Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the development of technology and industrialization, problems that haven't been solved in the past have become more easily solvable. The artificial intelligence (AI) field has emerged by starting to apply the working mechanism of the human brain in various ways in computers. With the use and widespread use of AI techniques, solutions to problems in every area of the scientific world are presented...
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent...
Quantum key distribution (QKD) enables two authenticated parties to share secret keys with the ability to detect any attempts to eavesdrop the keys theoretically. Currently, QKD systems can be categorized by its source of uncertainty in nature; single photon or coherent light. As coherent light is harnessed, the overall cost for composing systems drops in general. However, more elaborate post processing...
Almost all college and university courses have integrated disciplines for the teaching of programming in their curricula. The importance of knowing “how to program” has contributed towards increasing private and public initiatives for the teaching of programming in different countries. Many of such initiatives include changes in the curriculum of primary and high schools, replacing disciplines by...
Spacecraft on-board computers are responsible for controlling the spacecraft platform, payloads, or other on-board devices. Their mission-specific software allows communication with ground or other on-board computers. Traditionally, on-board software has been written close to the hardware in assembly language, Ada, C, or C++, with or without a real-time operating system (RTOS) [1]. As the spacecraft...
For the sake of improving the precision of speech emotion recognition, this paper proposed a novel speech emotion recognition approach based on Gaussian Kernel Nonlinear Proximal Support Vector Machine (PSVM) to recognize four basic human emotions (angry, joy, sadness, surprise). Firstly, preprocess speech signal containing sampling, quantification, pre-emphasizing, framing, adding window and endpoint...
High precision results in structural with the shortest time consumption are expected when methods are introduced to solve FEM(Finite element method). Solving of stiffness matrix assembled by isoparametric elements and solving the assembled stiffness matrix are the most time-consuming. In the previous serial algorithms, there is always a time limitation for some applications and it is hard to achieve...
In the era of Internet and electronic devices bullying shifted its place from schools and backyards into the cyberspace; it is now known as Cyberbullying. Children of the Arab countries are suffering from cyberbullying same as children worldwide. Thus concerns from cyberbullying are elevating. A lot of research is done for the purpose of handling this situation. The current research is focusing on...
Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users-the weakest link in the security chain-getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise...
The increasing amount of data being collected from simulations, instruments and sensors creates challenges for existing e-Science infrastructure. In particular, it requires new ways of storing, distributing and processing data in order to cope with both the volume and velocity of the data. The University of Queensland has recently designed and deployed MeDiCI, a data fabric that spans the metropolitan...
Home Automation Systems have been continuously evolving in the past few years: some of the systems are focusing their attention on providing remote access and control of the system, while others are more focused on the interconnectivity of the devices and on integrating them into greater systems, like smart cities. In this paper we propose a hierarchical architecture for Home Automation Systems, which...
In a cyber-physical system (CPS), the events start or finish in a sequence of time. The sequence can be called chronological order. Chronological order relationship is essential in determining system status and providing decision reference in feedback control related to IoT areas. However, the correctness of the order obtained is vulnerable to many factors. This paper delves into typical events in...
Commercial quantum annealing (QA) machines are now being built with hundreds of quantum bits (qubits). These are used as analog computers, to solve optimization problems by annealing to an unknown ground state (the solution), given the Hamiltonian for that problem. We propose and develop a new approach, in which we use machine learning to do the inverse problem: to find the Hamiltonian that will produce...
Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this work, a novel Network-based framework is introduced for detecting RAT bots based on data mining techniques. Several machine learning (ML) techniques are used to differentiate between benign and RAT infected machines. Various performance measurements are used to evaluate the performance of the proposed...
Buildings represent 40% of total primary energy use in the U.S., and researchers have recognized the necessity of making office spaces more energy efficient. To reduce energy consumption, it is important to take into account buildings occupants' behavior into account. The difference between simulated, estimated and real power consumption in buildings reflects the need to search for more accurate ways...
Control theory can establish properties of systems which hold with all signals within the system and hence cannot be proven by simulation. The most basic of such property is the stability of a control subsystem or the overall system. Other examples are statements on robust control performance in the face of dynamical uncertainties and disturbances in sensing and actuation. Until now these theories...
In this paper, we investigate the selling strategy and price decisions for a seller who provides two complementary products to the strategic consumer over two periods under three selling strategies: markdown pricing (MD), second period bundling (SPB) and first period bundling (FPB). It is found that the seller's optimal prices in the second period of SPB and FPB strategies are higher than that of...
While most contemporary researchers argue that Artificial Intelligence (AI) provides overwhelming and profound advancements in technology and beneficial tools used daily to advance human life on earth, there exist a host of other researchers who hold contrary opinions to this view, with regard to the rising adverse ontological and existential consequences which the products of super-intelligent technologies...
This paper presents one step toward creating the building blocks for machine intelligence that is inspired by its biological equivalent. The authors' quantum learning methods (deep quantum learning) are applied to quantum devices whose quantum bit (q-bit) activity is deliberately chosen to mimic the spiking behavior of biological neurons. Because of the "quantum" scale of these computers,...
The Computational Thinking (CT) conceptual framework is entering its second decade of research yet still lacks a cohesive definition by which the field can coalesce. The lack of clear definition makes assessment tool challenging to formulate, pedagogical efforts difficult to compare, and research difficult to synthesize. This paper looks to operationalize differing definitions of CT enhancing the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.