The impact of cyber security attacks increased globally, implementing proper security standards to protect data in the cyber environment has been prioritized, while assets are also at risk of being exploited through p...
The impact of cyber security attacks increased globally, implementing proper security standards to protect data in the cyber environment has been prioritized, while assets are also at risk of being exploited through physical security breaches. Considering the potential risk of Radio Frequency Identification (RFID) cards being lost or stolen, third parties can effortlessly gain the privileges of an authorized person. In this paper, we propose a design for a secure access control system that operates on an Android phone with multi-factor authentication to enable secure access control systems. For this purpose, the authorized users are registered in a database that can be accessed by the access control system when the user authenticates his$\backslash$her credentials with a login/password as well as biometric data from his$\backslash$her smartphone. This system works when the user is 10 meters away from the access control system, after that the user will be asked to submit his$\backslash$her biometric credentials. The database then compares the user’s keys and grants access if authentication is successful. This design is intended to reduce the number of cases in which unauthorized access to a restricted area. The observed results clearly meet the required security of physical access control systems.
Selecting an appropriate site for solar power plants is a critical long-term investment decision to maximize solar energy generation while minimizing investment and operational costs and ensuring environmental sustain...
Selecting an appropriate site for solar power plants is a critical long-term investment decision to maximize solar energy generation while minimizing investment and operational costs and ensuring environmental sustainability. While solar irradiance has traditionally been the primary factor in site selection, accounting for disaster risk assessment is becoming increasingly crucial, particularly in countries prone to natural disasters. Hawkes Bay, New Zealand, holds great promise as a region with high solar potential. Yet, it is susceptible to natural disasters like earthquakes, landslides, and floods. This research aims to identify the most suitable solar farm location in Hawkes Bay by integrating estimated solar energy production with disaster risk assessment. The study employs a two-stages multi-criteria decision-making (MCDM) approach, combining data envelopment analysis (DEA) and the analytical hierarchy process (AHP), alongside the utilization of geographical information system (GIS) technology. The finding, among 15 candidate locations, the area in a 5 km radius of Te Haroto weather station has the most potential for solar PV farms. 82 % of the location has low disaster risk, and only 7% of the area is considered high risk.
Size is one of the significant factors associated with bugs, and it has been used to predict software faults. We believe that stratifying software files based on size can play an essential role in improving prediction...
详细信息
ISBN:
(纸本)9781450397605
Size is one of the significant factors associated with bugs, and it has been used to predict software faults. We believe that stratifying software files based on size can play an essential role in improving prediction performance. This study explored the effect of size by stratifying our sample based on each unit’s size and distributing software units in multiple stratified groups based on an equal distribution approach. We stratified the Eclipse Europa project files, and we reported the performance of each stratified group and compared them. We used two popular classifiers, decision tree J48, and random forest, to implement this experiment. These classifiers presented similar results on the same group of files. The results indicated that predicting faults with large files is better than predicting those in small files. In addition, the results showed higher median values of all performance measures and less variation in each measure.
The DC link capacitor discharge in the event of a DC fault is rapid and contains high frequencies. This rapid discharge of high current and frequency interface with DC bus, Voltage Source Converter (VSC), and AC sourc...
详细信息
ISBN:
(数字)9781665464543
ISBN:
(纸本)9781665464550
The DC link capacitor discharge in the event of a DC fault is rapid and contains high frequencies. This rapid discharge of high current and frequency interface with DC bus, Voltage Source Converter (VSC), and AC source. This interface damages the equipment and possibly living beings in proximity. Therefore, it is necessary to develop a topology to detect and identify fault types promptly, along with the isolation and restoration of the system. This study introduces an improved novel fault detection technique using the Highpass Chebyshev type 2 filter due to its flatter pass-band response. Further, the polarities of peaks obtained from the fault detection calculation are used again for another proposed novel fault location method. It identifies fault types to locate and isolate the faulty system using only polarities of amplitude response peaks. In the simulation, both methods were fast and accurate in detecting, locating, and identifying appropriate fault types only by High Pass Filter (HPF) amplitude response peaks and their polarities.
Opioid abuse and dependence have emerged as a pressing global concern, posing significant challenges to public health and society. Early identification and prediction of opioid dependency represent crucial steps in mi...
Opioid abuse and dependence have emerged as a pressing global concern, posing significant challenges to public health and society. Early identification and prediction of opioid dependency represent crucial steps in mitigating its abuse impact on individuals and communities. The application of machine learning techniques to analyze medical data has opened new avenues for achieving this goal. While this field and the prediction is still in its infancy, our research explores the potential of several machine learning algorithms including LightGBM for this risk prediction. To tackle the inherent class imbalance in the MIMICIII dataset, we implemented the Synthetic Minority Oversampling Technique (SMOTE). We developed predictive models using four distinct algorithms: decision trees, random forests, support vector machines, and LightGBM. These models were meticulously evaluated to assess their performance. Ultimately, our findings revealed that the LightGBM model outperformed the other algorithms, demonstrating superior accuracy and achieving a higher Area Under the Curve value. This outcome underscores the potential of LightGBM as a valuable algorithm in the early prediction of the risk of opioid dependence, thereby offering substantial benefits to both patients and society at large.
The paper proposes a cryptographic protocol two-factor authentication with the zero-knowledge over the extended field GF(2 m ) on elliptic curves using biometric data and private key of the user. The implementation of...
The paper proposes a cryptographic protocol two-factor authentication with the zero-knowledge over the extended field GF(2 m ) on elliptic curves using biometric data and private key of the user. The implementation of a cryptographic protocol with zero-knowledge proof based on elliptic curves allows significantly reducing the size of protocol parameters and increasing the cryptographic strength (computational complexity of the breaking). The cryptographic protocol was modeled in the High-Level Protocol Specification Language, the model validation and protocol verification was performed using the Security Protocol Animator tool for Automated Validation of Internet Security Protocols and Applications. The software verification of the cryptographic protocol was performed using the software modules On the Fly Model Checker and Constraint Logic based Attack Searcher.
Symbols such as numerical sequences, chemical formulas, and table delimiters exist widely, playing important roles in symbol-related tasks such as abstract reasoning, chemical property prediction, and tabular question...
详细信息
In this review, we survey the fundamental problems and their solvers in molecular property prediction problems: graph neural networks modeling and uncertainty estimation. Molecules are naturally represented with graph...
详细信息
Alzheimer's disease (AD) is a slowly progressive neurodegenerative disease, which necessitates early and accurate diagnosis for effective management. This research presents a comprehensive approach to the classifi...
详细信息
ISBN:
(数字)9798331510503
ISBN:
(纸本)9798331510510
Alzheimer's disease (AD) is a slowly progressive neurodegenerative disease, which necessitates early and accurate diagnosis for effective management. This research presents a comprehensive approach to the classification of Alzheimer's disease using Magnetic Resonance Imaging (MRI) scans, focusing on four distinct classes: nondemented, mild, very mild, and moderate demented. Our main goals are to combine diverse datasets to improve the robustness and adaptability of the model and to fully investigate Alzheimer's disease in all four stages. To achieve these goals, we employed a combination of machine learning and deep learning models. The models utilized include Histogram of Oriented Gradients (HOG) with Support Vector Machine (SVM), Gabor filters with SVM, Gabor-Gray Level Co-occurrence Matrix (GLCM) with SVM, ResNet50, AlexNet, and InceptionV3. Among these, the InceptionV3 model achieved the highest accuracy of 96.20% using 5-fold crossvalidation followed the Resnet50 model achieving accuracy of 95.43%. Our approach addresses key challenges such as class imbalance, high intra-class variation, inter-class similarities, and dataset variability, demonstrating significant potential in improving Alzheimer's disease classification and detection.
Fingerprints are crucial in identification of humans. The uniqueness of finger prints makes it an interesting subject. Fingerprints are termed as a technique used to define, assess, and quantify a person's physica...
Fingerprints are crucial in identification of humans. The uniqueness of finger prints makes it an interesting subject. Fingerprints are termed as a technique used to define, assess, and quantify a person's physical and behavioral property. Deep learning has made its application in all the major fields such as natural language processing, computer vision and speech processing. Deep learning has also found its application in the important subject of fingerprint synthesis and biometric. The ever-growing complexity of fingerprint authentication issues, from cellphone authentication to airport security systems, seems to be best handled by these models. In recent years, deep learning-based models have been used more and more to raise the accuracy of various fingerprint recognition systems. The persuasive capacity of Generative Adversarial Networks (GANs) to generate believable instances can be credibly taken from an existing distribution of samples. GAN exhibits exceptional performance on data generation-based tasks and also encourages study in privacy and security. In this work, using Adaptive Deep Convolution Generative Adversarial Networks (ADCGAN), we develop a model that generates and authenticate the fingerprints. A Socofing dataset was trained on ADGAN model. The model gave 92% accuracy. The conduct of fingerprint research has been made possible due to ADGAN, without restrictions related to the confidential nature of biometric data.
暂无评论