Results (172)
Search Parameters:
Keyword: GainOn Adversarial Robustness of Quantized Neural Networks Against Direct Attacks
Deep Neural Networks (DNNs) prove to be susceptible to synthetically generated samples, so-called adversarial examples. Such adversarial examples aim at generating misclassifications by specifically optimizing input data for a matching perturbation. With the increasing use of deep learning on embedded devices and the resulting use of quantization techniques to compress deep neural networks, it is…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreDetailed Assessment of Dissaving Risk Against Life Expectancy for Elderly People using Anonymous Data and/or Random Data: A Review
With a view to detecting whether economic activity deterioration for elderly people at age of sixty-five or over could be observed, anonymous data (AD) were used as analysis data, which were obtained from the National Survey of Family Income and Expenditure (NSFIE) conducted by the Ministry of Internal Affairs and Communications (MIC). We have developed…
Read MoreDesign and Development of an Advanced Affordable Wearable Safety Device for Women: Freedom Against Fearsome
Harassment and violence against women have become one of the social security problems in Bangladesh. In this paper, we aim to develop safety devices for women named BOHNNI and BADHON which resemble legitimate jewelry. We used a microcontroller for the hardware device to make it most decisive and less immoderate. BOHNNI, a locating device, is…
Read MoreBrcLightning – Risk Analysis and Scaling for Protection against Atmospheric Discharge – Extender
This manuscript intending to publicize the improvements incorporated in the BrcLightning application, including the Risk Analysis module with the help of a pop-up, which provides the result and assists in the identification of mitigating measures by the professional, which must be defined to reduce the calculated risks. Other points addressed in this extension are the…
Read MoreA Software-Defined Network Approach for The Best Hospital Localization Against Coronavirus (COVID-19)
Traditional networks have difficulty in meeting the technological developments and the continuous increase in the size of data to be processed. Software-Defined Network (SDN) approach has emerged as an alternative to traditional networks. SDN separates the control and data planes from each other and manages the network over the control plane with flexibility and cost…
Read MoreAn Economic Theory Perspective for the Fight Against Poverty in the Peruvian Andes
The fight against poverty in the Peruvian Andes is a complex task in which various professionals, such as engineers, economists, anthropologists, among others, participate. The uncertainty of the decisions taken today, no matter how appropriate they may seem, such as million-dollar investments in irrigation infrastructure, can result in over-production and, therefore, in economic recessions. For…
Read MoreWideband and High-Gain Aperture Coupled Feed Patch Array Antenna for Millimeter-Wave Application
Millimeter-wave (mmW) antenna is one of the most important parts of the fifth-generation (5G) systems because of its advanced characteristics, for example, wideband and high transmission rate. In this paper, an mmW 4×1 array antenna with high gain and wideband based on an aperture coupled feeding patch (ACFP) antenna is presented. The proposed array antenna…
Read MoreA Statistical Approach for Gain Bandwidth Prediction of Phoenix-Cell Based Reflect arrays
A new statistical approach to predict the gain bandwidth of Phoenix-cell based reflectarrays is proposed. It combines the effects of both main factors that limit the bandwidth of reflectarrays: spatial phase delays and intrinsic bandwidth of radiating cells. As an illustration, the proposed approach is successfully applied to two reflectarrays based on new Phoenix cells.
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read MoreL-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits
L-band SiGe HBT active differential equalizers with variable, positive or negative gain slopes have been designed and fabricated for frequency and temperature compensation of microwave and optical systems. The active equalizer employs dual-resonant RLC circuits in the series feedback path of the differential amplifier for positive gain slopes or in the load for negative gain…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read MoreIntegration and Innovation of a Micro-Topic-Pedagogy Teaching Model under the New Engineering Education Paradigm
The rapid evolution of global technologies and industrial restructuring demands innovative pedagogical approaches to foster interdisciplinary engineering expertise. This research pioneers a blended instructional framework anchored in micro-topic pedagogy under the New Engineering Education (NEE) paradigm, orchestrating case studies, heuristic scaffolding, and research-driven inquiry strategies within digitally augmented learning ecosystems. A quasi-experimental study was conducted…
Read MorePredictive Analytics in Marketing: Evaluating its Effectiveness in Driving Customer Engagement
Understanding and responding to customer feedback is critical for business success. Customer response data offers valuable insights into preferences, behaviours, and sentiment. By analysing this data, businesses can optimize strategies, enhance customer experiences, and drive growth. Many analysis have been conducted in this field, while the review covers a broad range of AI and ML…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreEarly Detection of SMPS Electromagnetic Interference Failures Using Fuzzy Multi-Task Functional Fusion Prediction
This study addresses the need for improved prognostics in switch-mode power supplies (SMPS) that incorporate electromagnetic interference (EMI) filters, with a focus on aluminum electrolytic capacitors, which are critical for the reliability of these systems. The primary aim is to develop a robust model-based approach that can accurately predict the degradation and operational lifetime of…
Read MoreEnhancing Compressive Strength of Pervious Concrete for Use as Pavement Layer in Urban Roads Aper
South African Drainage and Stormwater Systems in urban roads has been of great concern, more so with recent flash floods in Gauteng and KwaZulu Natal Province in South Africa. Pervious concrete can be used to mitigate these challenges for urban roads. Pervious concrete is a concrete that contains no fines or only a small amount…
Read MoreStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreComparative Study of J48 Decision Tree and CART Algorithm for Liver Cancer Symptom Analysis Using Data from Carnegie Mellon University
Liver cancer is a major contributor to cancer-related mortality both in the United States and worldwide. A range of liver diseases, such as chronic liver disease, liver cirrhosis, hepatitis, and liver cancer, play a role in this statistic. Hepatitis, in particular, is the main culprit behind liver cancer. As a consequence, it is decisive to…
Read MoreInfrastructure-as-a-Service Ontology for Consumer-Centric Assessment
In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…
Read MoreFeedback Controller for Longitudinal Stability of Cessna182 Fixed-Wing UAVs
Unmanned aerial vehicles (UAVs) are becoming increasingly popular for both civil and military applications. Unmanned aerial vehicles can be categorized into two categories: rotary-wing and fixed-wing. Due to its capacity to fly long distances and carry substantial payloads, fixed-wing UAVs are gaining popularity and are currently utilized for various tasks. However, when confronted with disturbances…
Read MoreFPGA Implementation of 5G NR LDPC Codes
As a result of rising expectations for quality, the employment of advanced technical requirements for future fifth-generation (5G) new radio is required. The error-correction coding method is one of the most important components of a new generation. The 5G NR New Radio Low-Density Parity Check (LDPC) codes, which have been adopted by the 5G standard,…
Read MoreTunable Resistorless Phase Shifter Realization with a Single VDGA
This paper describes the design of a phase shifter with electrically adjustable parameters employing only one voltage differencing gain amplifier (VDGA) and one floating capacitor. This circuit requires no external resistors, resulting in a resistorless design and a low component count. The proposed circuit implements a first-order all-pass filter response with electronic control of its…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreActive Simulation of Grounded Parallel-Type Immittance Functions Employing VDBAs and All Grounded Passive Components
This communication proposes a grounded immittance function simulator that, depending on the proper choice of the passive components, can simulate parallel-type impedances of the R-L, R-C, and L-C forms. Only two grounded passive components and two voltage differencing buffered amplifiers (VDBAs) are used to implement the suggested circuit. All three simulated equivalent elements, namely Req,…
Read More
