Results (2356)
Search Parameters:
Keyword: SEEstimating a Minimum Embedding Dimension by False Nearest Neighbors Method without an Arbitrary Threshold
The false nearest neighbors (FNN) method estimates the variables of a system by sequentially embedding a time series into a higher-dimensional delay coordinate system and finding an embedding dimension in which the neighborhood of the delay coordinate vector in the lower dimension does not extend into the higher, that is, a dimension in which no…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreA Machine Learning Model Selection Considering Tradeoffs between Accuracy and Interpretability
Applying black-box ML models in high-stakes fields like criminology, healthcare and real-time operating systems might create issues because of poor interpretability and complexity. Also, model building methods that include interpretability is now one of the growing research topics due to the absence of interpretability metrics that are both model-agnostic and quantitative. This paper introduces model…
Read MoreThe use of Integrated Geophysical Methods to Assess the Petroleum Reservoir in Doba Basin, Chad
Hydrocarbon exploration and production has been successful in the central region of Doba basin, Chad, north-central Africa. In order to optimize the hydrocarbon production in this area, the combination of seismic and well log datas have been processed and analyzed to better characterize, image and capture the reservoirs. The 3D seismic and well log datas…
Read MoreAssessment of Electromagnetic-Based Sensing Modalities for Red Palm Weevil Detection in Palm Trees
In this paper, we investigate the utilization of three effective detection methods to identify potential threats of insects in date palm trees. The detection techniques presented here are the application of infrared radiation, microwave antennas and metamaterials based sensors. Experimental trials using IR radiation took place in a local farm. Moreover, the second sensing system…
Read MoreUsing Dynamic Market-Based Control for Real-Time Intelligent Speed Adaptation Road Networks
Traffic road management is becoming more complex due to limited resources and an increasing number of hybrid vehicles. Currently, a number of global classical computing tools are used to manage the traffic road network. This kind of classical computing is resource intensive and expensive, and in the best case, optimizing a traffic network takes a…
Read MoreLow-cost Smart Basket Based on ARM System on Chip Architecture: Design and Implementation
This paper presents the design and implementation of a low-cost basket based on an ARM system on chip architecture using Raspberry Pi single board computer. The inspiration of this research is how to support the traditional low-income retail store in Thailand driving the local micro-business deal with the economic impacts of survival business from the…
Read MoreA Supervised Building Detection Based on Shadow using Segmentation and Texture in High-Resolution Images
Building detection in aerial or satellite imagery is one of the most challenging tasks due to the variety of shapes, sizes, colors, and textures of man-made objects. To this end, in this paper, we propose a novel approach to extracting buildings in high-resolution images based on prior knowledge of the shadow position. Firstly, the image…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MoreAntenna System Design To Increase Power Transfer Efficiency with NFC Wireless Charging Technology
The NFC wireless charging feature is an extension of the NFC technology that can be implanted on wearables. The purpose of this paper is to show how to increase power transfer efficiency on both transmitter and receiver antenna systems. To demonstrate this problematic, firstly this paper gives an overview of how this NFC feature is…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read MoreA New Technique to Accelerate the Learning Process in Agents based on Reinforcement Learning
The use of decentralized reinforcement learning (RL) in the context of multi-agent systems (MAS) poses some difficult problems. The speed of the learning process for example. Indeed, if the convergence of these algorithms has been widely studied and mathematically proven, they suffer from being very slow. In this context, we propose to use RL in…
Read MoreTowards a Model-based and Variant-oriented Development of a System of Systems
The development of an aggregated system consisting of autonomously developed components is usually implemented as a self-contained unit. If such an aggregation is understood as a system of systems (SoS) that communicates via interfaces with its autonomous subsystems and components, the interfaces and communication exchange should play a central role in the architectural design. In…
Read MoreAnalysis Methods and Classification Algorithms with a Novel Sentiment Classification for Arabic Text using the Lexicon-Based Approach
Social networks have become a valuable platform for tracking and analyzing Internet users’ feelings. This analysis provides crucial information for decision-making in various areas, such as politics and marketing. In addition to this challenge and our interest in the field of big data and sentiment analysis in social networks, we have dedicated this work to…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreInterpretable Rules Using Inductive Logic Programming Explaining Machine Learning Models: Case Study of Subclinical Mastitis Detection for Dairy Cows
With the development of Internet of Things technology and the widespread use of smart devices, artificial intelligence is now being applied as a decision-making tool in a variety of fields. To make machine learning models, including deep neural network models, more interpretable, various techniques have been proposed. In this paper, a method for explaining the…
Read MoreAn Interdisciplinary Approach to Fracture of Solids from the Standpoint of Condensed Matter Physics
Instead of approaches of solid mechanics or a formal description of experimental data an interdisciplinary approach is proposed to consider failure and deformation as thermodynamic processes. Mathematical modeling of the processes is carried out using rheological models of the material. One fracture criterion is used, that formally corresponds to the achievement of a threshold concentration…
Read MoreSolar Energy Assessment, Estimation, and Modelling using Climate Data and Local Environmental Conditions
On Renewable Energy (RE), this field covers the most significant share of the world energy demand and challenges on the expensive measurement and maintenance equipment to be used. In all studies and designs, global solar radiation (GSR) measurements require assessment, estimation, and models to be applied together with the environment and meteorological data on installing…
Read MoreOn the Construction of Symmetries and Retaining Lifted Representations in Dynamic Probabilistic Relational Models
Our world is characterised by uncertainty and complex, relational structures that carry temporal information, yielding large dynamic probabilistic relational models at the centre of many applications. We consider an example from logistics in which the transportation of cargoes using vessels (objects) driven by the amount of supply and the potential to generate revenue (relational) changes…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreAutomated Hydroponic System using Wireless Sensor Networks
Researchers have associated agriculture and food processing with adverse environmental impacts like; falls in the underground freshwater table, energy consumption, and high carbon emission. These factors have the worst effect on developing countries. Therefore, there is a need for on-demand food production techniques that require minimum resource utilization. For these reasons, scientists are now focusing…
Read More
