The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the paper are analyzed articles that are indexed on Web of Science with the main topic of the conference “Communication and Information Technologies” (CIT). The articles were chosen the most cited ones. The first step of analysis summarizes statistics of the articles and the second step was oriented to detailed analysis using the software Tovek Tools. The contextual analysis was depicted in the...
In this study, an embedded system has been developed to provide remote control of dot matrix signboards widely used nowadays. With this developed system, it is possible to control and use one or more signboards anywhere. The developed electronic signboard can be in the desired dimensions by connecting the unit modules in many different forms thanks to the electronic circuit realized for the dot matrix...
The paper proposes a technical procedure for modeling the parameters variation of a fluid flowing through a transport structure. The determined models are used to identify more accurately the leakage points / faults occurring in this infrastructure. The procedure considers faults / leaks that are variable, with minimum and maximum limits being defined. The validation of the procedure is done by implementation...
In this paper, we introduce a defensive cybersecurity framework called Cybergrenade automating various penetration testing tools to sequentially exploit machines connected to a single local network, all underneath a single application running on a Single-Board Computer (SBC). This takes advantage of the SBC's unique capabilities in a way that manual exploitation simply cannot match. Currently, while...
This showpiece will present iSnap, an extension of the block-based, novice programming environment Snap!, which supports struggling students by providing on-demand hints and feedback that help them complete programming assignments. iSnap extends the existing syntactic scaffolding offered by block-based programming to additionally support the implementation of programming tasks. Research on iSnap has...
With the development of technology and industrialization, problems that haven't been solved in the past have become more easily solvable. The artificial intelligence (AI) field has emerged by starting to apply the working mechanism of the human brain in various ways in computers. With the use and widespread use of AI techniques, solutions to problems in every area of the scientific world are presented...
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent...
Quantum key distribution (QKD) enables two authenticated parties to share secret keys with the ability to detect any attempts to eavesdrop the keys theoretically. Currently, QKD systems can be categorized by its source of uncertainty in nature; single photon or coherent light. As coherent light is harnessed, the overall cost for composing systems drops in general. However, more elaborate post processing...
Almost all college and university courses have integrated disciplines for the teaching of programming in their curricula. The importance of knowing “how to program” has contributed towards increasing private and public initiatives for the teaching of programming in different countries. Many of such initiatives include changes in the curriculum of primary and high schools, replacing disciplines by...
Spacecraft on-board computers are responsible for controlling the spacecraft platform, payloads, or other on-board devices. Their mission-specific software allows communication with ground or other on-board computers. Traditionally, on-board software has been written close to the hardware in assembly language, Ada, C, or C++, with or without a real-time operating system (RTOS) [1]. As the spacecraft...
For the sake of improving the precision of speech emotion recognition, this paper proposed a novel speech emotion recognition approach based on Gaussian Kernel Nonlinear Proximal Support Vector Machine (PSVM) to recognize four basic human emotions (angry, joy, sadness, surprise). Firstly, preprocess speech signal containing sampling, quantification, pre-emphasizing, framing, adding window and endpoint...
High precision results in structural with the shortest time consumption are expected when methods are introduced to solve FEM(Finite element method). Solving of stiffness matrix assembled by isoparametric elements and solving the assembled stiffness matrix are the most time-consuming. In the previous serial algorithms, there is always a time limitation for some applications and it is hard to achieve...
In the era of Internet and electronic devices bullying shifted its place from schools and backyards into the cyberspace; it is now known as Cyberbullying. Children of the Arab countries are suffering from cyberbullying same as children worldwide. Thus concerns from cyberbullying are elevating. A lot of research is done for the purpose of handling this situation. The current research is focusing on...
Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users-the weakest link in the security chain-getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise...
The increasing amount of data being collected from simulations, instruments and sensors creates challenges for existing e-Science infrastructure. In particular, it requires new ways of storing, distributing and processing data in order to cope with both the volume and velocity of the data. The University of Queensland has recently designed and deployed MeDiCI, a data fabric that spans the metropolitan...
Home Automation Systems have been continuously evolving in the past few years: some of the systems are focusing their attention on providing remote access and control of the system, while others are more focused on the interconnectivity of the devices and on integrating them into greater systems, like smart cities. In this paper we propose a hierarchical architecture for Home Automation Systems, which...
In a cyber-physical system (CPS), the events start or finish in a sequence of time. The sequence can be called chronological order. Chronological order relationship is essential in determining system status and providing decision reference in feedback control related to IoT areas. However, the correctness of the order obtained is vulnerable to many factors. This paper delves into typical events in...
Commercial quantum annealing (QA) machines are now being built with hundreds of quantum bits (qubits). These are used as analog computers, to solve optimization problems by annealing to an unknown ground state (the solution), given the Hamiltonian for that problem. We propose and develop a new approach, in which we use machine learning to do the inverse problem: to find the Hamiltonian that will produce...
Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this work, a novel Network-based framework is introduced for detecting RAT bots based on data mining techniques. Several machine learning (ML) techniques are used to differentiate between benign and RAT infected machines. Various performance measurements are used to evaluate the performance of the proposed...
Buildings represent 40% of total primary energy use in the U.S., and researchers have recognized the necessity of making office spaces more energy efficient. To reduce energy consumption, it is important to take into account buildings occupants' behavior into account. The difference between simulated, estimated and real power consumption in buildings reflects the need to search for more accurate ways...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.