Results (2349)
Search Parameters:
Keyword: ARA security approach based on honeypots: Protecting Online Social network from malicious profiles
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read MoreKinect-Based Moving Human Tracking System with Obstacle Avoidance
This paper is an extension of work originally presented and published in IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). This work presents a design and implementation of a moving human tracking system with obstacle avoidance. The system scans the environment by using Kinect, a 3D sensor, and tracks the center of mass of a…
Read MoreAssessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness
The present work describes the first serious game designed to reduce the stigma among students towards mental health problems. The game is called Stigma-Stop, and it features characters who suffer from various mental disorders. Players are provided with information about different mental illnesses, and they are presented with several options on how to act when…
Read MoreFault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor
This paper focuses on studying the problem of fault tolerant control (FTC), including a detailed fault detection and diagnosis (FDD) module using observer banks which consists of output and unknown input observers applied to a continuous stirred tank reactor (CSTR). The main objective of this paper is to use a FDD module here proposed to…
Read MoreControl design for axial flux permanent magnet synchronous motor which operates above the nominal speed
The axial flux permanent magnet synchronous motor (AFPM motor) using magnet bearings instead of ball-bearings at both two shaft ends could allow rotational speed of shaft much greater than nominal speed. One of the solutions to increase motor speed higher than its nameplate speed is reducing rotor’s pole magnetic flux of rotor (Yp). This paper…
Read MoreADOxx Modelling Method Conceptualization Environment
The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…
Read MoreMedical imbalanced data classification
In general, the imbalanced dataset is a problem often found in health applications. In medical data classification, we often face the imbalanced number of data samples where at least one of the classes constitutes only a very small minority of the data. In the same time, it represent a difficult problem in most of machine…
Read MoreMethodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…
Read MoreTravelling Wave Solutions of Coupled Burger’s Equations of Time-Space Fractional Order by Novel (Gʹ/G)-Expansion Method
In this paper, Novel (Gʹ/G)-expansion method is used to find new generalized exact travelling wave solutions of fractional order coupled Burger’s equations in terms of trigonometric functions, rational functions and hyperbolic functions with arbitrary parameters. For the conversion of the partial differential equation to the ordinary differential equation, complex transformation method is used. Novel (Gʹ/G)-expansion…
Read MoreFeedback device of temperature sensation for a myoelectric prosthetic hand
In this study, a control system of a feedback device of temperature sensation for myoelectric prosthetic hand users was improved. The device is mounted on a user’s upper arm in contact with the skin, and transfers the temperature sensation in the upper arm corresponding to the temperature detected by the temperature sensor at the fingertip…
Read MoreA Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management
This paper presents a Release Management model to support requirements management. Requirements development and management can be integrated with a release-planning approach to achieve lesser Requirements spillover problems which is an innovative way to capture, control and evolve the user requirements based on integer linear programming.
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreDetection of Vandalism in Wikipedia using Metadata Features – Implementation in Simple English and Albanian sections
In this paper, we evaluate a list of classifiers in order to use them in the detection of vandalism by focusing on metadata features. Our work is focused on two low resource data sets (Simple English and Albanian) from Wikipedia. The aim of this research is to prove that this form of vandalism detection applied…
Read MoreDetailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model
In urban, rural and indoor applications, diffraction mechanism is very important to predict the field strength and calculate the coverage accurately. The diffraction mechanism takes place on NLOS (non-line-of-sight) cases like rooftop, vertex, corner, edge and sharp surfaces. S-UTD-CH model computes three type of electromagnetic wave incidence such as direct, reflected and diffracted waves, respectively.…
Read MorePseudo-Analysis: Measures of General Conditional Information
The aim of this paper is to continue our study of information in the setting of Pseudo-Analysis. We shall present, by axiomatic way, the definition of measures of general conditional information and we shall study particular measure by using a system of functional equations in which it is present a pseudo-operation. We know that J.Aczel…
Read MoreComputer Aided Medical Diagnosis for the Treatment of Sexually Transmitted Disease (Gonorrhea)
The World Health Organization (WHO) report on the circumstances of clinical facilities in developing countries indicates that, there is considerable efficient delivery of medical services to the rural inhabitants where the services are available, these services are very expensive and not affordable to the average citizen. This has risen inadequacies such as prolonged suffering and…
Read MoreA Clinical Review of Zika Virus (ZIKAV)
Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…
Read MoreWireless Android Based Home Automation System
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…
Read MoreHow Effective is Using Lip Movement for Japanese Utterance Training
Lip movements have long been the subject of research. There are many methods of lip movement recognition, such as the calculation of the amount of movement compared to a matching face pattern. In a previous study, we investigated utterance recognition based on the power spectrum by focusing on lip movements, which is one aspect of…
Read MoreReal Time Implementation of an Improved Hybrid Fuzzy Sliding Mode Observer Estimator
This paper extends some of our research results disseminated in the most recent awarded international conference paper concerning the implementation in real time of a sliding mode observer state estimator. For the same case study developed in the conference paper, more precisely a DC servomotor angular speed control system, we extend the proposed concept of…
Read MoreDetailed Analysis of Torque Ripple in High Frequency Signal Injection based Sensor less PMSM Drives
High Frequency Signal Injection based techniques are robust and well proven to estimate the rotor position from stand still to low speed. However, Injected high frequency signal introduces, high frequency harmonics in the motor phase currents and results in significant Output Torque ripple. There is no detailed analysis exist in the literature, to study the…
Read MoreDevelopment of a Motorized Afifia Mowing Machine Design for Controlling Environmental Conservation and Menace for Home Use
Technology has become more affordable and penetrates every aspect of daily life, even in developing country like Nigeria. However many of the users in developing countries are still finding difficulty in using the technologies due to lack of experience as they undergo a technology leap. The aim of this research work explores the approach in…
Read MoreImplementation a Secure Electronic Medical Records Exchange System Based on S/MIME
The exchange of electronic medical records can reduce the preservation and the use of papers of medical records for management issues. The sharing of electronic medical records has been effective in Taiwan. Now days, enterprises are sharing their electronic medical records through the Exchange Center of EMR under the Virtual Private Network but slightly less…
Read MoreDevelopment of a new lines of sight analyzer while playing sport
The Olympics will be held in Tokyo in 2020, and the training of the athlete using technology has been gaining attention. In an effort to refine the competitive ability of top athletes by evaluating their performance objectively, we have focused on eye movement and head movement. Since the field of view moves according to the…
Read MoreManagement of Health Information in Malawi: Role of Technology
This paper is an extended version of the conference paper presented at IST Africa Week Conference 2016 and it discusses in detail the existing technology gaps using DHIS2 (District Health Information System 2.0) as an example, and how Geographic Information System (GIS) and mobile application, as specific examples of technology, can enhance health management information…
Read More
