Results (1736)
Search Parameters:
Keyword: SinModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MorePreparation of Ni-C Ultrafine Composite from Waste Material
This work depicts the preparation of Ni-C ultrafine composite from used engine oil. The used oil was emulsified with detergent loaded with Ni (OH)2. The loaded emulsion was sprayed on electric plasma generated between two C electrodes to a DC main 28 V and 70-80 A. The purged Ni-doped carbon fume was trapped on a…
Read MoreLow-cost Hybrid Wheelchair Controller for Quadriplegias and Paralysis Patients
Wheelchair controller design is very important for handicapped users such as quadriplegia, amputee, paralyzed and elderly. The safe use, easiness, and comfort are an important factor that can directly affect the user’s social efficiency and quality of life. In this paper, the design, implementation, and test of a new low-cost hybrid wheelchair controller for quadriplegics…
Read MoreSpatiotemporal Traffic State Prediction Based on Discriminatively Pre-trained Deep Neural Networks
The availability of traffic data and computational advances now make it possible to build data-driven models that capture the evolution of the state of traffic along modeled stretches of road. These models are used for short-time prediction so that transportation facilities can be operated in an efficient way that guarantees a high level of service.…
Read MoreDevelopment of an automated vehicle stop system for cardiac emergencies
This paper describes the concept and configuration of a novel automated safety vehicle stop system, and a future prospect of the study. Intrinsic sudden death may cause traffic accident since such accidents sometimes involve not only the driver but also other traffic users such as passengers and pedestrians. Cardiovascular disease (CVD) is considered as a…
Read MoreMulti Level Integrity Management in LTE/LTE-A Networks
The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…
Read MoreHuman Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots
In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of…
Read MoreIncorporating Spatial Information for Microaneurysm Detection in Retinal Images
The presence of microaneurysms(MAs) in retinal images is a pathognomonic sign of Diabetic Retinopathy (DR). This is one of the leading causes of blindness in the working population worldwide. This paper introduces a novel algorithm that combines information from spatial views of the retina for the purpose of MA detection. Most published research in the…
Read MoreAugmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment
The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…
Read MoreData Error Detection and Recovery in Embedded Systems: a Literature Review
This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make…
Read MoreA Novel Dual-Band Rectenna for Ambient RF Energy Harvesting at GSM 900 MHz and 1800 MHz
This paper presents a novel dual-band rectenna for RF energy harvesting system. This rectenna is created from a dual-band antenna and a dual-band rectifier which operates at GSM bands (900 MHz and 1800 MHz). The printed monopole antenna is miniaturized by two meander-lines. The received signal from the receiving antenna is rectified by a voltage…
Read MorePower requirements and battery life measurement for wireless transmission between two nodes in different mediums
One of the most important roles of the wireless sensor networks (WSN) is to avoid wiring costs, be self-sustainable and be able to function for several years. However, due to the slow progress in battery technology, power continues to be a limited resource in wireless sensor communication and electric energy storage remains to be an…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MoreFAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle
One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…
Read MoreOptimizing the Decoding Complexity of PEG-Based Methods with an Improved Hybrid Iterative/Gaussian Elimination Decoding Algorithm
This paper focuses on optimizing the decoding complexity of the progressive-edge-growth-based (PEG-based) method for the extended grouping of radio frequency identification (RFID) tags using a hybrid iterative/Gaussian elimination decoding algorithm. To further reduce the decoding time, the hybrid decoding is improved by including an early stopping criterion to avoid unnecessary iterations of iterative decoding for…
Read MoreThe Search for a Convergent Option to Deploy Smart Grids on IoT Scenario
Smart city projects are quickly evolving in several countries as a feasible solution to the urban organization to provide sustainable socioeconomic growth and solve problems that arise as the populations of these cities grow. In this sense, technology application plays an important role in enabling automation of processes, improving the citizen’s quality of life and…
Read MoreImpact of PSS and SVC on the Power System Transient Stability
The Static Var Compensator (SVC) is used to improve the stability of the power system because of its role in injecting or absorbing the reactive power in the electrical transmission lines. The Power System Stabilizer (PSS) is also a control device which ensures maximum power transfer and thus the stability of the power system enhancement.…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreMulti-Domain Virtual Network Embedding with Coordinated Link Mapping
Network Virtualization, which allows the co-existence of various logical networks on shared physical infrastructure, has become popular in recent years. The optimal mapping of virtual resource to physical resource is a major issue in network virtualization. This problem, called virtual network embedding (VNE), has been well explored in the context of one physical domain, which…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read MoreDesign, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators
Nowadays, compliant micro-motion stages offer high positioning accuracy and repeatability. When assembled with conventional stages, the resulting dual-range positioning systems allow for nanometer scale accuracy within a centimeter scale working area. However, such systems invoke a high cost and large footprint. This paper presents a low-cost, compact compliant XY micro-motion stage where dual-range manipulation has…
Read MoreOptimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria
A method for optimal sizing of hybrid system consisting of a Photovoltaic (PV) panel, diesel generator, Battery banks and load is considered in this paper. To this end a novel approach is proposed. More precisely a methodology for the design and simulation of the behavior of Hybrid system PV-Diesel-Battery banks to electrify an isolated rural…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MoreService Productivity and Complexity in Medical Rescue Services
The increasing impact of services on economic wealth and income in high wage countries calls for a detailed examination of service productivity and complexity in current research projects. This paper describes the development of a measurement model of service productivity and complexity within the domain of medical service provision. While the measurement model of service…
Read More
