Advanced Search
Displaying 1-10 on page 1 of 11481. Per Page  

Articles / Online

  • Solvability of the Nonlocal Inverse Parabolic Problem and Numerical Results
  • Abstract In this paper, we consider the unique solvability of the inverse problem of determining the right-hand side of a parabolic equation whose leading coefficient depends on time variable under nonlocal integral overdetermination condition. We obtain sufficient conditions for the unique solvability of the inverse problem. The existence and uniqueness of the solution of the inverse parabolic problem upon the data are established using the fixed point theorem. This inverse problem appears extensively in the modelling of various phenomena in engineering and physics. For example, seismology, medicine, fusion welding, continuous casting, metallurgy, aircraft, oil and gas production during drilling and operation…
  • More
  •   Views:43       Downloads:33        Download PDF
  • Student Behavior Modeling for an E-Learning System Offering Personalized Learning Experiences
  • Abstract With the advent of computing and communication technologies, it has become possible for a learner to expand his or her knowledge irrespective of the place and time. Web-based learning promotes active and independent learning. Large scale e-learning platforms revolutionized the concept of studying and it also paved the way for innovative and effective teaching-learning process. This digital learning improves the quality of teaching and also promotes educational equity. However, the challenges in e-learning platforms include dissimilarities in learner’s ability and needs, lack of student motivation towards learning activities and provision for adaptive learning environment. The quality of learning can be…
  • More
  •   Views:42       Downloads:32        Download PDF
  • Impact of Human Vulnerabilities on Cybersecurity
  • Abstract Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39%…
  • More
  •   Views:41       Downloads:30        Download PDF
  • Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware
  • Abstract Wireless sensor network (WSN) is a group of interconnected sensor nodes that work wirelessly to capture the information of surroundings. The routing of the network is a challenging task. The routing of WSN is classified as proactive, reactive, and hybrid. Adhoc on-demand distance vector (AODV) routing is an example of reactive routing based on the demand route formations among different nodes in the network. The research article emphasizes the design and simulation of the AODV routing hardware chip using very-high-speed integrated circuit hardware description language (VHDL) programming in Xilinx integrated synthesis environment (ISE) 14.7 software. The performance of the chip…
  • More
  •   Views:38       Downloads:32        Download PDF
  • Miniaturized Novel UWB Band-Notch Textile Antenna for Body Area Networks
  • Abstract This paper presents the design and analysis of a miniaturized and novel wearable ultra-wideband (UWB) band-notch textile antenna for Body Area Networks (BANs). The major goal of building the antenna for wearable applications with band notch in X-band is to reject the downlink band (7.25 to 7.75 GHz) of satellite communication in the UWB frequency ranges of 3.1–10.6 GHz to keep away from interference. Computer Simulation Technology (CST) TM Microwave Studio, which is user-friendly and reliable, was used to model and simulate the antenna. The radiating element of the antenna is designed on Jeans’ textile substrate, which has a relative…
  • More
  •   Views:61       Downloads:32        Download PDF
  • Design Principles-Based Interactive Learning Tool for Solving Nonlinear Equations
  • Abstract Interactive learning tools can facilitate the learning process and increase student engagement, especially tools such as computer programs that are designed for human-computer interaction. Thus, this paper aims to help students learn five different methods for solving nonlinear equations using an interactive learning tool designed with common principles such as feedback, visibility, affordance, consistency, and constraints. It also compares these methods by the number of iterations and time required to display the result. This study helps students learn these methods using interactive learning tools instead of relying on traditional teaching methods. The tool is implemented using the MATLAB app and…
  • More
  •   Views:42       Downloads:29        Download PDF
  • Decision Making on Fuzzy Soft Simply* Continuous of Fuzzy Soft Multi-Function
  • Abstract Real world applications are dealing now with a huge amount of data, especially in the area of high dimensional features. In this article, we depict the simply*upper, the simply*lower continuous, we get several characteristics and other properties with respect to upper and lower simply*-continuous soft multi-functions. We also investigate the relationship between soft-continuous, simply*continuous multifunction. We also implement fuzzy soft multifunction between fuzzy soft topological spaces which is Akdag’s generation of the notion. We are introducing a new class of soft open sets, namely soft simply*open set deduce from soft topology, and we are using it to implement the new…
  • More
  •   Views:12       Downloads:1        Download PDF
  • I-Quiz: An Intelligent Assessment Tool for Non-Verbal Behaviour Detection
  • Abstract Electronic learning (e-learning) has become one of the widely used modes of pedagogy in higher education today due to the convenience and flexibility offered in comparison to traditional learning activities. Advancements in Information and Communication Technology have eased learner connectivity online and enabled access to an extensive range of learning materials on the World Wide Web. Post covid-19 pandemic, online learning has become the most essential and inevitable medium of learning in primary, secondary and higher education. In recent times, Massive Open Online Courses (MOOCs) have transformed the current education strategy by offering a technology-rich and flexible form of online…
  • More
  •   Views:12       Downloads:4        Download PDF
  • Integrated Approach to Detect Cyberbullying Text: Mobile Device Forensics Data
  • Abstract Mobile devices and social networks provide communication opportunities among the young generation, which increases vulnerability and cybercrimes activities. A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among youngsters. This paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics toolkit. We describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying detection. We use forensics techniques, Machine Learning (ML), and Deep Learning (DL) algorithms to exploit suspicious…
  • More
  •   Views:18       Downloads:5        Download PDF
  • Web Security: Emerging Threats and Defense
  • Abstract Web applications have become a widely accepted method to support the internet for the past decade. Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities, the configuration is growing and becoming more complicated. The growing demand and complexity also make these web applications a preferred target for intruders on the internet. Even with the support of security specialists, they remain highly problematic for the complexity of penetration and code reviewing methods. It requires considering different testing patterns in both codes reviewing and penetration testing. As a result, the number of hacked…
  • More
  •   Views:43       Downloads:5        Download PDF
Displaying 1-10 on page 1 of 11481. Per Page