On Some Knowledge Measures of Intuitionistic Fuzzy Sets of Type Two with Application to MCDM
To overcome the certain limitations of Intuitionistic Fuzzy Sets (IFSs), the notion of Intuitionistic Fuzzy Sets of Second Type (IFSST) was introduced. IFSST is a modified version of IFS for handling some problems in a reasonable manner. Type two ...
EnQuad: A Publicly-Available Simulator for Quantum Key Distribution Protocols
In this paper, we present EnQuad Version 1.0: a high-speed and expandable simulator for Quantum Key Distribution (QKD) protocols. Surpassing available simulators, EnQuad does not only simulate a QKD stack, but also does security testing and guides ...
A Hybrid Technique for Server Consolidation in Cloud Computing Environment
The goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation ...
IDD – A Platform Enabling Differential Debugging
Debugging is a very time consuming task which is not well supported by existing tools. The existing methods do not provide tools enabling optimal developers’ productivity when debugging regressions in complex systems. In this paper we describe a ...
Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform
This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the ...
An Indonesian Hoax News Detection System Using Reader Feedback and Naïve Bayes Algorithm
Hoax news in Indonesia spread at an alarming rate. To reduce this, hoax news detection system needs to be created and put into practice. Such a system may use readers’ feedback and Naïve Bayes algorithm, which is used to verify news. Overtime, by ...
A Smart Social Insurance Big Data Analytics Framework Based on Machine Learning Algorithms
Social insurance is an individual’s protection against risks such as retirement, death or disability. Big data mining and analytics are a way that could help the insurers and the actuaries to get the optimal decision for the insured individuals. ...
Question Analysis towards a Vietnamese Question Answering System in the Education Domain
Building a computer system, which can automatically answer questions in the human language, speech or text, is a long-standing goal of the Artificial Intelligence (AI) field. Question analysis, the task of extracting important information from the ...
Algorithm and Software System for Treatment Application of Platelet-Rich Plasma on Problematic Skin Wounds
Recently a big interest arises to the automated diagnosis and digitalization of clinical data. The purpose of this article is to present treatment algorithm and software system for Problematic Skin Wounds (PSW) by using Platelet-Rich Plasma (PRP), ...
IoT Utilized Gas-Leakage Monitoring System with Adaptive Controls Applicable to Dual Fuel Powered Naval Vessels/Ships: Development & Implementation
Leakage of Liquefied Petroleum Gas and Liquified Natural Gas (LPG/LNG) produces hazardous and toxic impact on humans and other living creatures. The authors developed a system to monitor and control the gas leakage concentration. MQ-6 gas sensor ...
Robust Gain-Scheduled PID Control: A Parameter Dependent BMI Solution
In control practices, problems of parametric or time-varying uncertainties must be dealt with. Robust control based on norm theory and convex and non-convex optimization algorithms is a powerful tool to solve these problems in theory, but it is ...