, increasing energy demand, and diverse energy infrastructures across member states. This paper explores the energy management policies and strategies within the ASEAN region, focusing on the integration of energy efficiency measures, renewable energy initiatives,…
Read MoreEffectiveness of a voice analysis technique in the assessment of depression status of individuals from Ho Chi Minh City, Viet Nam: A cross-sectional study
The Mind Monitoring System (MIMOSYS) is a novel voice analysis technique for mental health assessment that has been validated in some languages; however, no research has been conducted on the Vietnamese yet. This study aimed to examine the ability of the Vitality score extracted from the MIMOSYS system to assess depression status based on the…
Read MoreOn Mining Most Popular Packages
In this paper, we will discuss two algorithms to solve the so-called package design problem, by which a set of queries (referred to as a query log) is represented by a collection of bit strings with each indicating the favourite activities or items of customers. For such a query log, we are required to design…
Read MoreGPT-Enhanced Hierarchical Deep Learning Model for Automated ICD Coding
In healthcare, accurate communication is critical, and medical coding, especially coding using the ICD (International Classification of Diseases) standards, plays a vital role in achieving this accuracy. Traditionally, ICD coding has been a time-consuming manual process performed by trained professionals, involving the assignment of codes to patient records, such as doctor’s notes. In this paper,…
Read MoreAn Adaptive Heterogeneous Ensemble Learning Model for Credit Card Fraud Detection
The proliferation of internet economies has given the corporate world manifold advantages to businesses, as they can now incorporate the latest innovations into their operations, thereby enhancing ease of doing business. For instance, financial institutions have leveraged credit card usage on the aforesaid proliferation. However, this exposes clients to cybercrime, as fraudsters always find ways…
Read MoreSpatial Distribution Patterns of the Royal Development Projects Initiated by King Rama 9th of Thailand
The study aimed to create a chronological overview of the royal development projects initiated by King Rama IX and to analyze their spatial distribution patterns. The research used a mixed-methods approach, combining quantitative and qualitative data collection methods such as obtaining data from relevant offices, internet research, and field observations. Data analysis involved descriptive statistics…
Read MoreDevelopment of a GSM-RC Automated Device for Measuring Mobile Communication Signal Strength and Meteorological Parameters
The automated Global System for Mobile Communication Signal Strength and Radio Climatological (GSM-RC) measuring device is an integration of different electronic sensors in a box for an in-situ measuring system. The sensor, data logging, and communication subsystems are integrated for transmitting information on meteorological parameters (MPs) and GSM signal strength level (SSL). The goal is…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreEnhancing Compressive Strength of Pervious Concrete for Use as Pavement Layer in Urban Roads Aper
South African Drainage and Stormwater Systems in urban roads has been of great concern, more so with recent flash floods in Gauteng and KwaZulu Natal Province in South Africa. Pervious concrete can be used to mitigate these challenges for urban roads. Pervious concrete is a concrete that contains no fines or only a small amount…
Read MoreStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreDual Mode Control of an Inverted Pendulum: Design, Analysis and Experimental Evaluation
We present an inverted pendulum design using readily available V-slot rail components and 3D printing to construct custom parts. To enable the examination of different pendulum characteristics, we constructed three pendulum poles of different lengths. We implemented a brake mechanism to modify sliding friction resistance and built a paddle that can be attached to the…
Read More
