Results (1611)
Search Parameters:
Keyword: UseApplications of Causal Modeling in Cybersecurity: An Exploratory Approach
Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…
Read MoreA Model for Operationalizing the Information Technology Strategy Based on Structuration View
Many organisations adopt and implement information technology (IT) but fail to operationalise it. As a result, the process of implementation is continually repeated without achieving the goals and objectives, which are often to gain competitive advantage and sustainability. This study employs structuration theory as lens to examine and understand the factors that influence operationalisation of…
Read MoreDesign and Optimization of Dual-Band Branch-Line Coupler with Stepped-Impedance-Stub for 5G Applications
This paper presents a design optimization of a dual-band branch-line coupler with stepped-impedance-stub lines. This coupler operates over 5G NR frequency bands n5 and n2, developed by 3GPP for the 5G (fifth generation) mobile network, and these two bands are centered at 0.85 GHz and 1.9 GHz respectively. To achieve the design specifications an adjusted…
Read MoreSentence Retrieval using Stemming and Lemmatization with Different Length of the Queries
In this paper we focus on Sentence retrieval which is similar to Document retrieval but with a smaller unit of retrieval. Using data pre-processing in document retrieval is generally considered useful. When it comes to sentence retrieval the situation is not that clear. In this paper we use TF-ISF (term frequency – inverse sentence frequency)…
Read MoreBalance as One of the Attributes in the Customer Segmentation Analysis Method: Systematic Literature Review
The banking industry is very competitive. To utilize the information, they have in order to be a competitive advantage winner is reasonably very crucial for the company. At present, the company does not only focus on the company’s strategy that prioritizes products (e.g. product or service oriented), however also necessitates to focus on the company’s…
Read MoreANN Based MRAC-PID Controller Implementation for a Furuta Pendulum System Stabilization
Nowadays, process automation and smart systems have gained increasing importance in a wide variety of sectors, and robotics have a fundamental role in it. Therefore, it has attracted greater research interests; among them, Underactuated Mechanical Systems (UMS) have been the subject of many studies, due to their application capabilities in different disciplines. Nevertheless, control of…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreMultimode Control and Simulation of 6-DOF Robotic Arm in ROS
The paper proposes the design and simulation of a 6 Degree of Freedom (DOF) robotic arm, tailored for the coconut crop harvesting, assistive robots like wheelchairs and Home robots, Search and rescue robots for disastrous environments, Collaborative robots for research use. A kinematics-based solution has been developed for the robotic arm which makes it easier…
Read MoreAnalysis of Local Rainfall Characteristics as a Mitigation Strategy for Hydrometeorology Disaster in Rain-fed Reservoirs Area
The Gembong reservoir in Pati Regency, Java, Indonesia is a rain-fed reservoir, which experiences a depletion of it carrying capacity. The characteristic of local rainfall is one of the important factors in assessing the potential of hydrometeorology disasters in its area. Sedimentation in watersheds and reservoirs has covered water sources, so local rainfall determines the…
Read MoreController Design Using Backstepping Algorithm for Fixed-Wing UAV with Thrust Vectoring System
This paper describes the design method of a nonlinear flight controller for a fixed-wing UAV with a thrust vectoring system (TVS) using the backstepping method. The flight dynamics of the UAV exhibits strong nonlinear coupling behavior between its translational and rotational motion. The backstepping algorithm has been successfully applied to controller design for such a…
Read MoreAngular Orientation of Steering Wheel for Differential Drive
Several drive mechanisms for different robots are at hand in current days. Bicycle steering, Ackerman steering, differential drive are some principal drive mechanisms that are being deployed in robots these days. The differential drive needs the wheel rotations to be updated very frequently. But it is most commonly deployed on the robots with two wheels…
Read MoreDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreTrajectory Tracking Control of a DC Motor Exposed to a Replay-Attack
This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreStudy of Wrinkling and Thinning Behavior in the Stamping Process of Top Outer Hatchback Part on the SCGA and SPCC Materials
The objective of the research is to determine the changes in wrinkling and thinning behavior in the stamping process of the top outer hatchback. The study was conducted using two types of materials, i.e., SCGA (Steel Cold rolled Galvanized Annealed) and SPCC (Steel Plate Cold rolled Coiled) with a thickness of 0.80 mm. During the…
Read MoreA Review on Autonomous Mobile Robot Path Planning Algorithms
The emerging trend of modern industry automation requires intelligence to be embedded into mobile robot for ensuring optimal or near-optimal solutions to execute certain task. This yield to a lot of improvement and suggestions in many areas related to mobile robot such as path planning. The purpose of this paper is to review the mobile…
Read MoreEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreAutomated Abaca Fiber Grade Classification Using Convolution Neural Network (CNN)
This paper presents a solution that automates Abaca fiber grading which would help the time-consuming baling of Abaca fiber produce. The study introduces an objective instrument paired with a system to automate the grade classification of Abaca fiber using Convolutional Neural Network (CNN). In this study, 140 sample images of abaca fibers were used, which…
Read MoreFactors Influencing Social Knowledge Management in Social Society: A Systematic Literature Review
Knowledge is important now for the development of social society; it is necessary for knowledge management. Knowledge management (KM) aims to support the creation, transfer, and application of knowledge in social societies. This fact illustrates that in the management of social knowledge, the role of social communities is very important and is influenced by factors…
Read MorePiezoelectric Teeth Aligners to Accelerate Orthodontics Treatment
In this paper, we are proposing a device that generates vibration to possibly reduce the duration required for the orthodontic treatment by enhancing the tooth movement. This is achieved by harmonically exciting a bio-compatible material, namely polyvinylidene fluoride (PVDF) to generate vibration and consequently a cyclic force at a low frequency of 30 Hz. (PVDF)…
Read MoreDigestibility, Digestible and Metabolizable Energy of Earthworm Meal (Eisenia Foetida) Included in Two Levels in Guinea Pigs (Cavia Porcellus)
The increasing cost of fishmeal and soybean meal forces us to look for unconventional sources of protein to feed guinea pigs, being able to use earthworm meal Eisenia foetida (EF) with 60-80% high quality raw protein; for this, the contribution of digestible nutrients and metabolizable energy must be known to formulate rations. The objective is…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreAnalysis and Improvement of an Innovative Solution Through Risk Reduction: Application to Home Care for the Elderly
The increase in the number of elderly people requires multiple efforts to maintain their well-being and health. A wide variety of products and services have been created to enable seniors to live at home for as long as possible. The market success of these solutions depends on acceptance by the different stakeholders. Older people are…
Read MoreNon Parallelism and Cayley-Menger Determinant in Submerged Localization
This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…
Read MoreSocioeconomic and Productive Disparity in Child Stunting in the Central Andes of Peru, Taking as a Model the Community of Tunanmarca, Jauja
The differences of stunting through socio-economic and productive indicators in high Andean community of Peru were evaluated ((11°42′58.16′′ S, 75°37′31.13′′ W, altitude 3470 m). Cross-sectional study in 52 mothers with children under 5 years old was carried. A validated nutritional survey was applied. Z-scores height for age and nutritional status were determined using anthropometric methods…
Read More
