Results (349)
Search Parameters:
Section: csiIndustry 4.0 Operators: Core Knowledge and Skills
One of the most important technological changes due to the arrival of Industry 4.0, an initial, gradual, and complex process of technology transfer is taking place, which strongly relies on the integration of universities, industries, and governments. In this context, to make the Industry 4.0 approach a reality, several requirements need to be met. One…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreThe Application of Mobile Learning Technologies at Malaysian Universities Through Mind Mapping Apps for Augmenting Writing Performance
21st century learning focuses on the flow of information, media, and technology. In Malaysia, many university students face problems in English writing. Thus, students should be exposed to the technology training in innovative ways to produce students with a dynamic in this ever-changing world. Recently, the transformation and the evolution of mobile have created a…
Read MoreA Framework for Measuring Workforce Agility: Fuzzy Logic Approach Applied in a Moroccan Manufacturing Company
In today’s Moroccan business environment, companies need to implement organization agility by developing an agile workforce that is able to deal with the environment volatility. Thus, the agile workforce concept has been appeared as a necessary and sufficient condition to achieve agility. Focusing on agile enablers influencing workforce agility is an important area but currently…
Read MoreEnhancing Decision Making Capabilities in Humanitarian Logistics by Integrating Serious Gaming and Computer Modelling
The field of humanitarian logistics has in recent times gained an increasing attention from both academics and practitioners communities alike. Although various research groups have addressed theoretical and technical developments in humanitarian logistics using conventional research tools, applied research appears to be often dependent on practitioners’ inputs. This paper is an attempt to fill the…
Read MoreApplications of Causal Modeling in Cybersecurity: An Exploratory Approach
Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…
Read MoreSentence Retrieval using Stemming and Lemmatization with Different Length of the Queries
In this paper we focus on Sentence retrieval which is similar to Document retrieval but with a smaller unit of retrieval. Using data pre-processing in document retrieval is generally considered useful. When it comes to sentence retrieval the situation is not that clear. In this paper we use TF-ISF (term frequency – inverse sentence frequency)…
Read MoreEstimation of Influential Parameter Using Gravitational Search Optimization Algorithm for Soccer
Competitive sport has one phenomenal or fundamental aspect of selecting players into playing squad for a game that can influence a Club or a team in almost all major aspects. Various Characteristics or behavioral aspects of players will be instrumental towards the selection of a specific player into a team depending on the nature, level,…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreCentralized System of Universities Learning Materials
This article considers the creation of a program / website as an example of a centralized system for all universities in order to more easily familiarize an applicant and / or student with the internal politics and capabilities of the university. Existing problems in the training system are examined, why distance learning is relevant, what…
Read MoreA Novel Quantum No-Key Protocol for Many Bits Transfer with Error Correction Codes
In this paper, a novel quantum transmission protocol which are based on the quantum no-key protocol is proposed. First, the quantum no-key protocol is discussed to show its important and its non-efficient on data transmission over quantum channel. Then, we improve it to carry many data bits via transmission. In addition, the error correction code…
Read MoreA Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques
Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…
Read MoreROS Based Multimode Control of Wheeled Robot
This research work mainly presents the design and development of a small-scaled wheeled robot, which can be controlled using multiple controlling interfaces using some new technological trends. Raspberry Pi 3 as the main controller, Python as the programming language integrated with the Robot Operating System (ROS) and Virtual Network Computing (VNC) for screen sharing are…
Read MoreDeterminants of Students’ Actual use of the Learning Management System (LMS): An Empirical Analysis of a Research Model
This study built and tested a research model to determine the determinants that impact students’ actual use of the learning management system. A survey questionnaire was used to gather data from 148 university students who used LMS in their course of study. The structural equation model was used to analyze quantitative data. The study revealed…
Read MorePromoting Continuous Professional Development Among Academics from A Vocational College by Using A Practical Workshop Based on Arduino Technology
The internet of things has resulted in the design and development of many electronic sensors that need to be integrated with various technologies. Engineering academics need ongoing training relating to this integration as they need to subsequently teach their students. This relates to continuous professional development. The purpose of this article is to illustrate how…
Read MoreA Critical Analysis of Usability and Learning Methods on an Augmented Reality Application for Zoology Education
In recent years, research has been conducted focused on the use of technologies in the classroom, but one of the main problems is to demonstrate that the use of this technology favors learning compared to traditional methods. One of these technologies is augmented reality that allows seeing virtual objects superimposed in the real world, but…
Read MoreWilson-Hilferty-type Approximation for Poisson Random Variable
The possibility to apply non-linear transformation of the Wilson-Hilferty type to the Pois- son random variable is investigated using an analytic approach, in order to improve the convergence towards the large-parameter Gaussian limit. Considering the already existing non-linear transformation for the Gamma distribution, the original Wilson-Hilferty and a higher-order transformations are showed and approximations for…
Read MoreExtending Movable Surfaces with Touch Interaction Using the VirtualTablet: An Extended View
Immersive output and natural input are two core aspects of a virtual reality experience. Current systems are frequently operated by a controller or gesture-based approach. However, these techniques are either very accurate but require an effort to learn, or very natural but miss haptic feedback for optimal precision. We transfer ubiquitous touch interaction with haptic…
Read MoreA Sustainable Multi-layered Open Data Processing Model for Agriculture: IoT Based Case Study Using Semantic Web for Hazelnut Fields
In recent years, several projects which are supported by information and communications technologies (ICT) have been developed in the agricultural domain to promote more precise agricultural activities. These projects account for different kinds of key ICT terms such as internet of things (IoT), wireless sensors networks (WSN), cloud computing (CC). These projects are used for…
Read MoreA Systematic Literature Review of Vessel Anomaly Behavior Detection Methods Based on Automatic Identification System (AIS) and another Sensor Fusion
The high flow of vessel traffic affects the difficulty of monitoring vessel in the middle of the sea because of limited human visibility, occurrence of vessel accidents at the sea and other illegal activities that illustrate abnormal vessel behavior such as oil bunkering, piracy, illegal fishing and other crimes that will continue and will certainly…
Read MoreEnhancing an SDN Architecture with DoS Attack Detection Mechanisms
A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…
Read More
