about.jpg

Filter by

An Investigation of the Sensing Capabilities of Magnetotactic Bacteria

We investigate the sensing capabilities of magnetotactic bacteria (Magnetospirillum gryphiswaldense strain MSR1) to MCF-7 breast cancer cells. Cancer cells are allowed to grow inside a capillary tube with depth of 200 μ m and motion of magnetotactic bacteria is investigated under the influence of oxygen gradient and geomagnetic field. The influence of cancer cells is modeled to predict the oxygen

Large scale detection of IDN domain name masquerading

Introducing Unicode characters to domain names enabled end users to register a domain name in different languages, i.e., Russian, Arabic or Chinese. This process is defined as Internationalized Domain Names (IDN). The Unicode standard contains a large number of characters and character sets. Some of those Unicode characters' sets may resemble some ASCII characters (this is commonly referred as

Enhanced approach to detect malicious VB script files based on data mining techniques

capabilities of File-based malware but also, increases the evasion techniques by deploying different easy methods of script obfuscation techniques. Moreover, according to McAfee Labs Threat Report, Script-based malwares were used to hit healthcare sector in 2017. Healthcare accounted for more than 26 percent of the 52 million new cyber incidents in the second quarter of 2017. In this paper, new

HTTP application layer DDoS attack mitigation using resources monitor

Denial of Service attacks are one of the most annoying day to day challenges for any security expert and IT professional. This is according to the attack nature. It can be run against any kind of network resources, whether exposed to the Internet or internally in a corporate network, regardless of the type of service it provides and its role in the network. There is no one complete solution or

An energy-efficient multiobjective scheduling model for monitoring in internet of things

To ensure robustness in wireless networks, monitoring the network state, performance and functioning of the nodes and links is crucial, especially for critical applications. This paper targets Internet of Things (IoT) networks. In the IoT, devices (things) are vulnerable due to security risks from the Internet. Moreover, they are resource-constrained and connected via lossy links. This paper

Intercept algorithm for maneuvering targets based on differential geometry and lyapunov theory

Nowadays, the homing guidance is utilized in the existed and under development air defense systems (ADS) to effectively intercept the targets. The targets became smarter and capable to fly and maneuver professionally and the tendency to design missile with a small warhead became greater, then there is a pressure to produce a more precise and accurate missile guidance system based on intelligent

Artificial Intelligence
Innovation, Entrepreneurship and Competitiveness

An analysis of the financial inclusion in South Africa considering race, education and income

The paper examines the issue of financial inclusion in South Africa by analysing the likelihood of ownership of a bank account of an adult individual by race, education and income. Although racial segregation in South Africa was ended on May 10th, 1994, there is still considerable evidence that self-employed and entrepreneurs' successes are related to their ethnic groups. The paper examines how

Innovation, Entrepreneurship and Competitiveness

Log Transform Based Optimal Image Enhancement Using Firefly Algorithm for Autonomous Mini Unmanned Aerial Vehicle: An Application of Aerial Photography

The Unmanned Aerial Vehicles (UAV) are widely used for capturing images in border area surveillance, disaster intensity monitoring, etc. An aerial photograph offers a permanent recording solution as well. But rapid weather change, low quality image capturing equipments results in low/poor contrast images during image acquisition by Autonomous UAV. In this current study, a well-known meta-heuristic

Sliding mode control technique for multi-switching synchronization of chaotic systems

In this manuscript, a sliding mode control technique is proposed for multi-switching synchronization of chaotic systems in which state variables of a master system are synchronized with different state variables of a slave system. Based on the sliding mode control technique and Lyapunov stability theory, the suitable controllers are designed for different switches. To implement this methodology

Modeling of target tracking system for homing missiles and air defense systems

One reason of why the guidance and control systems are imperfect is due to the dynamics of both the tracker and the missile, which appears as an error in the alignment with the LOS and delay in the response of the missile to change its orientation. Other reasons are the bias and disturbances as well as the noise about and within the system such as the thermal noise. This paper deals with the