Results (488)
Search Parameters:
Keyword: AMILeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreAn Interdisciplinary Approach to Fracture of Solids from the Standpoint of Condensed Matter Physics
Instead of approaches of solid mechanics or a formal description of experimental data an interdisciplinary approach is proposed to consider failure and deformation as thermodynamic processes. Mathematical modeling of the processes is carried out using rheological models of the material. One fracture criterion is used, that formally corresponds to the achievement of a threshold concentration…
Read MoreForensic Analysis of “WhatsApp” Artifacts in Android without Root
WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve…
Read MoreOnline Support for Tertiary Mathematics Students in a Blended Learning Environment
The context for the study was a naturally occurring quasi-experiment in the core mathematics program in a large Australian university. Delivery of teaching was changed in a sequence of two initial core mathematics subjects taken by engineering and science students. The change replaced one of two face-to-face tutorial classes per week by an online tutorial.…
Read MoreA Novel Algorithm Design for Locating Fault Distances on HV Transmission Lines
The transmission network has been considered among the globe’s prevalent complex systems, comprised of hundreds of electrical transmission lines and other equipment used to transmit electrical energy from one location to another. Over a decade, power engineers have worked tirelessly to ensure that the transmission network operates reliably, transmitting electrical energy from the power station…
Read MoreThermoelectric Generators (TEGs) and Thermoelectric Coolers (TECs) Modeling and Optimal Operation Points Investigation
Sustainable energy is gradually becoming the norm today due to greenhouse warming effects; as a result, the quests for different renewable energy sources such as photovoltaic cells as well as energy efficient electrical appliances are becoming popular. Therefore, this article explores the alternative energy case for thermoelectricity with focus on the steady-state mathematics, mixed modelings…
Read MoreValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreOpinion and Effectiveness of Kahoot! use in Online Distance Learning in Crop Production at Higher Education Level: A Case of Study
Kahoot is one of the most popular learning platforms, with over 2.5 billion players per year worldwide, used mainly for knowledge review through gamification. However, students´ opinion and its effectiveness in online distance learning as well as in another language teaching has been little studied. With these aims, this study was carried out in the…
Read MoreSelf-Regulated Learning and Academic Achievement of Physics Students in Selected Secondary Schools in Aguata Local Government Area of Anambra State, Nigeria
The research investigated the consequence of self-regulated learning on students’ academic performance in physics, using selected public co-education schools in Aguata Educational Zone, Anambra State as the research area. The study became necessary as a result of the observed persistent poor performance of the student in Physics in external examinations over the years. The study…
Read MoreSpatio-Temporal Analysis of Drought over the Guinean-Sudano Ecological Zone, Northern Nigeria
Drought has become more common and severe in recent decades due to increased global changes in climatic conditions and anthropogenic activities thereby analyzing drought at both regional and local levels is crucial. And so, this study aims at assessing drought risk in Northern Nigeria using NDVI and SPI. Data used included satellite images (Landsat OLI-TIRS,…
Read MoreAssociated Risk Factors for the Development of Extensively Resistant Pulmonary Tuberculosis in the First Level of Health Care: From a Public Health Perspective
To determine the risk factors associated with the development of extensively resistant pulmonary tuberculosis in the DIRIS Lima Sur, 2017. The type of research was observational, quantitative, analytical, retrospective case-control approach. The population consisted of 158 patients with MDR-TB treatment schedule between 2016 and 2017. The sample consisted of 24 cases diagnosed with extensively drug-resistant…
Read MoreProblems of Increasing the Intelligence of Algorithms for Optimal Distribution of the Current Load on the Combined Heat and Power Plant and Ways to Solve Them
The problem of optimal distribution of the current load of a combined heat and power plant with a complex composition of equipment is considered. A multi-criteria approach is proposed for parts of graphs with a constant load in time, considering the factors of economy, reliability and ecology. For sections of the graph with a time-variable…
Read MoreThe Effect of Obstacle Design Architectures on Randomly Ranging AGVs in a Shared Workspace
As mobile robots or Automated Guided Vehicles age, and their navigation components wear down, downtime may increase, and therefore robots may lose their path planning capabilities. In such blind-navigation scenarios, we assume robot(s) is programmed to undergo a default random-walk locomotion in a two-dimensional confined workspace with spatially populated obstacles. The robot(s) has only one…
Read MoreTETRA™ Techniques to Assess and Manage the Software Technical Debt
The paper examines the company’s proprietary means for determining the quality of a software product and measuring its technical debt. The paper’s authors explain how a software product’s quality is directly correlated with the amount of varying technical debts that the end-users receive. All debts can be paid, and technical debt is no exception: one…
Read MoreDiscover DaVinci: Blockchain, Art and New Ways of Digital Learning
Discover DaVinci is a novel augmented reality system that incorporates blockchain technology with experiential learning to engage participants in an interactive discovery of Leonardo da Vinci’s oeuvre. The software was created by Marko Suvajdzic, first author of this paper, and it was produced at the University of Florida Digital Worlds Institute. In the true spirit…
Read MoreCoupled Apodization Functions Applied to Enhance Image Quality in Ultrasound Imaging using Phased Arrays
The remarkable presence of side lobes levels in ultrasound B-mode imaging significantly decreases the image quality. Therefore, the use of an apodization function is of great importance. Linear windowing functions are among the most efficient techniques used to optimize antenna directivity by suppression of the side lobes. However, the apodization causes the degradation of lateral…
Read MoreA Summary of Canonical Multivariate Permutation Entropies on Multivariate Fractional Brownian Motion
Real-world applications modelled by time-dependent dynamical systems with specific properties such as long-range dependence or self-similarity are usually described by fractional Brownian motion. The investigation of the qualitative behaviour of its realisations is an important topic. For this purpose, efficient mappings from realisations of the dynamical system, i.e., time series, to a set of scalar-valued…
Read MoreAnalysis of Grid Events Influenced by Different Levels of Renewable Integration on Extra-large Power Systems
In this work, the impact of implementing a large amount of decentralized renewable energy sources (RES) of different scales on an extra-large power grid is investigated. Three scenarios are created, substituting 10%, 20%, and 30% of the conventional energy production by RES. For this purpose, the initial dynamic model of Continental Europe in combination with…
Read MorePredicting School Children Academic Performance Using Machine Learning Techniques
The study aims to assess the machine learning techniques in predicting students’ associated factors that affect their academic performance. The study sample consisted of 5084 middle and high school students between the ages of 10 and 17, attending public and UNRWA schools in the West Bank. The ‘Health Behaviors School Children’ questionnaire for the 2013-2014…
Read MoreTraditional and Deep Learning Approaches for Sentiment Analysis: A Survey
Presently, individuals generate tremendous volumes of information on the internet. As a result, sentiment analysis is a critical tool for automating a deep understanding of user-generated information. Of late, deep learning algorithms have shown endless promises for a variety of sentiment analysis. The purpose of sentiment analysis is to categorize different descriptions as good, bad,…
Read MoreQuantum Secure Lightweight Cryptography with Quantum Permutation Pad
Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…
Read MoreEnhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection
Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…
Read MoreReal Time RSSI Compensation for Precise Distance Calculation using Sensor Fusion for Smart Wearables
To effectively implement the social distancing or digital contact tracing in epidemic using an RSSI-based localization approach through Bluetooth beacon is one of the most widely used technologies, but simply using RSSI measurement is not more relevant because the RF signal is affected by several factors and the environment of usage. Traditional distance or positioning…
Read MorePerformance of Vertical Axis Wind Turbine Type of Slant Straight Blades
There is no doubt that energy is one of the most important requirements of life, and its importance increases with the passage of time, and this is what make countries to harness the capabilities and scientists in developing energy systems of all kinds, one of the most important energy systems these days is what is…
Read More
