We propose and analyze a nonlinear dynamic model of continuous-time multi-dimensional belief formation over signed social networks. Our model accounts for the effects of a structured belief system, self-appraisal, int...
详细信息
The impact of cyber security attacks increased globally, implementing proper security standards to protect data in the cyber environment has been prioritized, while assets are also at risk of being exploited through p...
The impact of cyber security attacks increased globally, implementing proper security standards to protect data in the cyber environment has been prioritized, while assets are also at risk of being exploited through physical security breaches. Considering the potential risk of Radio Frequency Identification (RFID) cards being lost or stolen, third parties can effortlessly gain the privileges of an authorized person. In this paper, we propose a design for a secure access control system that operates on an Android phone with multi-factor authentication to enable secure access control systems. For this purpose, the authorized users are registered in a database that can be accessed by the access control system when the user authenticates his$\backslash$her credentials with a login/password as well as biometric data from his$\backslash$her smartphone. This system works when the user is 10 meters away from the access control system, after that the user will be asked to submit his$\backslash$her biometric credentials. The database then compares the user’s keys and grants access if authentication is successful. This design is intended to reduce the number of cases in which unauthorized access to a restricted area. The observed results clearly meet the required security of physical access control systems.
Advances in intensive care have improved the survival rate of patients with severe acute brain injury, but diagnostic errors for patients with disorders of consciousness are still high. Accurate diagnosis of these pat...
详细信息
Most financial lending systems in use today are based on a single service platform, transactions are opaque, and the majority of system participants can be tracked back to Mechanisms for protecting data privacy are no...
Most financial lending systems in use today are based on a single service platform, transactions are opaque, and the majority of system participants can be tracked back to Mechanisms for protecting data privacy are not strong enough to withstand cyberattacks. We suggest lending over the block chain (LoC), a cutting-edge finance and credit facility built on smart contracts on a block chain hyper ledger fabric, as a solution to these problems. We use the poverty level for Chinese loans as an example. We create a digital accounting model to transfer assets between decentralized and centralized ledgers and suggest smart contract closing and unlocking methods. To safeguard the privacy of data, we established digital signatures and oracles. The opening rule's and the chain rule's performance evaluation demonstrates the applicability of our system in actual loan situations.
This paper delves into the application and capabilities of machine learning methodologies in forecasting poverty scenarios, underlining the importance of varied data sources, along with the interpretability and explai...
详细信息
The outbreak of the coronavirus disease (COVID-19) has had a profound impact on education worldwide. The rise of remote learning is one of the most significant changes in this regard, as many schools and universities ...
The outbreak of the coronavirus disease (COVID-19) has had a profound impact on education worldwide. The rise of remote learning is one of the most significant changes in this regard, as many schools and universities were forced to close down by regional health authorities. This has also caused people to become more conservative in trade-offs between healthcare and education. Google Trends is the most common tool for analyzing online search behaviors. It is a free resource that provides information on the trends and changes in users' online interests over time based on certain terms and subjects. The online search queries on Google can be used to assess users' behaviors concerning online learning to forecast their choices regarding online education. This paper examines the frequency of users' web searches for online communication tools, courses, and learning terms. We statistically compared users in the Middle East and North Africa regions by using the volumes of searches recorded on Google Trends from January 2016 to August 2022. Moreover, we used machine learning techniques to identify differences among the keywords used. The findings statistically show that COVID-19 has led to an increase in the extent of students' attention to and interest in online learning.
This paper evaluates the uncertainty in energy generation of a 12 kW p microgrid (MG)-connected solar photovoltaic (PV) system located at the University of Kashan campus. The study compares long-term recorded measure...
This paper evaluates the uncertainty in energy generation of a 12 kW p microgrid (MG)-connected solar photovoltaic (PV) system located at the University of Kashan campus. The study compares long-term recorded measurements and PVsyst simulations for energy generation of PV systems over the course of a year. It is focused on specific yield and the deviation between the measured net energy generated by the PV facility and the calculated useful produced energy by PVsyst software. The results indicate a significant difference between the output power and the simulation results from PVsyst during colder months. However, in warmer months, the disparity between recorded measurements and simulated results is less than 10%. The largest deviation occurs in November, where the difference exceeds 35%. Generally, PVsyst software estimates the energy output from the PV system with an uncertainty of less than 10%. These findings contribute to understanding the variability in PV power generation and developing effective energy management strategies. Such strategies are crucial for ensuring a reliable power supply within an MG.
This research aims to develop a comprehensive system for Sinhala Sign Language (SSL) that includes a learning system, dynamic sign detection, audio/video to sign conversion, and vocal training. SSL plays a crucial rol...
This research aims to develop a comprehensive system for Sinhala Sign Language (SSL) that includes a learning system, dynamic sign detection, audio/video to sign conversion, and vocal training. SSL plays a crucial role in facilitating communication for individuals who are deaf or hard of hearing in Sri Lanka. The learning system provides a platform for learning SSL and includes a text-to-sign language interpreter. The dynamic sign detection system uses computer vision techniques to identify and interpret dynamic signs accurately. The audio/video to sign conversion system bridges the gap between spoken language and SSL by converting auditory information into visual representations. The vocal training system focuses on enhancing the vocal skills of cochlear implanted children. This research contributes to the development of effective communication and language skills for SSL users.
This paper proposes a method enabling mobile LoRa gateways to support mobile end devices. The approach utilizes trilateration and similar approaches based on RSSI to estimate the position of end devices and specify th...
详细信息
ISBN:
(数字)9798350377644
ISBN:
(纸本)9798350377651
This paper proposes a method enabling mobile LoRa gateways to support mobile end devices. The approach utilizes trilateration and similar approaches based on RSSI to estimate the position of end devices and specify the movement of the gateways to maintain contact. The evaluation of the proposed method tests various parameters such as speed and number of end devices, and it shows that it is able to retain contact even with speeds up to 12 mps. Moreover, the evaluation shows that the ADR-MIN algorithm performs better in this scenario than the default ADR.
In today's world with a plethora of options available on movie content, it is very important to have models which could classify these large contents based on their genres. Movies are the most widely entertaining ...
详细信息
暂无评论