about.jpg

Filter by

Predicting all star player in the national basketball association using random forest

National Basketball Association (NBA) All Star Game is a demonstration game played between the selected Western and Eastern conference players. The selection of players for the NBA All Star game purely depends on votes. The fans and coaches vote for the players and decide who is going to make the All Star roster. A player who continues to receive enough votes in following years will play more All

Artificial Intelligence

SigPloit: A New Signaling Exploitation Framework

Mobile communication networks are using signaling protocols to allow mobile users to communicate using short messages, phone calls and mobile data. Signaling protocols are also used to manage billing for operators and much more. The design flaws that signaling inherits made them vulnerable to attacks such as location tracking of subscriber, fraud, calls and SMS interception. With the high rate of

Software and Communications

Biochar affects community composition of nitrous oxide reducers in a field experiment

N2O is a major greenhouse gas and the majority of anthropogenic N2O emissions originate from agriculturally managed soils. Therefore, developing N2O mitigation strategies is a key challenge for the agricultural sector and biochar soil treatment is one reported option. Biochar's capacity to increase soil pH and to foster activity of specialized N2O reducers has been proposed as possible mechanisms

Healthcare

Bioinformatics functional analysis of let-7a, miR-34a, and miR-199a/b reveals novel insights into immune system pathways and cancer hallmarks for hepatocellular carcinoma

Let-7a, miR-34a, and miR-199 a/b have gained a great attention as master regulators for cellular processes. In particular, these three micro-RNAs act as potential onco-suppressors for hepatocellular carcinoma. Bioinformatics can reveal the functionality of these micro-RNAs through target prediction and functional annotation analysis. In the current study, in silico analysis using innovative

Healthcare

Browsers fingerprinting motives, methods, and countermeasures

With the continuous and aggressive competition in advertising businesses, uncontrollably desires have emerged to identify and classify consumers. It is proven that companies must have a clear definition of its target market. Based on this we have seen different ways to identify, analyze, and track consumers, either voluntarily or without their consent. Browser fingerprinting techniques have

Software and Communications

Multiswitching synchronization of commensurate fractional order hyperchaotic systems via active control

In this chapter, the multiswitching synchronization scheme has been investigated for a class of nonidentical fractional order hyperchaotic systems. The multiswitching complete synchronization scheme has been examined such that the state variables of the slave system synchronize with different state variables of the master system. For the synchronization of two nonidentical fractional order

Circuit Theory and Applications
Innovation, Entrepreneurship and Competitiveness

Fuzzy Logic Controller with Color Vision System Tracking for Mobile Manipulator Robot

The purpose of this article is to present a theoretical and practical implementation of a fuzzy algorithm methodology to control a mobile manipulator path planning using a real-time vision system tracking. To meet high performance response and robust stability of the platform navigation, a fuzzy logic controller is designed with realistic constrains. OpenCV library is used to implement Background

Mechanical Design

Emotional tone detection in Arabic tweets

Emotion detection in Arabic text is an emerging research area, but the efforts in this new field have been hindered by the very limited availability of Arabic datasets annotated with emotions. In this paper, we review work that has been carried out in the area of emotion analysis in Arabic text. We then present an Arabic tweet dataset that we have built to serve this task. The efforts and

Artificial Intelligence

Large scale detection of IDN domain name masquerading

Introducing Unicode characters to domain names enabled end users to register a domain name in different languages, i.e., Russian, Arabic or Chinese. This process is defined as Internationalized Domain Names (IDN). The Unicode standard contains a large number of characters and character sets. Some of those Unicode characters' sets may resemble some ASCII characters (this is commonly referred as

A qualitative comparison between the proportional navigation and differential geometry guidance algorithms

This paper discusses and presents an overview of the proportional navigation (PN) guidance law as well as the differential geometry (DG) guidance algorithm that are used to develop the intercept course of a certain target. The intent of this study is to illustrate the advantages of the guidance algorithm generated based on the concepts of differential geometry against the well-known PN guidance