Results (22)
Search Parameters:
Keyword: ModificationA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read MoreUnderstanding the usage, Modifications, Limitations and Criticisms of Technology Acceptance Model (TAM)
Technology Acceptance Model (TAM) is broadly accepted and has proved applicable in identifying consumers’ willingness to utilize information and communication technology (ICT). The theory proposes that Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) are actually determining factors of individual attitudes, while attitude is a determining factor of Behavioural Intention (BI) and Behavioural Intention…
Read MoreSeismic Response Modification Factor for Special Concrete Structures Based on Pushover & Non-linear Time History Analyses
Reinforced concrete (RC) structures are able to dissipate a large amount of energy during earthquake (EQ). RC structures designed to resist EQs must have enough strength and stiffness to prevent any possible collapse as well as to control deflection. Seismic codes include the response reduction/modification factor(R) in calculation of equivalent lateral forces used for EQ…
Read MoreIncremental Control Techniques for Layout Modification of Integrated Circuits
Analog layout is created in integrated circuits (IC) computer aided design (CAD) environment and during realization requires a lot of modifications of database objects. Because database objects modification is time consuming, then any improvement and simplification of modification flow in IC CAD environment can increase layout productivity. A proposed new modification concept can speed-up layout…
Read MoreCombination of Caesar Cipher Modification with Transposition Cipher
The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreEnhancing Decision Trees for Data Stream Mining
Data stream gained obvious attention by research for years. Mining this type of data generates special challenges because of their unusual nature. Data streams flows are continuous, infinite and with unbounded size. Because of its accuracy, decision tree is one of the most common methods in classifying data streams. The aim of classification is to…
Read MoreApplication of Geographic Information Systems and Remote Sensing for Land Use/Cover Change Analysis in the Klip River Catchment, KwaZulu Natal, South Africa
Ladysmith is a major economic hub in the uThukela District Municipality. However, it has been experiencing floods almost every year which has resulted in the loss of lives and disruption of business activity within the Ladysmith Central Business District. The main objective of this study was to quantify the land use/cover changes before and after…
Read MoreComparative Analysis of Land Use/Land Cover Change and Watershed Urbanization in the Lakeside Counties of the Kenyan Lake Victoria Basin Using Remote Sensing and GIS Techniques
The ecosystems and landscape patterns in Lake Victoria basin are increasingly being modified by changes in land use/land cover. Understanding dynamics of these changes is essential for appropriate planning. This study evaluated changes in landscape environment, of the lakeside counties of the Kenyan Lake Victoria basin, which have occurred over a forty-year period (1978-2018) and…
Read MoreApplication of Piecewise Linear Approximation of the UAV Trajectory for Adaptive Routing in FANET
A significant problem of routing protocols in the Flying Ad Hoc Networks (FANET) is a significant overhead cost due to the high mobility of networking nodes. The problem is caused by a need to send information messages about locations of unmanned aerial vehicles (UAVs). In order to reduce the amount of service information, the following…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MoreApplication of EARLYBREAK for Line Segment Hausdorff Distance for Face Recognition
The Hausdorff distance (HD) is defined as MAX-MIN distance between two geometric objects for measuring the dissimilarity between two objects. Because MAX-MIN distance is sensitive with the outliers, in face recognition field, average Hausdorff distance is used for measuring the dissimilarity between two sets of features. The computational complexity of HD, and also average HD,…
Read MoreMutual Reduction in the Coupling of the MIMO Antenna Network Applied to the Broadband Transmission
In this article, a new form of UWB (ultra-wide-band) antenna operating to the desired specifications, obtained from a base antenna to which some modifications are made. The proximity of the antennas causes a mutual coupling phenomenon thus generating an apparent modification of their characteristics. It is therefore crucial to have the minimum level of insulation…
Read MoreDynamic Behavior of Multi-Story Concrete Buildings Based on Non-Linear Pushover & Time History Analyses
In many countries and regions in the world, earthquakes are one of the most common natural disasters, which affect both human life and property. To avoid negative effects of earthquake, the nonlinear response of structures under dynamic loading should be accurately modeled to investigate their actual behavior under earthquake loading to ensure safe and sound…
Read MoreFramework for Automation of Cloud-Application Testing using Selenium (FACTS)
A framework is an amalgamation of integrated tools, libraries, utilities and its coordination to interact with the other automation components. The motive of designing a test automation framework is to implement uniform standards towards automation throughout the organization to achieve the desired outcomes. Test automation framework is required to maintain the standardization of the activities…
Read MoreA Method for Mosaicking Aerial Images based on Flight Trajectory and the Calculation of Symmetric Transfer Error per Inlier
In recent years, development of aerial autonomous systems and cameras have allowed increasing enormously the number of aerial images, and their applications in many research areas. One of the most common applications is the mosaicking of images to improve the analysis by getting representations of larger areas with high spatial resolution. This paper describes a…
Read MoreA Study on the Efficiency of Hybrid Models in Forecasting Precipitations and Water Inflow Albania Case Study
Climatic changes have a significant impact on many real life processes. Climacteric position of Albania makes precipitations and water inflows in HPP the main variables influencing the amount of electric energy produced in the country. Taking into account their volatility it has considerably increased the need of using hybrid models to improve the quality of…
Read MoreStrategies of the Level-By-Level Approach to the Minimal Route
The task of optimal path planning for drilling tool with numerical control is considered. Such tools are used in the production of printed circuit boards. The algorithm modification of level-by-level route construction for the approximate solution of the traveling salesman problem is discussed. Bypass objects can be specified either as a table of distances or…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MoreStructural Optimization of Wavy FinFET for Leakage Reduction and Performance Enhancement
Wavy FinFET is a hybrid device that integrates FinFET and Ultrathin Body FET technologies on SOI platform to provide high density and drivability without causing area penalty. The problem associated with this device is higher leakage and lower threshold voltage. This problem can be solved by structural modification of the device. This work analyses the…
Read More
