Vision device is a critical component of fruit harvesting mobile robot which is designed for recognizing and harvesting of tomato fruits. The system of vision device of the moving robot, for a dedicated path identific...
详细信息
The positioning accuracy of various kinds of devices is often calculated by using Wi-Fi fingerprints as a data source of Received Signal Strength (RSS). Through different matching algorithms, these RSS values are rela...
详细信息
Purpose: The purpose of this paper is to design a system deployment model that integrates case-based agent technique to develop an eco-responsibility decision support tool for greening educational institutions toward ...
详细信息
Purpose: The purpose of this paper is to design a system deployment model that integrates case-based agent technique to develop an eco-responsibility decision support tool for greening educational institutions toward environmental responsibility. Design/methodology/approach: Data were collected through questionnaires distributed among a statistical population that comprised practitioners across educational institutions in Malaysia that implement green practices. The questionnaire measured the feasibility of the developed tool based on factors derived from the literature. Accordingly, descriptive, exploratory and factor analysis approach using statistical package for social sciences (SPSS) was used to test the feasibility of the developed tool. Findings: Results from descriptive analysis confirm the tool is feasible based on mean values that range from 4.1619 to 3.6508 on a five-point scale, indicating that the tool is effective in sustaining educational institutions going green. Besides, results from exploratory analysis verify the reliability of the tool based on the acceptable Cronbach’s alpha reliability coefficient score higher than 0.7 and Kaiser–Meyer–Olkin value being above 0.5. Finally, results from factor analysis reveal that the developed tool is usable, efficient, helpful, flexible and credible and supports educational institutions in going green at 88.44 per cent of the total variance, suggesting that the respondents are satisfied with the tool. Research limitations/implications: The sample population in this study comprises only practitioners from educational institutions in Malaysia. Theoretically, this research provides feasibility factors and associated items that can be used in evaluating developed information systems. Practical implications: Practically, this study develops an eco-responsibility decision support tool to facilitate green strategies and provides information on how practitioners in educational institutions can improve green growth. So
Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down ...
详细信息
Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down targeted victim. CICFlowMeter tool generates bi-directional flows from packets. Each flow generates 83 of different features. The research focuses on 8 features which are active min (f1), active mean (f2), active max (f3), active std (f4), idle min (f5), idle mean (f6), idle max (f7), and idle std (f8). CICFlowMeter tool has several problems that affected on the detection accuracy of DDoS attacks. The idle and active based feature of Shannon entropy and sequential probability ratio test (SE-SPRT) approach was implemented in this research. The problems of original CICFlowMeter were presented, and the differences between original and revised version of CICFlowMeter tool were explored. The DARPA database and confusion matrix were used to evaluate the detection technique and present the comparison between two versions of CICFlowMeter. The detection method detected neptune and smurf attacks and had higher accuracy, f1-score, sensitivity, specificity, and precision when revised version of CICFlowMeter used to generate flows. However, the detection method failed to detect neptune attack and had higher miss-rate, lower accuracy, lower f1-score, and lower specificity, and lower precision when original version used in generating flows.
Modern embedded computing systems (ES) include heterogeneous components connected “horizontally” and “vertically”, and it demands developing individual quality control design flows for each project. This article d...
ISBN:
(数字)9781728169491
ISBN:
(纸本)9781728169507
Modern embedded computing systems (ES) include heterogeneous components connected “horizontally” and “vertically”, and it demands developing individual quality control design flows for each project. This article discusses the problem of formalizing end-to-end testing and debugging processes in full-stack ES designs. An ontology of ES testing and debugging processes from the multi-level organization point of view and a number of models are proposed using a unified representation of testing, verification, validation and debugging problems at various levels of abstraction. This allows to formally specify a testing and debugging flow of an arbitrary ES design with transition systems describing different states of design process. The application of the proposed solutions provides: control of the coverage of system components by verification and validation processes; identification of gaps in the testing and debugging processes; monitoring of the completed verification and validation steps of system components at different levels.
The fuzzy min-max (FMM) neural network is one of the most powerful neural networks that combines neural network and fuzzy set theory into a common framework for tackling pattern classification problems. FMM neural net...
详细信息
The aim of the research is a 3D point matching which uses models from different sources to union them in the general coordinate system to create a high-accuracy scene from the 3D scanner. There are several images from...
详细信息
An application-specific processor CAD system is a complex software system with high dependability requirement. Verification of such system is a complicated process which involves many closely connected components, dif...
ISBN:
(数字)9781728169491
ISBN:
(纸本)9781728169507
An application-specific processor CAD system is a complex software system with high dependability requirement. Verification of such system is a complicated process which involves many closely connected components, different computational process representation and tools, and requires much time and work. In the article, the authors describe their experience of usage property-based testing in the NITTA project (application-specific reconfigurable processor CAD for real-time application). Property-based testing allowed to significantly improve source code coverage and identify many hard to find bugs. The article will be interesting to CAD developers and as a real-world property-based testing application example.
Currently, there is an unsolved problem of IoT device authentication in networks to ensure their security. Due to low performance, work with traditional methods of protection is complicated and therefore a different a...
详细信息
Over the past years, the main objective of database management systems was to store data and give users the possibility to manipulate those data. SQL databases were sufficient in the first time, but with the evolution...
详细信息
暂无评论