This paper proposes a new chaos-based extremum coding method to realize a true random number generator (RNG). Based on the chain rule, we innovatively introduce two parameters into the dynamics of chaotic systems to m...
详细信息
Solar energy is one of the most abundant sources of renewable energy in Indonesia. Solar energy is now typically harnessed using solar panels, but the low efficiency of photovoltaic cells requires the development of o...
详细信息
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven *** ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only...
详细信息
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven *** ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of *** of the major causes of pervasive vulnerabilities is a failure to prioritize *** the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is *** cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT *** is a need to implement best practices in SDLC to address security at all *** fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and *** proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications.
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have...
详细信息
Surface-mount technology (SMT) is the technology used in the production of printed circuit boards (PCB) plays a vital role in PCB manufacturing for applications ranging from communication devices to medical systems. A...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which is directly related to the detection reliability and *** this paper,a strategy is proposed to integrate three currently competitive WA's evaluation ***,a conventional evaluation method based on AEF statistical indicators is *** evaluation approaches include competing AEF-based predicted value intervals,and AEF classification based on fuzzy *** AEF attributes contribute to a more accurate AEF classification to different *** resulting dynamic weighting applied to these attributes improves the classification *** evaluation method is applied to evaluate the WA of a particular AEF,to obtain the corresponding evaluation *** integration in the proposed strategy takes the form of a score *** cumulative score levels correspond to different final WA *** imaging is performed to visualize thunderstorm activities using those AEFs already evaluated to exhibit thunderstorm *** results confirm that the proposed strategy effectively and reliably images thunderstorms,with a 100%accuracy of WA *** is the first study to design an integrated thunderstorm detection strategy from a new perspective of WA evaluation,which provides promising solutions for a more reliable and flexible thunderstorm detection.
Micro-expressions are spontaneous, rapid and subtle facial movements that can hardly be suppressed or fabricated. Micro-expression recognition (MER) is one of the most challenging topics in affective computing. It aim...
详细信息
Autism Spectrum Disorder(ASD)is a neurodevelopmental condition characterized by significant challenges in social interaction,communication,and repetitive *** and precise ASD detection is crucial,particularly in region...
详细信息
Autism Spectrum Disorder(ASD)is a neurodevelopmental condition characterized by significant challenges in social interaction,communication,and repetitive *** and precise ASD detection is crucial,particularly in regions with limited diagnostic resources like *** study aims to conduct an extensive comparative analysis of various machine learning classifiers for ASD detection using facial images to identify an accurate and cost-effective solution tailored to the local *** research involves experimentation with VGG16 and MobileNet models,exploring different batch sizes,optimizers,and learning rate *** addition,the“Orange”machine learning tool is employed to evaluate classifier performance and automated image processing capabilities are utilized within the *** findings unequivocally establish VGG16 as the most effective classifier with a 5-fold cross-validation ***,VGG16,with a batch size of 2 and the Adam optimizer,trained for 100 epochs,achieves a remarkable validation accuracy of 99% and a testing accuracy of 87%.Furthermore,the model achieves an F1 score of 88%,precision of 85%,and recall of 90% on test *** validate the practical applicability of the VGG16 model with 5-fold cross-validation,the study conducts further testing on a dataset sourced fromautism centers in Pakistan,resulting in an accuracy rate of 85%.This reaffirms the model’s suitability for real-world ASD *** research offers valuable insights into classifier performance,emphasizing the potential of machine learning to deliver precise and accessible ASD diagnoses via facial image analysis.
The study targets uncertain coupling faults in robotic arm actuators and proposes a new fault-tolerant visual servo control strategy. Specifically, it considers both multiplicative and additive actuator faults within ...
详细信息
An Opportunistic Network (OppNet), as opposed to a ubiquitous centralized network, relies on sporadic and opportunistic encounters between nodes to facilitate communication. The uncertainty about the node's nature...
暂无评论