Nowadays, the movement control is troublesome for the expanding traffic. The quick addition in vehicular excursions without relating growing in street space is achieving generous blockage in various parts. This makes ...
详细信息
Mobile offloading is a platform that facilitates the distribution of computationally intensive tasks from mobile devices to the cloud or other devices in order to conserve energy and improve performance. The concept i...
详细信息
Mobile offloading is a platform that facilitates the distribution of computationally intensive tasks from mobile devices to the cloud or other devices in order to conserve energy and improve performance. The concept is practically based on the idea of exchanging relatively low communication energy for high computation power utilization. Efforts have been channeled towards energy conservation by clusters using Dynamic Power Management (DPM). This paper is a review for green energy sources for reducing energy and using energy consumption to manage sources by stating the latest studies of energy consumption and energy consumptions.
This document reports results that tend to confirm the applicability of the machine learning combined with signal processing for automatic atrial fibrillation detection from a short single lead electrocardiography rec...
详细信息
Wireless technology is advancing rapidly with time. People are doing research nowadays mostly in the field of telecommunication. VANET is the most growing research area in wireless communication. With the advancement ...
详细信息
ISBN:
(纸本)9781538662953
Wireless technology is advancing rapidly with time. People are doing research nowadays mostly in the field of telecommunication. VANET is the most growing research area in wireless communication. With the advancement and maturity of the VANET, there will be a great revolution in the field of wireless communication in terms of fast handovers, network availability, security, safety with the use of advanced applications etc. VANET technology is advancing with the passage of time but there are many issues that has to be addressed to make the network more vigorous. In view of aforesaid, in this paper we have studied and discussed various research works related to the applications, protocols and security in VANET. Moreover, after reviewing the existing works, we have analyzed them and found the pros and cons for the future research.
Ransomware attacks are a prevalent cybersecurity threat to every user and enterprise today. This is attributed to their polymorphic behaviour and dispersion of inexhaustible versions due to the same ransomware family ...
详细信息
ISBN:
(数字)9781728124858
ISBN:
(纸本)9781728124865
Ransomware attacks are a prevalent cybersecurity threat to every user and enterprise today. This is attributed to their polymorphic behaviour and dispersion of inexhaustible versions due to the same ransomware family or threat actor. A certain ransomware family or threat actor repeatedly utilises nearly the same style or codebase to create a vast number of ransomware versions. Therefore, it is essential for users and enterprises to keep well-informed about this threat landscape and adopt proactive prevention strategies to minimise its spread and affects. This requires a technique to detect ransomware samples to determine the similarity and link with the known ransomware family or threat actor. Therefore, this paper presents a detection method for ransomware by employing a combination of a similarity preserving hashing method called fuzzy hashing and a clustering method. This detection method is applied on the collected WannaCry/WannaCryptor ransomware samples utilising a range of fuzzy hashing and clustering methods. The clustering results of various clustering methods are evaluated through the use of the internal evaluation indexes to determine the accuracy and consistency of their clustering results, thus the effective combination of fuzzy hashing and clustering method as applied to the particular ransomware corpus. The proposed detection method is a static analysis method, which requires fewer computational overheads and performs rapid comparative analysis with respect to other static analysis methods.
Although, several authentication schemes have already been proposed for smart devices; however, most of these schemes does not consider the fact that smart devices come in different sizes. Hence, they are not screen s...
Although, several authentication schemes have already been proposed for smart devices; however, most of these schemes does not consider the fact that smart devices come in different sizes. Hence, they are not screen size independent — which is the point of interest in this paper. Again, alongside screen size independence, a secure scheme also must defend the aforementioned attacks. Taking these concerns into account, in this paper, a hybrid screen size independent authentication scheme is proposed for smart devices that integrates Vibration Code or VC and Press Touch Code or PTC using a juggling-based approach. Here, VC ensures resilience against the shoulder surfing attack since it is a sense based technique and hybridization of both these schemes contribute to attaining resilience against the smudge and brute force attacks up to some extent. In addition, the proposed scheme does not require a space more than the placement of a finger on the screen; and thus, it is screen size independent. The proposed scheme is evaluated in terms of security and functionality; and compared with other similar schemes where it outperforms the others.
A keyphrase extraction technique endeavors to extract quality keyphrases from a given document, which provide a high-level summary of that document. Except statistical keyphrase extraction approaches, all other approa...
详细信息
Ranked search results and recommendations have become the main mechanism by which we find content, products, places, and people online. With hiring, selecting, purchasing, and dating being increasingly mediated by alg...
详细信息
Graphical User Interface(GUI) visualizes computer programs for the purpose of facilitating interaction between users and various computing devices. Today's computers, smart phones and even small devices such as wa...
详细信息
Graphical User Interface(GUI) visualizes computer programs for the purpose of facilitating interaction between users and various computing devices. Today's computers, smart phones and even small devices such as watches are equipped with GUIs. Unlike command based interaction, GUI uses images, labels, push buttons, radio buttons, etc. for the effective communication of users with a software system. GUI testing is a critical part of software testing as it is the door to the actual functionality of software. For the quality assurance, GUI functional testing of a software validates proper interaction between the interface and the user without considering any coding details. In this paper, a strategy based on fuzzy Adaptive Teaching Learning-based Optimization(ATLBO) algorithm, a variant of the basic Teaching Learning-based Optimization(TLBO) algorithm, for GUI functional testing is proposed. ATLBO utilizes Event-Interaction Graph(EIG) for the generation of quality test cases. The proposed strategy has produced competitive experimental results against the basic TLBO and other test case generation algorithms.
This paper presents condition assessment of high voltage equipment and substation as health index. Major equipment of high voltage substation consists of circuit breaker, disconnecting switch, current transformer, vol...
This paper presents condition assessment of high voltage equipment and substation as health index. Major equipment of high voltage substation consists of circuit breaker, disconnecting switch, current transformer, voltage transformer and surge arrester. The condition of equipment is assessed by visual inspection and electrical test. The weighting and scoring method is applied throughout the process of health index calculation. The Analytic Hierarchy Process is used to calculate the weight for each criterion. The conditional score and its weight of each testing are used to calculate the weighting average score. Then, the obtained weighting average score is adjusted by visual inspection, maintenance completeness and failure rate of equipment. The adjusted average score of all equipment in a bay is integrated into bay health index and subsequently adjusted by age and operational stress of bay. Finally, the health index of fifteen substations can be determined.
暂无评论