Results (15)
Search Parameters:
Keyword: TaxonomyTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreRouting Protocols for VANETs: A Taxonomy, Evaluation and Analysis
VANET as a subclass of MANET is composed of a set of vehicles equipped with wireless transceivers, to build dynamic networks without the need of any pre-existing infrastructure. Over the last few decades, the area of routing protocols in VANETs has been extensively studied. Nevertheless, this area remains even more challenging due to some features…
Read MoreThe Financial Services Authority of Indonesia E-Reporting System Development Based on Metadata XBRL Taxonomy
The XBRL taxonomy has been proven to be able to restore various forms of redundancies and ambiguities in making financial reports from financial service institutions. However, the nature of XBRL which is oriented towards documents and based on XML makes the XBRL taxonomy difficult to use because the information cannot be directly read by ordinary…
Read MoreSCMS: Tool for Assessing a Novel Taxonomy of Complexity Metrics for any Java Project at the Class and Method Levels based on Statement Level Metrics
Software is the primary and indispensable entity in our technologically driven world. Therefore, quality assurance, and in particular software testing, represents a vital component in the software development cycle. Throughout the years, many tools have been developed to collect metrics of software that had been implemented. These tools have some differences but continue to play…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreA Novel Metric for Evaluating the Stability of XAI Explanations
Automated systems are increasingly exerting influence on our lives, evident in scenarios like AI-driven candidate screening for jobs or loan applications. These scenarios often rely on eXplainable Artificial Intelligence (XAI) algorithms to meet legal requirements and provide understandable insights into critical processes. However, a significant challenge arises when some XAI methods lack determinism, resulting in…
Read MoreInfrastructure-as-a-Service Ontology for Consumer-Centric Assessment
In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…
Read MoreIndoor Positioning: Comparing Different Techniques and Dealing with a user Authentication use Case
Indoor positioning is a complex issue with many, heterogeneous application cases, each one presenting different requirements and environments. In such a complex ecosystem, an agile taxonomy is needed to be able to select a proper solution for a given scenario, as well as practical recommendations for the most used solutions. Besides providing these tools, we…
Read MoreOnline Support for Tertiary Mathematics Students in a Blended Learning Environment
The context for the study was a naturally occurring quasi-experiment in the core mathematics program in a large Australian university. Delivery of teaching was changed in a sequence of two initial core mathematics subjects taken by engineering and science students. The change replaced one of two face-to-face tutorial classes per week by an online tutorial.…
Read MoreLeveraging Energy Efficiency Investments: An Innovative Web-based Benchmarking Tool
Energy Efficiency (EE) plays a key role in decreasing energy consumption at a European level, while it is considered as one of the most cost-efficient means to achieve carbon reduction and reinforce energy sufficiency and security. EE financing is imperative to implement measures that will lead to achieving the desired carbon neutrality and, thus, avert…
Read MoreLearning Path Recommendation using Hybrid Particle Swarm Optimization
Revised Bloom’s Taxonomy (RBT) is proposed in general to look more forward in responding to the demands of the developing educational community, including how students develop and learn and how teachers prepare Learning Objects (LO). The variety of characteristics of students’ abilities in a class has always been a problem that is often faced by…
Read MoreContextual Word Representation and Deep Neural Networks-based Method for Arabic Question Classification
Contextual continuous word representation showed promising performances in different natural language processing tasks. It stems from the fact that these word representations consider the context in which a word appears. But until recently, very little attention was paid to the contextual representations in Arabic question classification task. In the present study, we employed a contextual…
Read MoreAn Explanatory Review on Cybersecurity Capability Maturity Models
Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…
Read MoreStudent Performance Evaluation Using Data Mining Techniques for Engineering Education
In this research work, we are implementing a student performance evaluation model using Mamdani Fuzzy Inference System (FIS) and Neuro Fuzzy system and comparing the results with classical averaging method for Network Analysis (NA) course studied by third semester Electronics and Communication Engineering students. This work explains the designing of scoring rubrics using Bloom’s levels…
Read MoreGNSS Positioning in Non-line-of-Sight Context—a Survey for Technological Innovation
Reliable, available and accurate localization of people and vehicles is one crucial requirement for intelligent transportation systems (ITSs). This has led to a variety of technical approaches in recent years. Towards an exact positioning via Global Navigation Satellite Systems (GNSSs) the visibility of satellites is an important factor. In this paper, we review the literature…
Read More
