Results (202)
Search Parameters:
Keyword: SUEResourceful Residual Energy Consumption in TDMA Scheduling for IoT-based Wireless Sensor Network
Recently, wireless sensor network (WSN) gets more concern due to the robustness in the latest communication technology iteration such as big data, IoT and 5G. Such daily usage of these technologies includes smart home, smart farming, smart traffic control etc. Moreover, WSN becomes the best preference for mobile objects in data accumulating in a wild…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read MoreLow Contrast Image Enhancement Using Convolutional Neural Network with Simple Reflection Model
Low contrast images degrade the performance of image processing system. To solve the issue, plenty of image enhancement methods have been proposed. But the methods work properly on the fixed environment or specific images. The methods dependent on fixed image conditions cannot perform image enhancement properly and perspective of smart device users, algorithms including iterative…
Read MoreWeb Authentication: no Password; Listen and Touch
Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…
Read MorePerfect Molding Challenges and The Limitations “A Case Study”
Driven by today’s market demand, semiconductor is pushing towards the zero-defect direction. The improvement demanded in semiconductor manufacturing is becoming increasingly challenging. In this paper, common molding defects comprise of voids, incomplete fills, and piping holes are studied systematically, focusing on three key areas: 1) Potential mold flow weakness; 2) Molding temperature stability; as well…
Read MoreSimulation-Optimisation of a Granularity Controlled Consumer Supply Network Using Genetic Algorithms
The decision support systems regarding the Supply Chains (SCs) management services can be significantly improved if an effective viable method is utilised. This paper presents a robust simulation optimisation approach (SOA) for the design and analysis of a granularity controlled and complex system known as Consumer Supply Network (CSN) incorporating uncertain demand and capacity. Minimising…
Read MoreProbabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots
This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…
Read MoreA Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques
Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…
Read MoreFuzzy Uncertainty Management in Multi-Shift Single-Vehicle Routing Problem
Our research deals with the single-vehicle routing problem (VRP) with multi-shift and fuzzy uncertainty. In such a problem, a company constantly uses one vehicle to serve demand over a scheduling period of different work shifts. Our issue relies on a routing problem in maintenance jobs, where a crew executes jobs in different sites. The crew…
Read MoreTowards Adoption of Authentication and Authorization in Identity Management and Single Sign On
Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…
Read MoreImproved DTC Control Strategy of B12 Inverter Fed BLDC Motor Drives Considering Commutation Torque Dips
In most industrial high-power applications, the brushless DC (BLDC) motor is connected to multi-level inverters specially the three-level NPC inverters (B12). Torque ripple is a critical issue in BLDC motor drives. Accordingly, minimizing the ripple produced in the torque is necessary to enhance the BLDC motor drive performances. This paper aims to develop two direct…
Read MoreEffect of Various Parameters for Temperature Distribution in Human Body: An Analytic Approach
This paper is the extension of the work originally presented in 2nd International Conference on Man and Machine Interfacing (MAMI 2017) and the paper of Yue et al. The present study aims at observing the effect of various parameters on temperature distribution profiles at various environmental temperature, tissue thermal conductivities, metabolic rates, blood perfusion rates,…
Read MoreA Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments
Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…
Read MoreA Machine Learning Framework Using Distinctive Feature Extraction for Hand Gesture Recognition
There are more than 7billion people in the world where there are around 500 million people in the world who are denied from normal lifestyle due to physical and mental issue. It is completely fair to say that every person deserves to enjoy a normal lifestyle. While physically and mentally challenged people find suitable way…
Read MoreInteractive Virtual Reality Educational Application
Virtual Reality (VR) technology has become one of the most advanced techniques that is used currently in many fields. The role of education is extremely important in every society; therefore, it should always be updated to be in line with new technologies and lifestyles. Applying technology in education enhances the way of teaching and learning.…
Read MoreA detailed step-by-step electrical parameters identification method for photovoltaic generators using a combination of two approaches
The object of this paper is to identify the unknown electrical parameters of solar photovoltaic generators in real time, through the application of a novel suggested hybrid method. The identification process is discussed with details, about the four steps of identification. In this issue, the first step describes the experimental data acquisition work done to…
Read MoreTowards Process Standardization for Requirements Analysis of Agent-Based Systems
The development of agent-based systems is negatively impacted by the lack of process standardization across the major development phases, such as the requirements analysis phase. This issue creates a key barrier for agent technology stockholders regarding comprehending and analyzing complexity associated with these systems specifications. Instead, such fundamental low-level infrastructure is loosely attended to in…
Read MoreWhat Should Be Considered for Acceptance Mobile Payment: An Investigation of the Factors Affecting of the Intention to Use System Services T-Cash
E-Money mobile payments, also called digital money, are electronic payments, payment transactions using an Internet network integrated with NFC-enabled smartphones and prepaid cards. In Indonesia not only banks that issue e-money products, telecom operators from Telkomsel also issued an e-money product called T-cash. T-cash is a new innovation of electronic money presented by Telkomsel. The…
Read MoreA Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation
Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…
Read MoreAn Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images
Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…
Read MoreSoftware and Hardware Enhancement of Convolutional Neural Networks on GPGPUs
Convolutional Neural Networks (CNNs) have gained attention in recent years for their ability to perform complex machine learning tasks with high accuracy and resilient to noise of inputs. The time-consuming convolution operations of CNNs pose great challenges to both software as well as hardware designers. To achieve superior performance, a design involves careful concerns between…
Read MoreA Joint Safety and Security Analysis of message protection for CAN bus protocol
One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…
Read MoreThe Use of LMS AMESim in the Fault Diagnosis of a Commercial PEM Fuel Cell System
The world’s pollution rates have been increasing exponentially due to the many reckless lifestyle practices of human beings as well as their choices of contaminating power sources. Eventually, this lead to a worldwide awareness on the risks of those power sources, and in turn, a movement towards the exploration and deployment of several green technologies…
Read MoreImpact of Line Resistance Combined with Device Variability on Resistive RAM Memories
In this paper, the performance and reliability of oxide-based Resistive RAM (ReRAM) memory is investigated in a 28nm FDSOI technology versus interconnects resistivity combined with device variability. Indeed, common problems with ReRAM are related to high variability in operating conditions and low yield. At a cell level ReRAMs suffer from variability. At an array level,…
Read More
