Results (38)
Search Parameters:
Keyword: ProbabilityEliminating Target Anopheles Proteins to Non-Target Organisms based on Posterior Probability Algorithm
Capturing similarity in gene sequences of a target organism to detect significant regions of comparison will most likely occur because genes share a related descendant. Local sequence alignment for the targeted organisms can help preserve associations among sequences of related organisms. Such homologous genes possess identical sequences with common ancestral genes. The genes may be…
Read MoreEmpirical Probability Distributions with Unknown Number of Components
We consider the estimation of empirical probability distributions, both discrete and continuous. We focus on deriving formulas to estimate number of categories for the discrete distribution, when the number of categories is hidden, and the means and methods to estimate the number of components in the Gaussian mixture model representing a probability density function given…
Read MoreCall Arrival Rate Prediction and Blocking Probability Estimation for Infrastructure based Mobile Cognitive Radio Personal Area Network
The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power…
Read MoreLow Probability of Interception Beampattern Using Frequency Diverse Array Antenna
Frequency diverse array (FDA) antenna employs a small frequency increment, as compared with the carrier frequency, across antenna array elements. The use of a frequency increment generates an array factor that is dependent on angle, time, and the range and this yields a range and angle dependent beampattern. In this paper, a transmit array beamforming…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreSensitive Analysis in Holding and Penalty Costs for the Stochastic Sequencing Problem in Agile Manufacturing
In agile manufacturing, due to the desire to meet customer’s requirements, processing times are stochastic because operations could be done by robots or humans. This can cause several problems in scheduling the jobs, and it is necessary to select the dispatch rule with the least change in costs and times, to respond quickly to different…
Read MoreAn Analysis of the Reliability of Reported COVID-19 Data in Western Balkan Countries
More than one year after the outbreak of the COVID-19 pandemic the behavior of figures published by official sources of the countries are skeptical for the public. Many probability tests are used to detect the reliability of information among which Benford’s Law. This study focused on the Western Balkan countries, as one of the foremost…
Read MoreEvaluation the Effects of Climate Change on the Flow of the Arkansas River – United States
The behavior of rivers’ hydrology and flow under changing climate has been an objective of interest for long time. In this study the impacts of climate change on streamflow of the Arkansas River will be investigated. The paper is an extension of work originally presented in ASET conference in Dubai. The Arkansas River is a…
Read MoreTowards a Hybrid Probabilistic Timing Analysis
Real-time embedded systems are widely adopted in applications such as automotive, avionics, and medical care. As some of these systems have to provide a guaranteed worst-case execution time to satisfy the time constraints, understanding the timing behaviour of such systems is of the utmost importance regarding the reliability and the safety of these systems. In…
Read MoreTraffic Aggregation Techniques for Optimizing IoT Networks
Internet of Things (IoT) is changing the world through a new wave of revolution for communications technologies that are no more limited to the human being. One of the main challenges that result from the exponential spread of IoT technology is the difference in the traffic characteristics between classical human communications and advanced things communications.…
Read MoreA Case Study to Enhance Student Support Initiatives Through Forecasting Student Success in Higher-Education
Enrolment figures have been expanding in South African institutions of higher-learning, however, the expansion has not been accompanied by a proportional increase in the percent- age of enrolled learners completing their degrees. In a recent undergraduate-cohort-studies report, the DHET highlight the low percentage of students completing their degrees in the allotted time, having remained between…
Read MoreType 2 Diabetes Risk and Physical Activity in outpatients treated in Health Centers in a District of North Lima, 2020
Diabetes Mellitus Type 2 is a chronic disorder that affects the way the body metabolizes sugar (glucose) in the blood and depends on a combination of risk factors, such as genes and lifestyle. Although certain risk factors such as family history, age, or ethnicity cannot be changed, those related to diet, physical activity, and weight…
Read MorePerformance Analysis of Selective Repeat ARQ Protocol Used in Digital Data Transmission Over Unreliable Channels
Stop and Wait (SW) ARQ, Go Back N (GBN) ARQ, and Selective Repeat (SR) ARQ are the main ARQ (Automatic-Repeat-reQuest) protocols used to ensure reliable delivery of digital data at correct sequence. These protocols are implemented at the DLC (Data Link Control) sub layer of Data Link Layer (DLL) of OSI (Open System Interconnection) network…
Read MoreSemiclassical Theory for Bacteria Motility Under External Electric Fields and Interactions with Nanodevices
The accurate identification and characterization of microbiological species is a must that allows us to design engineered pharmacology to tackle down the diversity of diseases derived of them. This paper presents a study about the usage of both classical dynamical and electrodynamics in conjunction to the Feynman’s path integral to describe as well as identify…
Read MoreAnalysis of Security-Reliability Trade-off for Multi-hop Cognitive Relaying Protocol with TAS/SC Technique
This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage probability (OP)) for a multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, in presence of a multi-antenna eavesdropper. In the considered protocol, all primary and secondary terminals are equipped with multiple antennas, and they employ transmit antenna selection (TAS)…
Read MorePerformance Analysis of Go-Back-N ARQ Protocol Used in Data Transmission Over Noisy Channels
Automatic Repeat reQuest (ARQ) protocols are used to control transmission errors in data communications. They are used at Data Link Control (DLC) sublayer of Data Link Layer (DLL) of OSI (Open Systems Interconnection) network model to achieve flow and error control and provide smooth and reliable transmission between network nodes. ARQ protocols use acknowledgments and…
Read MoreDecision Making System for Improving Firewall Rule Anomaly Based on Evidence and Behavior
Firewalls are controlled by rules which often incur anomalies. The anomalies are considered serious problems that administrators do not desire to happen over their firewalls because they cause more vulnerabilities and decrease the overall performance of the firewall. Resolving anomaly rules that have already occurred on the firewall is difficult and mainly depends on the…
Read MoreCoastal Risk Modelling for Oil Spill in the Mediterranean Sea
The accident probability estimation and the consequence analysis are based on statistical data about oil spill accident occurrence in the Mediterranean area, on the probability of different release sizes, and on the joint probability of wind speed and directions. The risk model and its evaluation have been assessed for the Mediterranean littoral considering the time…
Read MorePerformance of Robust Confidence Intervals for Estimating Population Mean Under Both Non-Normality and in Presence of Outliers
We proposed two robust confidence interval estimators, namely, the median interquartile range confidence interval (MDIQR) and the trimean interquartile range confidence interval (TRIQR) for the population mean (µ) as an alternative to the classical confidence interval. The proposed methods are based on the asymptotic normal theorem (ANT) for the sample median (MD) and the sample…
Read MoreEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreAnalysis and Improvement of an Innovative Solution Through Risk Reduction: Application to Home Care for the Elderly
The increase in the number of elderly people requires multiple efforts to maintain their well-being and health. A wide variety of products and services have been created to enable seniors to live at home for as long as possible. The market success of these solutions depends on acceptance by the different stakeholders. Older people are…
Read MoreMethodology for Assessing Synchronization Conditions in Telecommunication Devices
This paper represents analysis of principles providing maximally reliable delay estimation of signal synchronization devices in telecommunication. Clock synchronization schemes on the base of stochastic models, graph-analytic interpretation, analytical functional description and their parameters selection in case of real complex hindrance are analyzed. Dependences between dispersion of maximally reliable estimation of synchronization devices and signal…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read MoreStudy of MX/M/1 Queueing System with Vacation, Two kinds of Repair facilities and Server Timeout
The present paper details a queueing model with two kinds of repair facilities and server timeout. Here the customer arrives in compound Poisson process into the system and the lifetime of the server follows exponential distribution. At the point when the system is vacant, the server waits for customers for a settled time ‘c’. If…
Read MoreA Formal Ontology-based Framework Towards an Intelligent Temporal Scheduler
Time scheduling as seen in timetabling processes with few and/or competing resources has exposed complex interoperable time scheduling. Attempts to resolving these time scheduling processes has been undertaken, using several classical methods, with difficulty due to inherent complexities, constraints and conflicting issues. The use of ontology-based approaches to resolve time complexity is recently adopted due…
Read More
