Results (349)
Search Parameters:
Section: csiA Study on Development of Evaluation Metrics for Learners in Physical Computing
Physical computing is important for ICT (information and communication technology) Education and other informatics education such as software education since physical computing can provide learning-by-doing education for students. It is also a strong tool to increase students’ programming ability using various type of physical computing tools like a robot. In physical computing, it is necessary…
Read MoreDetecting Malicious Assembly using Convolutional, Recurrent Neural Networks
We present findings on classifying the class of executable code using convolutional, re- current neural networks by creating images from only the .text section of executables and dividing them into standard-size windows, using minimal preprocessing. We achieve up to 98.24% testing accuracy on classifying 9 types of malware, and 99.50% testing accuracy on classifying malicious…
Read MoreFully Homomorphic Encryption Scheme Based On Complex Numbers
In this paper, we present a new Somewhat Homomorphic Encryption (SHE) scheme using computation over complex numbers. We then use Bootstrapping technique to make the scheme Fully Homomorphic (FH) and supports unbounded number of circuit depth. In addition to its homomorphic properties and security level, a main characteristic of the proposed new scheme is its…
Read MoreLogic Error Detection System based on Structure Pattern and Error Degree
The importance of programming skills has increased with advances in information and communication technology (ICT). However, the difficulty of learning programming is a major problem for novices. Therefore, we propose a logic error detection algorithm based on structure patterns, which are an index of similarity based on abstract syntax trees, and error degree, which is…
Read MoreConceptual Architecture for the Continuity if Workflow in Activities on Multi-Devices: Case Study Co-Kitchen
Nowadays, the realization and follow-up of a team activity takes place in different execution environments (e.g. mobile phone, PC) through the use of computer applications. This implies context changes that generate interruptions in the activity. To improve the continuity of an activity with the reduction of interruptions during the development of this activity, would help…
Read MoreA Proposal of Control Method Considering the Path Switching Time of SDN and Its Evaluation
Recently, communication demands often change because of the various network services in companies and individuals. Software Defined Networking (SDN) has emerged as a viable control paradigm that allows flexible communication, using OpenFlow as its default standard and enabler. However, when changes happen frequently in SDN networks due to unforeseen reasons -such as a network failure…
Read MoreAn Analysis of Social Media Usage in Winery Businesses
Although social media is used by an ever-increasing number of businesses, its benefits have not yet been fully exploited. Social media analytics tools can prove helpful in this regard, since they comprise a unique information source for business intelligence. As the social media environment rapidly evolves, various social media analytics tools are emerging. This research…
Read MoreHidden Surface Removal for Interaction between Hand and Virtual Objects in Augmented Reality
Recently, augmented reality (AR) technology has been applied to the inter- action technology between human and virtual objects. In AR interaction technology, it is necessary for users to be able to manipulate virtual objects intuitively. Thus, we focus on manipulating virtual objects directly with the user’s bare hands in this study. On the other hand,…
Read MoreEnhancing Bodily Movements of the Visually Impaired Children by Airflow
This study involved three departments of teachers and students. The concept of the flow-motivated exercise implemented with a set of flow nozzles. A computer-controlled airflow with specific music introduced, and the motion responses from the participants were analyzed during the initial test and field study. During the initial examination, we adjusted the magnitude and distance…
Read MoreEvent Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network
With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…
Read MoreAutomatic Service Orchestration for e-Health Application
This paper describes an architectural approach to the development of dynamic service-oriented systems for e-Health using the service orchestration mechanism and semantic technologies. The main idea is the dynamic synthesis of the complex functionality required by user or by software agent. This idea should help to build and easily extend the applied loose-coupled systems without…
Read MoreOptical Braille Recognition Software Prototype for the Sinhala Language
Braille system is purposely made for visually impaired people, to support their literal communication in order to share their knowledge. Louis Braille introduced the braille system consists of series dots which are embossed to read by touching. Early days Braille papers are made manually, but at current days braille documents are made using machines. Due…
Read MoreWell Balanced Multi-value Sequence and its Properties Over Odd Characteristic Field
The authors propose a well balanced multi-value sequence (including a binary sequence). All the sequence coe_cients (except the zero) appear almost the same in number, thus, the proposed sequence is so called the well balanced sequence. This paper experimentally describes some prominent features regarding a sequence, for instance, its period, autocorrelation, and cross-correlation. The value…
Read MoreAggrandized Random Forest to Detect the Credit Card Frauds
From the collection of supervised machine learning technique, an ensemble procedure is used in Random Forest. In the arena of Data mining, there is an excellent claim for machine learning techniques. Random Forest has tremendous latent of becoming a widespread technique for forthcoming classifiers as its performance has been found analogous with ensemble techniques bagging…
Read MoreIntelligent Foundations for Knowledge Based Systems
Knowledge Based Systems play a very important role, within Healthcare, with a primary goal of supporting a high quality service at an optimal cost. A widely accepted knowledge acquisition technique is through the use of Business Rules in a natural language like format. As clinical terminology is centric to HealthCare, a large percentage of these…
Read MoreDigitization Impact Assessment Model for Secondary Schools: Case of Nairobi County in Kenya
Digitization is viewed as the capability to utilize digital technologies for generating processing, sharing and transacting information. Studies show that digitization has now become ubiquitous. In almost all the sectors, we routinely interact with digital technologies. As a result, the impact of digitization is being observed in such sectors. For instance, the positive impact of…
Read MoreEarly Detection of Alzheimer’s Using Digital Image Processing Through Iridology, An Alternative Method
Over the years, alternative medicine has carried out numerous systematic studies related to the ophthalmological field, specifically the eye. Studies that propose as support of analysis to the Iridology, which studies the alterations of the iris in correspondence with the organs of the human body. Thus, it presents the opportunity to investigate neuronal diseases related…
Read MoreMultimedia Application Development With Islamic Critical Reflection Through 3-2-1 Technique for Novice Teacher Internship Program
The use of technology in the learning process has become the most significant point in helping teachers reaching the objectives of the learning. This study focuses on the use of multimedia by novice teachers in comprehending the internship program’s guidance. The Islamic Critical Reflection model is a new and innovative model in the field of…
Read MoreResourceful Residual Energy Consumption in TDMA Scheduling for IoT-based Wireless Sensor Network
Recently, wireless sensor network (WSN) gets more concern due to the robustness in the latest communication technology iteration such as big data, IoT and 5G. Such daily usage of these technologies includes smart home, smart farming, smart traffic control etc. Moreover, WSN becomes the best preference for mobile objects in data accumulating in a wild…
Read MoreDetection the Places of the Heat Energy Leak on the Underground Thermal Pipelines Using the Computer System
The purpose of this paper is to improve the thermographic method for detection the places of heat energy losses on the urban underground thermal pipelines using the computer system. This goal was achieved by building a heat map of the surveyed heating main with data layering directly on a computer map of the area, which…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreHybrid Technique for Enhancing Underwater Image in blurry conditions
Enhancing underwater visualization using hybrid technique is generally employed into oceanic production. Through growing oceanic learning, undersea processing has drawn extra importance owing towards necessary task of picture towards attaining data. Although, suitable to reality of dust-like constituent and beam reduction, undersea descriptions continually experience small contrast and color alteration. In this paper, we estimate…
Read MoreConversion of 2D to 3D Technique for Monocular Images using Papilio One
A 3D image adds realism in viewing experience and can assist in simplifying the graphical displays. A Third dimension supplement to the input can improve pattern recognition, and can be used for 3D scene reconstruction and robot navigation. Recently popularity of 3D hardware is also increased which makes it a hot topic. The production of…
Read MoreITSM Software Ranking for Small Medium Enterprises Based on ITIL V3 Quick Win Criteria using Fuzzy SIR Method
There are various software related to the implementation of IT Service Management (ITSM) for a company, including those that are open source and commercial. An input is needed for companies in determining what software to choose from various software, especially for small and medium enterprises (SMEs) that have limited human and financial resources. In this…
Read MoreEffects of Different Activation Functions for Unsupervised Convolutional LSTM Spatiotemporal Learning
Convolutional LSTMs are widely used for spatiotemporal prediction. We study the effect of using different activation functions for two types of units within convolutional LSTM modules, namely gate units and non-gate units. The research provides guidance for choosing the best activation function to use in convolutional LSTMs for video prediction. Moreover, this paper studies the…
Read More
