Results (1182)
Search Parameters:
Keyword: ULAVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read MoreBuilding an Efficient Alert Management Model for Intrusion Detection Systems
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…
Read MoreDoubly Nonlinear Parabolic Systems In Inhomogeneous Musielak- Orlicz-Sobolev Spcaes
In this paper, we discuss the solvability of the nonlinear parabolic systems associated to the nonlinear parabolic equation: \(\frac{\partial b_{i}(x,u_{i})}{\partial t} -div(a(x,t,u_{i},\nabla u_{i}))- \phi_{i}(x,t,u_{i})) +f_{i}(x,u_{1},u_{2})=0\) where the function \(b_{i}(x,u_{i})\) verifies some regularity conditions, the term \(\Big(a(x,t,u_{i},\nabla u_{i})\Big)\) is a generalized Leray-Lions operator and \(\phi_{i}\) is a Caratheodory function assumed to be Continuous on \(u_i\) and satisfy only a…
Read MoreExistence and Boundedness of Solutions for Elliptic Equations in General Domains
This article is devoted to study the existence of solutions for the strongly nonlinear \(p(x)\)-elliptic problem: \(- \Delta_{p(x)} (u) + \alpha_0 |u|^{p(x)-2}u = d(x)\frac{|\nabla u|^{p(x)}}{|u|^{p(x)}+1} + f- div g(x) \quad \text{in } \Omega, \) \(u \in W_0^{1,p(x)}(\Omega), \) Where \(\Omega\) is an open set of \(\mathbb{R}^N\), possibly of infinite measure, we will also give some…
Read MoreA new color image encryption algorithm based on iterative mixing of color channels and chaos
In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…
Read More2×1 Microstrip Patch Array Antenna with Harmonic Suppression Capability for Rectenna
This paper is an extension of work originally presented in 2016 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE). A 2×1 microstrip patch array antenna integrated with photonic bandgap (PBG) and stubs is designed and analyzed. The performance of the PBG and stubs structure are explained and analyzed in terms of the elimination of the resonance…
Read MoreEnhancement of Voltage Stability through Optimal Location of UPFC
This paper proposed the identification of the proper placement of UPFC (Unified Power Flow Controller) using a series of methodological numeric simulations to improve voltage stability. For this purpose, the critical zone of the system is determined, then, comparative analyses depending on different emplacements of UPFC are performed. The dynamic model of UPFC and the…
Read MoreHeuristic Based Approach for Voltage Stability Improvement using FACTS Devices
The aim of this paper is to develop a hybrid device for voltage stability enhancement using two kinds of FACTS (Flexible AC Transmission System) namely SVC (Static Var Compensator) and TCSC (Thyristor Controlled Series Capacitor). The idea behind the proposed method is to maintain safe and satisfactory power system operation in a lesser costing manner…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreMeasurement of the Bridge Surface Deflections Using Near-Field Amplitude of Secondary Radiators System
In remote measurements on large-sized objects main focus is on measuring deformations of bridge surfaces and determination of the dynamic amplification factor in particular. The proposed method estimates deflections of entire lower surface of a bridge due to placement of secondary radiators on this surface. Antenna array directivity pattern (ADP) is distorted during deflection of…
Read MoreFault Tolerant Control Based on PID-type Fuzzy Logic Controller for Switched Discrete-time Systems: An Electronic Throttle Valve Application
This paper deals with the problem of Fault Tolerant Control (FTC) using PID-type Fuzzy Logic Controller (FLC) for an Electronic Throttle Valve (ETV) described by a switched discrete-time system with input disturbances and actuator faults. In order to detect the faults, Unknown Input Observers (UIOs) are designed and formulated in terms of Lyapunov theory and…
Read MoreData Exchange Strategies for Aggregating Geographical Distribution of Demands for Location-Dependent Information Using Soft-State Sketches in VANETs
When we drive a car, we often want to know the circumstances of roads between the current location and the destination. Ishihara et al. proposed a Vehicular ad-hoc NETworks (VANET) -based information sharing system, called the Real-Time Visual Car Navigation System, in which a driver can obtain Location-Dependent Information (LDI), such as photographs or videos…
Read MoreMealy-to-Moore Transformation – A state stable design of automata
The paper shows a method of transforming an asynchronously feedbacked Mealy machine into a Moore machine. The transformation is done in dual-rail logic under the use of the RS-buffer. The transformed machine stabilizes itself and is safe to use. The transformation is visualized via KV-diagrams and calculated with formulas. We will present three use-cases for…
Read MoreNumerical evaluation of ABS parts fabricated by fused deposition modeling and vapor smoothing
The automotive industry has focused to use polymer materials in order to increase energy efficiency. So, the industry pays attention to use 3D printing technologies using several polymers. Among several 3D printer technologies, fused deposition modeling (FDM) is one of the popular 3D printing technologies due to an inexpensive extrusion machine and multi-material printing. FDM…
Read MoreLeaf-shaped solar cell antenna for Energy Harvesting and RF Transmission in ku-band
In this paper, a hybrid system solar cell antenna was studied. Our contribution lies in the combination of both optical and radio-frequency signals in a solar cell antenna. Hence, we propose a new method to merge antenna and solar cell. The leaf- shaped patch solar cell antenna was dedicated at a time to the energy…
Read MoreControl of a three-stage medium voltage solid-state transformer
This paper proposes the modeling and control of a Solid-State Transformer using a three-stage conversion topology. First, a rectification stage is used, where a three-phase high-voltage AC signal is converted to a DC level; this stage is then followed by a DC-DC converter, and finally an inverter is used to convert the DC into a…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreA Switched-Capacitor Low-Pass Filter with Dynamic Switching Bias OP Amplifiers
A switched capacitor low-pass filter employing folded-cascode CMOS OP Amps with a dynamic switching bias circuit capable of processing video signals, which enables low power consumption, and operation in wide bandwidths and low power supply voltages, is proposed. In this filter, charge transfer operations through two-phase clock pulses during the on-state period of the OP…
Read MoreDiscovering Interesting Biological Patterns in the Context of Human Protein-Protein Interaction Network and Gene Disease Profile Data
The current advances in proteomic and transcriptomic technologies produced huge amounts of high-throughput data that spans multiple biological processes and characteristics in different organisms. One of the important directions in today’s bioinformatics research is to discover patterns of genes that have interesting properties. These groups of genes can be referred to as functional modules. Detecting…
Read MoreSelective Electron Beam Melting Manufacturing of Electrically Small Antennas
Real estate pressures in modern electronics have resulted in the need for electrically small antennas, which have subsequently garnered interest amongst researchers and industry alike. These antennas are characterized by their largest dimensions translating to a fraction of the operating wavelength; such a diminutive size comes at the expense of reduced gain and efficiency, and…
Read MoreARMA feeding techniques for isoflux coverage from a micro satellite
This paper deals with the design of a new reconfigurable beam antenna used to improve the efficiency of spatial telemetry links on Nano-Satellite. This agile beam antenna is not built on the well-known array concept AESA (Agile Electronically Scanned Array) but using a new one called ARMA (Agile Matrix Radiating Antenna); MARPEM in French. In…
Read MoreSmartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches
Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…
Read MoreApplication of Computational Fluid Dynamics Model in High-Rise Building Wind Analysis-A Case Study
Over the years, wind loading codes has been a crucial tool in determining design wind loads on buildings. Due to the limitations of these codes especially in height, wind tunnel testing is recommended as the best approach in predicting wind flow around buildings but carrying out wind tunnel testing in the preliminary as well as…
Read MoreImproved Hybrid Opponent System for Professional Military Training
Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming.…
Read MoreKalman filter Observer for SoC prediction of Lithium cells
The SoC estimation of Li Ion batteries presents a difficult task for almost applications in order to ensure their higher energy density and their safety. Hence, there have been several methods to optimize the state of charge of the Lithium cells such as observer strategies which have been considered in this work. Kalman filter observer…
Read More
