about.jpg

Filter by

In silico identification of potential key regulatory factors in smoking-induced lung cancer

Background: Lung cancer is a leading cause of cancer-related death worldwide and is the most commonly diagnosed cancer. Like other cancers, it is a complex and highly heterogeneous disease involving multiple signaling pathways. Identifying potential therapeutic targets is critical for the development of effective treatment strategies. Methods: We used a systems biology approach to identify

Artificial Intelligence
Circuit Theory and Applications
Innovation, Entrepreneurship and Competitiveness

Sensor Faults Detection and Estimation for a Dfig Equipped Wind Turbine

Doubly Fed Induction Generator (DFIG) based on wind turbines demand a high degree of reliability and availability and they are characterized by expensive and safety critical maintenance work. This paper deals with a new strategy for detection and estimation of current sensor faults in the stator and rotor of a DFIG. First, a state space model of a DFIG is developed based on voltages and flux

Energy and Water
Mechanical Design

Experimental digital forensics of subscriber identification module (SIM) Card

[No abstract available]

Software and Communications

Quantitave dynamic taint analysis of privacy leakage in android Arabic apps

Android smartphones are ubiquitous all over the world, and organizations that turn profits out of data mining user personal information are on the rise. Many users are not aware of the risks of accepting permissions from Android apps, and the continued state of insecurity, manifested in increased level of breaches across all large organizations means that personal information is falling in the

JSDES - An automated de-obfuscation system for malicious javascript

Malicious scripts used in web-based attacks have recently been reported as one of the top internet security threats. However, anti-malware solutions develop and integrate various techniques to defend against malicious scripts, attackers have been increasingly applying different counter techniques to hide their malicious intents and evade detection. One of the most popular techniques used is code

A postmortem forensic analysis for a JavaScript based attack

[No abstract available]

Pre-Encrypted user data for secure passive UHF RFID communication

A pre-encryption algorithm for passive ultra-high frequency (UHF) radio frequency identification (RFID) systems is described. The algorithm is based on advanced encryption standard (AES) as the core encryption technique with two extra steps; first step is random key generation and the second step is data randomization, which increase the immunity of the encryption process against attacks. The

Impact of alignment algorithms on 16S metagenomics analysis

The development of high-throughput sequencing technologies has provided microbial ecologists with an efficient approach to assess bacterial diversity at an unseen depth. In the last year, various platforms have been used for such analysis particularly the Illumina MiSeq, 454 pyrosequencing GS FLX+ and PacBio sequencing platforms. However, analysing such high-throughput data is posing important

Fractional canny edge detection for biomedical applications

This paper presents a comparative study of edge detection algorithms based on integer and fractional order differentiation. A performance comparison of the two algorithms has been proposed. Then, a soft computing technique has been applied to both algorithms for better edge detection. From the simulations, it shows that better performance is obtained compared to the classical approach. The noise

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Multi-reader RFID tag identification using bit tracking (MRTI-BT)

In this paper we study the problem of tag identification in multi-reader RFID systems. In particular, we propose a novel solution to the reader-to-reader collisions and tag collisions in multi-reader systems, using the concept of bit tracking [1]. Towards this objective, we propose the multi-reader RFID tag identification using bit tracking (MRTI-BT) algorithm which allows concurrent tag

Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness