{"results":[{"id":"doaj_10.1051/itmconf/20257701018","title":"Experiment and analysis of water droplet wettability on superhydrophobic surfaces manipulated by electric field","authors":[{"name":"Wang Qingcheng"},{"name":"Lou Yi"},{"name":"Zhang Deqing"},{"name":"Yang Xiaodong"}],"abstract":"Electric field manipulates the change of droplets wettability on superhydrophobic surfaces, which is widely used in many fields such as electronic zoom microlens and electro wetting displays, and has an important research value. This paper prepared a superhydrophobic acetate film applied electrostatic spinning technique,the maximum contact angle of acetate film is 152.6°, conducted electric field-regulated water droplet wettability change tests, applied voltage to water droplets on acetate film. it was found that the contact angle of the droplets decreased with the increase of the electric field strength, and the electric field regulated the contact angle of the droplets to change in the range of 92.7-142.3°. When the power supply is turned off, the contact angle of the droplet can gradually recover, but not completely restored to the original state.","source":"DOAJ","year":2025,"language":"","subjects":["Information technology"],"doi":"10.1051/itmconf/20257701018","url":"https://www.itm-conferences.org/articles/itmconf/pdf/2025/08/itmconf_emit2025_01018.pdf","pdf_url":"https://www.itm-conferences.org/articles/itmconf/pdf/2025/08/itmconf_emit2025_01018.pdf","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.1038/s41598-025-15011-x","title":"Vehicular ad hoc networks verification scheme based on bilinear pairings and networks reverse fuzzy extraction","authors":[{"name":"Zaid Ameen Abduljabbar"},{"name":"Vincent Omollo Nyangaresi"},{"name":"Ahmed Ali Ahmed"},{"name":"Junchao Ma"},{"name":"Mustafa A. Al Sibahee"},{"name":"Mohammed Abdulridha Hussain"},{"name":"Zaid Alaa Hussien"},{"name":"Ali Hasan Ali"},{"name":"Abdulla J. Y. Aldarwish"},{"name":"Husam A. Neamah"}],"abstract":"Abstract Vehicular Ad-Hoc Networks (VANETs) have facilitated the massive exchange of real-time traffic and weather conditions, which have helped prevent collisions, reduce accidents, and road congestions. This can effectively enhance driving safety and efficiency in technology-driven transportation systems. However, the transmission of massive and sensitive information across public wireless communication channels exposes the transmitted data to a myriad of privacy as well as security threats. Although past researches has developed many vehicular ad-hoc networks security preservation schemes, several of them are inefficient or susceptible to attacks. This work, introduces an approach that leverages reverse fuzzy extraction, bilinear pairing, and Physically Unclonable Function (PUF) to design an efficient and anonymity-preserving authentication scheme. We conduct an elaborate formal security analysis to demonstrate that the derived session key is secure. The semantic security analyses also demonstrate its resilience against typical VANET attacks such as impersonations, denial of service, and de-synchronization, instilling confidence in its effectiveness. Moreover, our approach incurs the lowest computational overheads at relatively low communication costs. Specifically, our protocol attains a 66.696% reduction in computation costs, and a 70% increment in the supported security functionalities.","source":"DOAJ","year":2025,"language":"","subjects":["Medicine","Science"],"doi":"10.1038/s41598-025-15011-x","url":"https://doi.org/10.1038/s41598-025-15011-x","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.1016/j.padiff.2025.101131","title":"Solving a class of distributed-order time fractional wave-diffusion differential equations using the generalized fractional-order Bernoulli wavelets","authors":[{"name":"Ali AbuGneam"},{"name":"Somayeh Nemati"},{"name":"Afshin Babaei"}],"abstract":"In this research, we propose a new numerical method for solving a class of distributed-order fractional partial differential equations, specifically focusing on distributed-order time fractional wave-diffusion equations. The method begins by introducing a novel generalization of Bernoulli wavelets and deriving an exact result for the Riemann–Liouville integral of these new basis functions. Utilizing the Gauss–Legendre quadrature formula and a strategically chosen set of collocation points, along with approximations for the unknown function and its derivatives, we transform the problem into a system of algebraic equations. An error analysis is then conducted for the approximation of a bivariate function using fractional-order Bernoulli wavelets. Finally, three examples are solved to demonstrate the method’s applicability and accuracy, with the numerical results confirming its effectiveness. These findings demonstrate that the parameters of the basis functions can be adjusted to suit the given problem, thereby enhancing the accuracy of the method.","source":"DOAJ","year":2025,"language":"","subjects":["Applied mathematics. Quantitative methods"],"doi":"10.1016/j.padiff.2025.101131","url":"http://www.sciencedirect.com/science/article/pii/S2666818125000580","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.3390/info17010009","title":"Evaluating Model Resilience to Data Poisoning Attacks: A Comparative Study","authors":[{"name":"Ifiok Udoidiok"},{"name":"Fuhao Li"},{"name":"Jielun Zhang"}],"abstract":"Machine learning (ML) has become a cornerstone of critical applications, but its vulnerability to data poisoning attacks threatens system reliability and trustworthiness. Prior studies have begun to investigate the impact of data poisoning and proposed various defense or evaluation methods; however, most efforts remain limited to quantifying performance degradation, with little systematic comparison of internal behaviors across model architectures under attack and insufficient attention to interpretability for revealing model vulnerabilities. To tackle this issue, we build a reproducible evaluation pipeline and emphasize the importance of integrating robustness with interpretability in the design of secure and trustworthy ML systems. To be specific, we propose a unified poisoning evaluation framework that systematically compares traditional ML models, deep neural networks, and large language models under three representative attack strategies including label flipping, random corruption, and adversarial insertion, at escalating severity levels of 30%, 50%, and 75%, and integrate LIME-based explanations to trace the evolution of model reasoning. Experimental results demonstrate that traditional models collapse rapidly under label noise, whereas Bayesian LSTM hybrids and large language models maintain stronger resilience. Further interpretability analysis uncovers attribution failure patterns, such as over-reliance on neutral tokens or misinterpretation of adversarial cues, providing insights beyond accuracy metrics.","source":"DOAJ","year":2025,"language":"","subjects":["Information technology"],"doi":"10.3390/info17010009","url":"https://www.mdpi.com/2078-2489/17/1/9","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.3390/fi16110412","title":"Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum","authors":[{"name":"J. de Curtò"},{"name":"I. de Zarzà"},{"name":"Juan-Carlos Cano"},{"name":"Carlos T. Calafate"}],"abstract":"This paper presents a novel approach to enhancing the security and reliability of drone communications through the integration of Quantum Random Number Generators (QRNG) in Frequency Hopping Spread Spectrum (FHSS) systems. We propose a multi-drone framework that leverages QRNG technology to generate truly random frequency hopping sequences, significantly improving resistance against jamming and interception attempts. Our method introduces a concurrent access protocol for multiple drones to share a QRNG device efficiently, incorporating robust error handling and a shared memory system for random number distribution. The implementation includes secure communication protocols, ensuring data integrity and confidentiality through encryption and Hash-based Message Authentication Code (HMAC) verification. We demonstrate the system’s effectiveness through comprehensive simulations and statistical analyses, including spectral density, frequency distribution, and autocorrelation studies of the generated frequency sequences. The results show a significant enhancement in the unpredictability and uniformity of frequency distributions compared to traditional pseudo-random number generator-based approaches. Specifically, the frequency distributions of the drones exhibited a relatively uniform spread across the available spectrum, with minimal discernible patterns in the frequency sequences, indicating high unpredictability. Autocorrelation analyses revealed a sharp peak at zero lag and linear decrease to zero values for other lags, confirming a general absence of periodicity or predictability in the sequences, which enhances resistance to predictive attacks. Spectral analysis confirmed a relatively flat power spectral density across frequencies, characteristic of truly random sequences, thereby minimizing vulnerabilities to spectral-based jamming. Statistical tests, including Chi-squared and Kolmogorov-Smirnov, further confirm the unpredictability of the frequency sequences generated by QRNG, supporting enhanced security measures against predictive attacks. While some short-term correlations were observed, suggesting areas for improvement in QRNG technology, the overall findings confirm the potential of QRNG-based FHSS systems in significantly improving the security and reliability of drone communications. This work contributes to the growing field of quantum-enhanced wireless communications, offering substantial advancements in security and reliability for drone operations. The proposed system has potential applications in military, emergency response, and secure commercial drone operations, where enhanced communication security is paramount.","source":"DOAJ","year":2024,"language":"","subjects":["Information technology"],"doi":"10.3390/fi16110412","url":"https://www.mdpi.com/1999-5903/16/11/412","is_open_access":true,"published_at":"","score":68},{"id":"doaj_10.1007/s40747-024-01350-1","title":"CL-BPUWM: continuous learning with Bayesian parameter updating and weight memory","authors":[{"name":"Yao He"},{"name":"Jing Yang"},{"name":"Shaobo Li"},{"name":"Jianjun Hu"},{"name":"Yaping Ren"},{"name":"Qing Ji"}],"abstract":"Abstract Catastrophic forgetting in neural networks is a common problem, in which neural networks lose information from previous tasks after training on new tasks. Although adopting a regularization method that preferentially retains the parameters important to the previous task to avoid catastrophic forgetting has a positive effect; existing regularization methods cause the gradient to be near zero because the loss is at the local minimum. To solve this problem, we propose a new continuous learning method with Bayesian parameter updating and weight memory (CL-BPUWM). First, a parameter updating method based on the Bayes criterion is proposed to allow the neural network to gradually obtain new knowledge. The diagonal of the Fisher information matrix is then introduced to significantly minimize computation and increase parameter updating efficiency. Second, we suggest calculating the importance weight by observing how changes in each network parameter affect the model prediction output. In the process of model parameter updating, the Fisher information matrix and the sensitivity of the network are used as the quadratic penalty terms of the loss function. Finally, we apply dropout regularization to reduce model overfitting during training and to improve model generalizability. CL-BPUWM performs very well in continuous learning for classification tasks on CIFAR-100 dataset, CIFAR-10 dataset, and MNIST dataset. On CIFAR-100 dataset, it is 0.8%, 1.03% and 0.75% higher than the best performing regularization method (EWC) in three task partitions. On CIFAR-10 dataset, it is 2.25% higher than the regularization method (EWC) and 0.7% higher than the scaled method (GR). It is 0.66% higher than the regularization method (EWC) on the MNIST dataset. When the CL-BPUWM method was combined with the brain-inspired replay model under the CIFAR-100 and CIFAR-10 datasets, the classification accuracy was 2.35% and 5.38% higher than that of the baseline method, BI-R + SI.","source":"DOAJ","year":2024,"language":"","subjects":["Electronic computers. Computer science","Information technology"],"doi":"10.1007/s40747-024-01350-1","url":"https://doi.org/10.1007/s40747-024-01350-1","is_open_access":true,"published_at":"","score":68},{"id":"doaj_10.3390/inventions8040088","title":"A Revision of Empirical Models of Stirling Engine Performance Using Simple Artificial Neural Networks","authors":[{"name":"Enrique González-Plaza"},{"name":"David García"},{"name":"Jesús-Ignacio Prieto"}],"abstract":"Stirling engines are currently of interest due to their adaptability to a wide range of energy sources. Since simple tools are needed to guide the sizing of prototypes in preliminary studies, this paper proposes two groups of simple models to estimate the maximum power in Stirling engines with a kinematic drive mechanism. The models are based on regression or ANN techniques, using data from 34 engines over a wide range of operating conditions. To facilitate the generalisation and interpretation of results, all models are expressed by dimensionless variables. The first group models use three input variables and 23 data points for correlation construction or training purposes, while another 66 data points are used for testing. Models in the second group use eight inputs and 18 data points for correlation construction or training, while another 36 data points are used for testing. The three-input models provide estimations of the maximum brake power with an acceptable accuracy for feasibility studies. Using eight-input models, the predictions of the maximum indicated power are very accurate, while those of the maximum brake power are less accurate, but acceptable for the preliminary design stage. In general, the best results are achieved with ANN models, although they only employ one hidden layer.","source":"DOAJ","year":2023,"language":"","subjects":["Engineering machinery, tools, and implements","Technological innovations. Automation"],"doi":"10.3390/inventions8040088","url":"https://www.mdpi.com/2411-5134/8/4/88","is_open_access":true,"published_at":"","score":67},{"id":"doaj_10.15381/idata.v26i1.23745","title":"Metodología de transformación digital para incrementar la competitividad de las pymes de logística ligera en el Perú","authors":[{"name":"José Antonio Rojas García"},{"name":"José Luis Ajuria Foronda"},{"name":"Jon Arambarri"}],"abstract":"El objetivo de la investigación fue diseñar e implementar una metodología basada en la transformación digital de forma ágil y en un corto periodo que permita a las pymes del sector de logística ligera del Perú incrementar su competitividad bajo un enfoque de investigación mixto con un diseño exploratorio secuencial (DEXPLOS), observacional y experimental. La población de estudio estuvo constituida por 750 pymes, la muestra estuvo conformada por 255 empresas y se realizó un muestreo probabilístico estratificado. Los criterios de inclusión fueron contar con estrategias competitivas definidas, un año de operación como mínimo y licencias de funcionamiento y código postal. El instrumento de investigación fue un cuestionario compuesto por 189 preguntas distribuidas en variables, tales como estrategia, rentabilidad, nivel técnico, productividad, calidad y trazabilidad. Se concluye que la implementación de la metodología propuesta permitió la transformación digital de las empresas objeto de estudio en un plazo de cuatro meses, por lo tanto, incrementaron su competitividad.","source":"DOAJ","year":2023,"language":"","subjects":["Technology (General)","Industrial engineering. Management engineering"],"doi":"10.15381/idata.v26i1.23745","url":"https://revistasinvestigacion.unmsm.edu.pe/index.php/idata/article/view/23745","is_open_access":true,"published_at":"","score":67},{"id":"doaj_10.30656/jsii.v9i1.4390","title":"PENERAPAN CUSTOMER RELATIONSHIP MANAGEMENT (CRM) PADA SISTEM INFORMASI PELAYANAN JASA METEOROLOGI BERBASIS WEB ","authors":[{"name":"Imam Agustian  Nugraha"},{"name":"Vidilla  Rosalina"},{"name":"Suherman"}],"abstract":"\nPelayanan jasa informasi meteorologi yang cepat, tepat akurat dan mudah dipahami merupakan salah satu tugas Stasiun Meteorologi (STAMET) Kelas I Maritim Serang. Namun berdasarkan wawancara dan observasi yang dilakukan, menunjukan bahwa pelayanan yang dilakukan belum efisien dan praktis karena pengguna jasa harus datang ke kantor untuk memperoleh data yang diinginkan. Selain itu petugas pelayanan masih mencatat transaksi dalam buku yang kemudian diketik kembali pada aplikasi Microsoft Word, dan mengalami kesulitan dalam mencari berkas yang akan diberikan kepada pengguna jasa. Penelitian ini bertujuan untuk membuat sistem yang dapat membantu tugas STAMET untuk meningkatkan pelayanan jasa meteorologi dengan menggunakan pendekatan Customer Relationship Management (CRM). Metode pengembangan yang digunakan yaitu model prototype dengan perancangan diagram Unified Modelling Language (UML). Sistem dibuat menggunakan Framework Codeigniter dengan Bahasa pemograman Hypertext Preprocessing (PHP) sebagai Server side Programing dan MySQL sebagai Database Server. Metode pengujian sistem yang digunakan adalah Blackbox. Hasil akhir yang diharapkan adalah sebuah sistem informasi pelayanan jasa meteorologi berbasis Web, yang dapat membantu pengguna jasa mendapatkan informasi meteorologi, mempermudah petugas dalam memberikan pelayanan jasa, pembuatan jadwal kunjungan atau pertemuan, mengajukan komplain pelayanan jasa, memberikan kritik dan saran serta mengukur kepuasan pengguna jasa terhadap pelayanan yang diberikan oleh petugas STAMET Kelas I Maritim Serang.\n\r\n\n \n\r\n\nKata Kunci: Customer Relationship Management (CRM), Pelayanan Jasa Meteorologi, Sistem\n","source":"DOAJ","year":2022,"language":"","subjects":["Information technology"],"doi":"10.30656/jsii.v9i1.4390","url":"https://e-jurnal.lppmunsera.org/index.php/jsii/article/view/4390","is_open_access":true,"published_at":"","score":66},{"id":"doaj_10.3390/a14050156","title":"Digital Twins in Solar Farms: An Approach through Time Series and Deep Learning","authors":[{"name":"Kamel Arafet"},{"name":"Rafael Berlanga"}],"abstract":"The generation of electricity through renewable energy sources increases every day, with solar energy being one of the fastest-growing. The emergence of information technologies such as Digital Twins (DT) in the field of the Internet of Things and Industry 4.0 allows a substantial development in automatic diagnostic systems. The objective of this work is to obtain the DT of a Photovoltaic Solar Farm (PVSF) with a deep-learning (DL) approach. To build such a DT, sensor-based time series are properly analyzed and processed. The resulting data are used to train a DL model (e.g., autoencoders) in order to detect anomalies of the physical system in its DT. Results show a reconstruction error around 0.1, a recall score of 0.92 and an Area Under Curve (AUC) of 0.97. Therefore, this paper demonstrates that the DT can reproduce the behavior as well as detect efficiently anomalies of the physical system.","source":"DOAJ","year":2021,"language":"","subjects":["Industrial engineering. Management engineering","Electronic computers. Computer science"],"doi":"10.3390/a14050156","url":"https://www.mdpi.com/1999-4893/14/5/156","is_open_access":true,"published_at":"","score":65},{"id":"doaj_10.1186/s40537-021-00418-w","title":"CaReAl: capturing read alignments in a BAM file rapidly and conveniently","authors":[{"name":"Yoomi Park"},{"name":"Heewon Seo"},{"name":"Kyunghun Yoo"},{"name":"Ju Han Kim"}],"abstract":"Abstract Some of the variants detected by high-throughput sequencing (HTS) are often not reproducible. To minimize the technical-induced artifacts, secondary experimental validation is required but this step is unnecessarily slow and expensive. Thus, developing a rapid and easy to use visualization tool is necessary to systematically review the statuses of sequence read alignments. Here, we developed a high-performance alignment capturing tool, CaReAl, for visualizing the read-alignment status of nucleotide sequences and associated genome features. CaReAl is optimized for the systematic exploration of regions of interest by visualizing full-depth read-alignment statuses in a set of PNG files. CaReAl was 7.5 times faster than IGV ‘snapshot’, the only stand-alone tool which provides an automated snapshot of sequence reads. This rapid user-programmable capturing tool is useful for obtaining read-level data for evaluating variant calls and detecting technical biases. The multithreading and sequential wide-genome-range-capturing functionalities of CaReAl aid the efficient manual review and evaluation of genome sequence alignments and variant calls. CaReAl is a rapid and convenient tool for capturing aligned reads in BAM. CaReAl facilitates the acquisition of highly curated data for obtaining reliable analytic results.","source":"DOAJ","year":2021,"language":"","subjects":["Computer engineering. Computer hardware","Information technology","Electronic computers. Computer science"],"doi":"10.1186/s40537-021-00418-w","url":"https://doi.org/10.1186/s40537-021-00418-w","is_open_access":true,"published_at":"","score":65},{"id":"doaj_10.25126/jtiik.2020711816","title":"Penerapan Artificial Intelligence pada Non Player Character Menggunakan Algoritma Collision Avoidance System dan Random Number Generator pada Game 2D \"Balap Egrang\"","authors":[{"name":"Asep Saeful Milak"},{"name":"Eka Wahyu Hidayat"},{"name":"Aldy Putra Aldya"}],"abstract":"Game adalah salah satu media teknologi yang populer di kalangan masyarakat baik dari anak kecil maupun orang dewasa sebagai media hiburan. game itu sendiri memiliki banyak sekali genre atau jenisnya. Penelitian ini mengembangkan game dengan menerapkan Artificial Intelligence pada game racing. Game sejenis yang telah diobservasi memiliki kelemahan bersifat endless run dan juga tidak memiliki NPC (Non-Player Character) didalamnya. Selain itu, alasan penelitian ini dibuat karena untuk mengangkat permainan tradisional yang hampir dilupakan, untuk itu perlu dibuat game sejenis yang berbeda dari sebelumnya dengan menambahkan NPC didalam game dengan menerapkan beberapa Algoritma. Di dalam penelitian ini menerapkan Algoritma Collision Avoidance System untuk membuat NPC dapat menghindari Obstacle dan Algoritma Random Number Generator untuk membuat Obstacle muncul secara acak. Dalam penelitian ini berhasil membuat “Balap Egrang” dengan Metode Game Development Life Cycle (GDLC). Berdasarkan pengujian yang telah dilakukan, hasil pengujian alpha sudah sesuai secara fungsional dan dari pengujian beta hasil uji fungsionalitas User Acceptence Test (UAT) didapat nilai sebesar 82,58% dinyatakan layak untuk digunakan dengan interpretasi “Baik” yang berarti game ini layak digunakan dan dapat dikembangkan.\n \nAbstract\nEgrang game is one of the traditional games in Indonesia that uses two meters of bamboo material and is given a footing below. This game can be played by all ages by stepping on the footing and maintaining balance when walking at a certain distance and time. This game has begun to erode the era and needs to be preserved. This study tries to revive traditional games into digital-based games by implementing Artificial Intelligence. Similar games that have been observed, such as the Balap Karungs Game from Playstore which is in the racing genre, have endless run weaknesses and also have no Non-Player Character NPCs. The results of this study are Android-based games by applying the Collision Avoidance System Algorithm to make NPCs avoid the Obstacle and Random Number Generator Algorithms to make the Obstacle appear randomly. The development of the Balap Egrang Game uses the Game Development Life Cycle (GDLC) method. Based on the tests that have been carried out, the alpha test results are functionally appropriate and from the beta testing the results of the User Acceptence Test (UAT) functionalities obtained a value of 82.58% which is declared feasible to use with the interpretation of \"Good\" which means that the game is feasible developed..\n\n\n","source":"DOAJ","year":2020,"language":"","subjects":["Technology","Information technology"],"doi":"10.25126/jtiik.2020711816","url":"https://jtiik.ub.ac.id/index.php/jtiik/article/view/1816","is_open_access":true,"published_at":"","score":64},{"id":"doaj_10.2196/mhealth.9232","title":"A Focused Review of Smartphone Diet-Tracking Apps: Usability, Functionality, Coherence With Behavior Change Theory, and Comparative Validity of Nutrient Intake and Energy Estimates","authors":[{"name":"Ferrara, Giannina"},{"name":"Kim, Jenna"},{"name":"Lin, Shuhao"},{"name":"Hua, Jenna"},{"name":"Seto, Edmund"}],"abstract":"BackgroundSmartphone diet-tracking apps may help individuals lose weight, manage chronic conditions, and understand dietary patterns; however, the usabilities and functionalities of these apps have not been well studied.\n            ObjectiveThe aim of this study was to review the usability of current iPhone operating system (iOS) and Android diet-tracking apps, the degree to which app features align with behavior change constructs, and to assess variations between apps in nutrient coding.\n            MethodsThe top 7 diet-tracking apps were identified from the iOS iTunes and Android Play online stores, downloaded and used over a 2-week period. Each app was independently scored by researchers using the System Usability Scale (SUS), and features were compared with the domains in an integrated behavior change theory framework: the Theoretical Domains Framework. An estimated 3-day food diary was completed using each app, and food items were entered into the United States Department of Agriculture (USDA) Food Composition Databases to evaluate their differences in nutrient data against the USDA reference.\n            ResultsOf the apps that were reviewed, LifeSum had the highest average SUS score of 89.2, whereas MyDietCoach had the lowest SUS score of 46.7. Some variations in features were noted between Android and iOS versions of the same apps, mainly for MyDietCoach, which affected the SUS score. App features varied considerably, yet all of the apps had features consistent with Beliefs about Capabilities and thus have the potential to promote self-efficacy by helping individuals track their diet and progress toward goals. None of the apps allowed for tracking of emotional factors that may be associated with diet patterns. The presence of behavior change domain features tended to be weakly correlated with greater usability, with R2 ranging from 0 to .396. The exception to this was features related to the Reinforcement domain, which were correlated with less usability. Comparing the apps with the USDA reference for a 3-day diet, the average differences were 1.4% for calories, 1.0% for carbohydrates, 10.4% for protein, and −6.5% for fat.\n            ConclusionsAlmost all reviewed diet-tracking apps scored well with respect to usability, used a variety of behavior change constructs, and accurately coded calories and carbohydrates, allowing them to play a potential role in dietary intervention studies.","source":"DOAJ","year":2019,"language":"","subjects":["Information technology","Public aspects of medicine"],"doi":"10.2196/mhealth.9232","url":"http://mhealth.jmir.org/2019/5/e9232/","is_open_access":true,"published_at":"","score":63},{"id":"doaj_10.3390/inventions3040071","title":"A Robust Information Life Cycle Management Framework for Securing and Governing Critical Infrastructure Systems","authors":[{"name":"Vrettos Moulos"},{"name":"George Chatzikyriakos"},{"name":"Vassilis Kassouras"},{"name":"Anastasios Doulamis"},{"name":"Nikolaos Doulamis"},{"name":"Georgios Leventakis"},{"name":"Thodoris Florakis"},{"name":"Theodora Varvarigou"},{"name":"Evangelos Mitsokapas"},{"name":"Georgios Kioumourtzis"},{"name":"Petros Klirodetis"},{"name":"Alexandros Psychas"},{"name":"Achilleas Marinakis"},{"name":"Thanasis Sfetsos"},{"name":"Alexios Koniaris"},{"name":"Dimitris Liapis"},{"name":"Anna Gatzioura"}],"abstract":"In modern societies, the rampant growth of the Internet, both on the technological and social level, has created fertile ground for the emergence of new types of risk. On top of that, it enhances pre-existing threats by offering new means for accessing and exploiting Critical Infrastructures. As the kinds of potential threats evolve, the security, safety and resilience of these infrastructures must be updated accordingly, both at a prevention, as well as a real-time confrontation level. Our research approaches the security of these infrastructures with a focus on the data and utilization of every possible piece of information that derives from this ecosystem. Such a task is quite daunting, since the quantity of data that requires processing resides in the Big Dataspace. To address this, we introduce a new well-defined Information Life Cycle in order to properly model and optimise the way information flows through a modern security system. This life cycle covers all the possible stages, starting from the collection phase up until the exploitation of information intelligence. That ensures the efficiency of data processing and filtering while increasing both the veracity and validity of the final outcome. In addition, an agile Framework is introduced that is optimised to take full advantage of the Information Life Cycle. As a result, it exploits the generated knowledge taking the correct sequence of actions that will successfully address possible threats. This Framework leverages every possible data source that could provide vital information to Critical Infrastructures by performing analysis and data fusion being able to cope with data variety and variability. At the same time, it orchestrates the pre-existing processes and resources of these infrastructures. Through rigorous testing, it was found that response time against hazards was dramatically decreased. As a result, this Framework is an ideal candidate for strengthening and shielding the infrastructures\u0026rsquo; resilience while improving management of the resources used.","source":"DOAJ","year":2018,"language":"","subjects":["Engineering machinery, tools, and implements","Technological innovations. Automation"],"doi":"10.3390/inventions3040071","url":"http://www.mdpi.com/2411-5134/3/4/71","pdf_url":"http://www.mdpi.com/2411-5134/3/4/71","is_open_access":true,"published_at":"","score":62},{"id":"doaj_10.23743/acs-2018-06","title":"TESTS OF HTS 2G SUPERCONDUCTING TAPES USING THE LABVIEW ENVIRONMENT","authors":[{"name":"Rafał KWOKA"},{"name":"Janusz KOZAK"},{"name":"Michał MAJKA"}],"abstract":"HTS 2G superconducting tapes without stabilizer are used for the construction of superconducting fault current limiters. The characteristics R =f(T) of the superconducting tape is essential for design of superconducting current limiters and analysis of their numerical models. The article presents the experimentally determined characteristics R=f(T) of the second generation superconducting tapes SF4050 and SF12050 using the LabVIEW integrated environment. The article describes the method of sample preparation and methodology of testing of HTS 2G superconducting tapes. The LabVIEW integrated environment was used for the testing, thanks to which it was possible to download, process and save measurement data.","source":"DOAJ","year":2018,"language":"","subjects":["Information technology","Electronic computers. Computer science"],"doi":"10.23743/acs-2018-06","url":"http://acs.pollub.pl/pdf/v14n1/6.pdf","is_open_access":true,"published_at":"","score":62},{"id":"doaj_10.30656/jsmi.v1i2.473","title":"Analisis Kualitas Layanan Penyerapan Aspirasi Anggota DPR RI Dengan Pendekatan Quality Function Deployment (QFD)","authors":[{"name":"Rizal Sarifuddin"}],"abstract":"Public satisfaction can be achieved if the government apparatus directly involved in the service, can understand and appreciate and wish to perform excellent service. This study aims to identify the level of public satisfaction with the performance of Members of the House of Representatives Commission III, to determine the priority of expectations or public desires on the quality of service absorption aspirations of members of Parliament with Servqual method and improve the quality of absorption services by QFD method. This study, using questionnaires, interviews, and observations in data collection. Research respondents are citizens who have filed complaints totaling 100 people. The survey results are processed by using validity and reliability test, analysis of Importance-Performance Analyze (IPA), Servqual, and QFD. The results showed that the community was not satisfied with the performance of members of the House of Representatives with a gap of 0.84. The priority of improvement based on the IPA diagram is the level of professionalism in solving aspirations, the level of responsibility for the expectation of society aspirations, the level of fairness in the aspiration settlement, the level of aspiration service speed, the accuracy of responding to aspirations according to the problem, the timeliness of completing aspirations and the level of responsiveness to resolve aspirations. Increasing the quality of absorption services by QFD method can be done by increasing commitment, discipline, skilled human resources, coordination and synergy and policy improvement that is more concerned with the interests of the community.","source":"DOAJ","year":2017,"language":"","subjects":["Industrial engineering. Management engineering"],"doi":"10.30656/jsmi.v1i2.473","url":"http://e-jurnal.lppmunsera.org/index.php/JSMI/article/view/473","is_open_access":true,"published_at":"","score":61},{"id":"doaj_Implementasi+Proses+Bisnis+pada+Perusahaan+Retail+Menggunakan+Software+Adempiere","title":"Implementasi Proses Bisnis pada Perusahaan Retail Menggunakan Software Adempiere","authors":[{"name":"Deria Dwi Antari"},{"name":"I Made Sukarsa"},{"name":"I Putu Agung Bayupati"}],"abstract":"Sistem Enterprise Resource Planning (ERP) merupakan sebuah aplikasi sistem informasi terintegrasi yang dapat digunakan untuk pengelolaan dan integrasi proses bisnis perusahaan. Perusahaan retail memiliki beberapa departemen dan menangani transaksi dalam jumlah banyak dalam satu waktu, sehingga penerapan sistem ERP sangat bermanfaat bagi perusahaan tersebut. Sistem ERP dapat mempermudah penyaluran informasi antar departemen karena menggunakan satu logical basis data. Adempiere merupakan software ERP open source yang dapat digunakan untuk pengelolaan proses bisnis menjadi suatu sistem informasi terintegrasi. Proses bisnis yang diimplementasikan adalah proses bisnis pembelian, penjualan, pergudangan, dan akunting. Hasil akhir dari penelitian ini adalah rekomendasi sistem informasi terintegrasi dengan pemodelan proses bisnis perusahaan menggunakan software Adempiere. Proses bisnis existing menjadi terintegrasi dan lebih bersifat otomatis.\n\n \n\nKata Kunci: sistem informasi terintegrasi, enterprise resource planning, Adempiere","source":"DOAJ","year":2016,"language":"","subjects":["Technology","Information technology"],"url":"https://ojs.unud.ac.id/index.php/merpati/article/view/17821","is_open_access":true,"published_at":"","score":60},{"id":"doaj_10.5614/itbj.ict.res.appl.2015.9.1.5","title":"Strengthening Crypto-1 Cipher Against Algebraic Attacks","authors":[{"name":"Farah Afianti"},{"name":"Ari M. Barmawi"}],"abstract":"In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.","source":"DOAJ","year":2015,"language":"","subjects":["Telecommunication","Information technology"],"doi":"10.5614/itbj.ict.res.appl.2015.9.1.5","url":"https://journals.itb.ac.id/index.php/jictra/article/view/1193","is_open_access":true,"published_at":"","score":59},{"id":"doaj_10.15439/2015F388","title":"Rule Quality Measures Settings in a Sequential Covering Rule Induction Algorithm - an Empirical Approach","authors":[{"name":"Marcin Michalak"},{"name":"Marek Sikora"},{"name":"Łukasz Wróbel"}],"abstract":"","source":"DOAJ","year":2015,"language":"","subjects":["Information technology","Electronic computers. Computer science"],"doi":"10.15439/2015F388","url":"https://annals-csis.org/Volume_5/pliks/388.pdf","pdf_url":"https://annals-csis.org/Volume_5/pliks/388.pdf","is_open_access":true,"published_at":"","score":59},{"id":"crossref_10.1007/978-3-642-40063-6_33","title":"Manufacturing and Environmental Management","authors":[{"name":"Soemon Takakuwa"}],"abstract":"","source":"CrossRef","year":2013,"language":"en","subjects":null,"doi":"10.1007/978-3-642-40063-6_33","url":"https://doi.org/10.1007/978-3-642-40063-6_33","is_open_access":true,"published_at":"","score":57}],"total":10814422,"page":1,"page_size":20,"sources":["CrossRef","DOAJ"],"query":"Industrial engineering. Management engineering"}