Results (1734)
Search Parameters:
Keyword: SinBuilding an Efficient Alert Management Model for Intrusion Detection Systems
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…
Read MoreOn the Spectrum of problems involving both \(p(x)\)-Laplacian and \(P(x)\)-Biharmonic
We prove the existence of at least one non-decreasing sequence of positive eigenvalues for the problem, $$\begin{gathered}\left\{ \begin{array}{ll} \Delta_{p(x)}^{2}u-\triangle_{p(x)}u= \lambda |u|^{p(x)-2}u, \ \ \quad in \ \Omega \\ u\in W^{2,p(x)}(\Omega)\cap W_{0}^{1,p(x)}(\Omega),\end{array}\right. \end{gathered}$$ Our analysis mainly relies on variational arguments involving Ljusternik-Schnirelmann theory.
Read MoreS-asymptotically w-periodic solutions in the p-th mean for a Stochastic Evolution Equation driven by Q-Brownian motion
In this paper, we study the existence (uniqueness) and asymptotic stability of the p-th mean S-asymptotically !-periodic solutions for some nonautonomous Stochastic Evolution Equations driven by a Q-Brownian motion. This is done using the Banach fixed point Theorem and a Gronwall inequality.
Read MoreA new color image encryption algorithm based on iterative mixing of color channels and chaos
In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…
Read MoreFlexible lengthening-shortening arm mechanism for fishery resource management
The goal of this study was to use underwater robots instead of a diver’s observations to monitor and record the condition of an obstructed seabed in a shallow area. It is difficult to investigate marine resources that exist in deep water shaded by rock due to large and/or small rocks on the seabed. To solve…
Read MoreApplying Machine Learning and High Performance Computing to Water Quality Assessment and Prediction
Water quality assessment and prediction is a more and more important issue. Traditional ways either take lots of time or they can only do assessments. In this research, by applying machine learning algorithm to a long period time of water attributes’ data; we can generate a decision tree so that it can predict the future…
Read MoreEnhancement of Voltage Stability through Optimal Location of UPFC
This paper proposed the identification of the proper placement of UPFC (Unified Power Flow Controller) using a series of methodological numeric simulations to improve voltage stability. For this purpose, the critical zone of the system is determined, then, comparative analyses depending on different emplacements of UPFC are performed. The dynamic model of UPFC and the…
Read MoreEfficiency Assessment of Plasma-Aided Porous Media Surface Finishing
The efficiency of a plasma-aided finishing process, namely capillary impregnation, can be predicted only by setting two basic parameters of the real wood porous surface and the actual impregnating solution – surface free energy and surface tension. In general, the following processing efficiency parameter was found and the rule is true: “The plasma aided or…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreReview on security issues in RFID systems
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…
Read MoreFault Tolerant Control Based on PID-type Fuzzy Logic Controller for Switched Discrete-time Systems: An Electronic Throttle Valve Application
This paper deals with the problem of Fault Tolerant Control (FTC) using PID-type Fuzzy Logic Controller (FLC) for an Electronic Throttle Valve (ETV) described by a switched discrete-time system with input disturbances and actuator faults. In order to detect the faults, Unknown Input Observers (UIOs) are designed and formulated in terms of Lyapunov theory and…
Read MorePetrov-Galerkin formulation for compressible Euler and Navier-Stokes equations
The resolution of the Navier-Stokes and Euler equations by the finite element method is the focus of this paper. These equations are solved in conservative form using, as unknown variables, the so-called conservative variables (density, momentum per unit volume and total energy per unit volume). The variational formulation developed is a variant of the Petrov-Galerkin…
Read MoreNumerical evaluation of ABS parts fabricated by fused deposition modeling and vapor smoothing
The automotive industry has focused to use polymer materials in order to increase energy efficiency. So, the industry pays attention to use 3D printing technologies using several polymers. Among several 3D printer technologies, fused deposition modeling (FDM) is one of the popular 3D printing technologies due to an inexpensive extrusion machine and multi-material printing. FDM…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreLeaf-shaped solar cell antenna for Energy Harvesting and RF Transmission in ku-band
In this paper, a hybrid system solar cell antenna was studied. Our contribution lies in the combination of both optical and radio-frequency signals in a solar cell antenna. Hence, we propose a new method to merge antenna and solar cell. The leaf- shaped patch solar cell antenna was dedicated at a time to the energy…
Read MoreControl of a three-stage medium voltage solid-state transformer
This paper proposes the modeling and control of a Solid-State Transformer using a three-stage conversion topology. First, a rectification stage is used, where a three-phase high-voltage AC signal is converted to a DC level; this stage is then followed by a DC-DC converter, and finally an inverter is used to convert the DC into a…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreA Switched-Capacitor Low-Pass Filter with Dynamic Switching Bias OP Amplifiers
A switched capacitor low-pass filter employing folded-cascode CMOS OP Amps with a dynamic switching bias circuit capable of processing video signals, which enables low power consumption, and operation in wide bandwidths and low power supply voltages, is proposed. In this filter, charge transfer operations through two-phase clock pulses during the on-state period of the OP…
Read MoreSelective Electron Beam Melting Manufacturing of Electrically Small Antennas
Real estate pressures in modern electronics have resulted in the need for electrically small antennas, which have subsequently garnered interest amongst researchers and industry alike. These antennas are characterized by their largest dimensions translating to a fraction of the operating wavelength; such a diminutive size comes at the expense of reduced gain and efficiency, and…
Read MoreARMA feeding techniques for isoflux coverage from a micro satellite
This paper deals with the design of a new reconfigurable beam antenna used to improve the efficiency of spatial telemetry links on Nano-Satellite. This agile beam antenna is not built on the well-known array concept AESA (Agile Electronically Scanned Array) but using a new one called ARMA (Agile Matrix Radiating Antenna); MARPEM in French. In…
Read MoreSmartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches
Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…
Read MoreApplication of Computational Fluid Dynamics Model in High-Rise Building Wind Analysis-A Case Study
Over the years, wind loading codes has been a crucial tool in determining design wind loads on buildings. Due to the limitations of these codes especially in height, wind tunnel testing is recommended as the best approach in predicting wind flow around buildings but carrying out wind tunnel testing in the preliminary as well as…
Read MoreFlexible Aperture Tuning Solution for Cellular Main Antenna in Metallic Back Cover Mobile Phone
Metal housing has been used extensively on portable communication devices such as on mobile phones and tablets. The choice of metal housing ranges from metallic rim to metallic back cover. This metal housing tends to improve the outlook appearance of the mobile devices, and add mechanical strength towards the mobile devices. However, from the aspect…
Read MoreBig Data Analytics for Healthcare Organization: A Study of BDA Process, Benefits and Challenges of BDA
Day by day, data grows exponentially large using advanced technology and it requires effective analytical techniques to analyze the unknown and useful facts, patterns, associations and new trends which will provide new way for giving treatment to diseases and to provide good quality healthcare at low cost for everyone. This paper describes uncover valuable insights,…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read More
