Buscar
Mostrando ítems 111-120 de 135
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)
Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ...
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ...
Labor Induction failure prediction using Gabor filterbanks and Center Symmetric Local Binary Patterns
(IEEE, 2018)
Labor induction is defined as the artificial stimulation of uterine contractions aimed to induce vaginal birth. Occurring in about 20% of pregnancies labor induction has become one the most commonly practiced procedures ...
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Labor Induction failure prediction based on B-Mode Ultrasound Image Processing using Multiscale Local Binary Patterns
(IEEE, 2016)
Labor induction is defined as the artificial onset of labor for the purpose of vaginal birth. Cesarean section is one of the potential risks of labor induction as it occurs in about 20% of the inductions. A ripe cervix ...
Analysis of non-uniform circumferential segmentation of magnets to reduce eddy-current losses in SPMSM machines
(IEEE, 2012)
Eddy current losses generated in the rotor of the permanent magnet machines may lead to an excessive magnet heating. This can cause full demagnetization of the magnets so it is very important to analyze the losses on them ...
Novel SHM method to locate damages in substructures based on VARX models
(IOP, 2015)
A novel damage localization method is proposed, which is based on a substructuring approach and makes use of Vector Auto-Regressive with eXogenous input (VARX) models. The substructuring approach aims to divide the monitored ...
Delta Rhapsody
(2016)
Model Based System Engineering (MBSE) has become the pre-eminent paradigm used to improve the development of complex systems. Additionally, Delta Modelling provides an incremental approach to the design and maintenance of ...
Characterization of Ti64 forging friction factor using ceramic coatings and different contact conditions
(Elsevier, 2017)
Hot forging processes are highly influenced by the contact conditions between the billet and the dies. A wrong definition of the contact conditions may lead to wrong predictions of the final component geometry, the quantity ...
Influence of tool wear on residual stresses when turning Inconel 718
(Elsevier, 2016)
This paper analyzes the effect of tool wear on residual stresses when turning. Inconel 718 discs were machined for prolonged periods at several cutting speeds, feed-rates and depth of cut. Tests were interrupted to measure ...