Results (22)
Search Parameters:
Keyword: TraceValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreTowards a Documents Processing Tool using Traceability Information Retrieval and Content Recognition Through Machine Learning in a Big Data Context
In 1980, an application was developed to track, manage and store documents in electronic format. Scan technology has enabled organizations to digitize papers for easier document storage and tracking. Document management tools have since developed by introducing new functionalities, related to security, users services, workflow and audit. Our research is part of the context of…
Read MoreTrace-Driven Simulation of LoRaWAN Air Channel Propagation in an Urban Scenario
Long-range, Low-Power Wide Area Network (LoRaWAN) is a very scalable solution for the Internet of Things (IoT). Due to the air channel environment’s complexity, connectivity is a crucial parameter for successfully planning and deploying the IoT networks. Measurements and simulations have been used to evaluate LoRaWAN propagation models in the Urban environment, but it is…
Read MoreAn Overview of Traceability: Towards a general multi-domain model
Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…
Read MoreFederated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review
The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…
Read MoreAdvancements in Explainable Artificial Intelligence for Enhanced Transparency and Interpretability across Business Applications
This manuscript offers an in-depth analysis of Explainable Artificial Intelligence (XAI), em- phasizing its crucial role in developing transparent and ethically compliant AI systems. It traces AI’s evolution from basic algorithms to complex systems capable of autonomous de- cisions with self-explanation. The paper distinguishes between explainability—making AI decision processes understandable to humans—and interpretability, which provides…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreKamphaeng Saen Beef Cattle Identification Approach using Muzzle Print Image
Identification of Kamphaeng Saen beef cattle is important of the registration and traceability purposes. For a traditional identification methods, Hot Branding, Freeze Branding, Paint Branding, and RFID Systems can be replaced by genius human. This paper proposed a Kamphaeng Saen beef cattle identification approach using muzzle print images as an Animal Biometric approach. There are…
Read MoreBlockchain Technology-Based Good Distribution Practice Model of Pharmacy Industry in Indonesia
Distribution is the main activity in integrated product supply chain management. In the pharmaceutical industry, the process of drug distribution is important because of the handling, storage, and distribution of medicinal products with good standards and quality. The problem that occurs in the pharmaceutical industry is the circulation of counterfeit drugs by related parties, for…
Read MoreBlockchain Technology for Tracing Drug with a Multichain Platform: Simulation Method
This study builds the implementation of the traceability process by conducting simulation tests using business process simulations with the implementation of blockchain technology to track drugs. This research focus involved stakeholders, including the pharmaceutical industry, pharmaceutical wholesalers (distributors/wholesalers), health services (drug stores, hospitals), consumers. Simulation methods are used to describe the distribution and traceability of…
Read MoreRecording of Student Attendance with Blockchain Technology to Avoid Fake Presence Data in Teaching Learning Process
University operational activities are a routine part of university operations and supervisory control and monitoring function. The low controlling and monitoring of operational activities can cause irrelevance in the teaching and learning process. A graduate may have a graduation document but has never attended the teaching and learning process. An official institution can issue this…
Read MorePersonality Measurement Design for Ontology Based Platform using Social Media Text
Human behavior quantification is an essential part of psychological science. One of the cases is measuring human personality. Social media provide rich text, which can be beneficial as a data source to get valuable insight. Previous researches show that social media offered favorable circumstances for psychological researchers by tracking, analyzing, and predicting human character. In…
Read MoreWell Balanced Multi-value Sequence and its Properties Over Odd Characteristic Field
The authors propose a well balanced multi-value sequence (including a binary sequence). All the sequence coe_cients (except the zero) appear almost the same in number, thus, the proposed sequence is so called the well balanced sequence. This paper experimentally describes some prominent features regarding a sequence, for instance, its period, autocorrelation, and cross-correlation. The value…
Read MoreDistribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field
The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreQ-Learning versus SVM Study for Green Context-Aware Multimodal ITS Stations
Intelligent Transportation Systems (ITS) applications can take big advantage of Context Awareness approaches. Parameters such as user mobility, passengers comfort reaction and pollution emission levels (CO2) can enrich such applications during the decision making phase. Moreover, the expanding in ITS services offers great opportunities for travelers to find the best route to reach their destinations…
Read MoreA Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security
During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…
Read MoreModel-based Development of Safety-critical Functions and ISO 26262 Work Products using modified EAST-ADL
Safety is becoming more and more important with the ever increasing level of safety related E/E Systems built into the cars. Increasing functionality of vehicle systems through electrification of power train, in future even more by autonomous driving, leads to complexity in designing system, software and safety architecture. ISO 26262 aims to reduce the complexity…
Read MoreModelization of cognition, activity and motivation as indicators for Interactive Learning Environment
In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read More
