In this paper firstly we discuss an approach for supporting risk identification with the use of higher-level organizational models. We provide some intuitive metrics for extracting measures of actor criticality and vu...
详细信息
Lack of hearing ability hinders deaf children from mastering grammar in language studies. Unfortunately, such software targeting Malay language is limited. This paper attempts to generate new approach in handling such...
详细信息
Numerous remote area applications welcome standalone renewable energy power generation systems or isolated microgrids (MGs). Due to the nature of solar and wind energy, the frequency deviation control (FDC) in hybrid ...
详细信息
This paper presents a formulation of a nonlinear model predictive controller for steering of a nuclear reaction in a pressurized water reactor via control rod displacement. The predictive model, based on point kinetic...
详细信息
The use of mobile devices, including smartphones, tablets, smart watches and notebooks are increasing day by day in our societies. They are usually connected to the Internet and offer nearly the same functionality, sa...
详细信息
Table Tennis is a renowned competitive and recreational sport. An Olympic sport since 1988, table tennis in-cludes several movements, shots (i.e., strokes), and positions. Consequently, many factors can affect the str...
详细信息
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients...
详细信息
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that could be used to launch an attack. In this way the cloud will allow only the clean node to join it, eliminating the risk of some types of threats that could be caused by infected nodes.
IEEE 802.16e standard provides wide coverage and high bandwidth for subscribers in a metropolitan area network. It introduces Multicast and Broadcast Rekeying Algorithm (MBRA) which is a multicasting scheme to communi...
详细信息
Biometric technologies have been widely adopted in various commercial products, ranging from security systems to personal devices, due to their exceptional reliability and user-friendliness. Among these, palmprint bio...
详细信息
Many BDS is doomed to failure because of the missing knowledge on measuring the performance of BDS. The failure to identify the performance measurement and correct will make the problems worsen. This will complicate t...
详细信息
暂无评论