Computer and Information Science最新文献

筛选
英文 中文
Study of the Simulation and Application of the PEEC Method for Modeling the Prediction of Emissions Radiated by the Onboard Electronic Wiring System 车载电子布线系统辐射预测建模中 PEEC 方法的模拟和应用研究
Computer and Information Science Pub Date : 2024-07-19 DOI: 10.5539/cis.v17n2p7
Anthony Bassesuka Sandoka Nzao
{"title":"Study of the Simulation and Application of the PEEC Method for Modeling the Prediction of Emissions Radiated by the Onboard Electronic Wiring System","authors":"Anthony Bassesuka Sandoka Nzao","doi":"10.5539/cis.v17n2p7","DOIUrl":"https://doi.org/10.5539/cis.v17n2p7","url":null,"abstract":"The coexistence of electronic power and control systems in the same box presents a serious threat to the proper functioning of electronic systems integrated into automobiles, aeronautics and space. Thus, managing the electromagnetic compatibility of these systems constitutes a challenge, particularly given electromagnetic phenomena. This paper describes a simulation study and application of the partial element equivalent circuit method to model the prediction of radiated emissions from the onboard electronic cable system. In this article, we first explain the use of the partial cell equivalent circuit modeling method, then describe its mathematical formulation and introduce the different electromagnetic phenomena it considers in connection with wiring, then propose radiation calculations electromagnetic as a function of the geometry of the discrete cells taking into account the increase in frequency. The goal is to get as close to the structure as possible. To balance the accuracy and speed of the proposed method, we replaced the partial capacities with the equivalent capacities so as to considerably minimize the number of capacities, the complexity of the system and the computational time requirement. This option adapts the partial element equivalent circuit method to the study of larger structures such as cable structures and provides an efficient and rapid way to simulate electromagnetic radiation. To achieve this objective, we have associated the physical laws of electromagnetic wave propagation with the method of modeling equivalent circuits using partial elements because it is easy to manipulate flat surfaces and cables. 2D simulations based on the proposed models were developed as well as the verification of the consistency of the different models, by comparing the fractal dimensions of the program results with those of the figures obtained experimentally.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"104 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model for Total Cost Determination in Open-Source Software Ownership: Case of Kenyan Universities’ Learning Management System 开源软件所有权总成本确定模型:肯尼亚大学学习管理系统案例
Computer and Information Science Pub Date : 2024-03-08 DOI: 10.5539/cis.v17n1p18
Duncan Kereu Kodhek, J. Kamau, F. Musyoka
{"title":"A Model for Total Cost Determination in Open-Source Software Ownership: Case of Kenyan Universities’ Learning Management System","authors":"Duncan Kereu Kodhek, J. Kamau, F. Musyoka","doi":"10.5539/cis.v17n1p18","DOIUrl":"https://doi.org/10.5539/cis.v17n1p18","url":null,"abstract":"The adoption of open-source products is slowly increasing; the increase, however, is slower than expected, considering that most open-source products are freely available. Researchers and scholars have attributed the adoption levels to, among other things, a lack of know-how of the total cost of ownership of the open-source software. Thus, it is crucial for the cost of owning the software to be developed. While an ongoing endeavor to develop a model to determine the total cost of ownership of open-source software, the models have proved to be less accurate and do not capture essential elements. Moreover, there has been a rising call for organizations to adopt open-source software to lower the software costs incurred on proprietary software. If the cost of owning open-source software were known, it would be beneficial as several organizations and institutions could adopt it readily. The data was collected from Universities in Kiambu and Embu Counties. Linear regression analysis was done to help develop the model, and a mathematical model was developed. The proposed model was: total cost of open-source software ownership = direct + +indirect + hidden costs. To validate the model, it was subjected to expert validation. The model will be an outstanding contribution to information technology as it will make it possible to come up with the total cost of owning open-source software.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"104 S110","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140257054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments 防止和缓解虚拟化环境中基于缓存的 AES 系统侧信道攻击
Computer and Information Science Pub Date : 2024-02-27 DOI: 10.5539/cis.v17n1p9
Abdullah Albalawi
{"title":"On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments","authors":"Abdullah Albalawi","doi":"10.5539/cis.v17n1p9","DOIUrl":"https://doi.org/10.5539/cis.v17n1p9","url":null,"abstract":"Cloud computing aims to cut costs through a reduction in spending on equipment, infrastructure, and software by applying the multi-tenancy feature. Despite all the benefits of multi-tenancy, it is still a source of risk in cloud computing. Cloud adoption may be hampered by security concerns if suitable cloud-based security solutions are not available. Moreover, virtualization that enables multi-tenancy, considered one of the main components of a cloud, introduces major security risks and does not offer appropriate isolation between different instances running on the same physical machine. In this paper, we present a preliminary idea that may support the development of new countermeasures for a particular type of threat, namely cache-based side-channel attacks that target cache memories in virtualized environments. Attackers specifically target virtual machines in this type of attack to create many side channels and gather sensitive data. Additionally, this research offers preliminary concepts to aid in developing of solutions or defenses that enable us to identify unusual activity that could point to attacks associated with multi-tenancy, as well as security measures that preserve the benefits of multi-tenancy while lowering security concerns.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"264 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140427964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expanding the Breadth of Ability in Artificial Intelligence Systems with Decision Trees 用决策树扩展人工智能系统的能力范围
Computer and Information Science Pub Date : 2024-01-31 DOI: 10.5539/cis.v17n1p1
Andrew McInnis Jr, Mohammad Alshibli, Ahmad Alzaghal, Samir Hamada
{"title":"Expanding the Breadth of Ability in Artificial Intelligence Systems with Decision Trees","authors":"Andrew McInnis Jr, Mohammad Alshibli, Ahmad Alzaghal, Samir Hamada","doi":"10.5539/cis.v17n1p1","DOIUrl":"https://doi.org/10.5539/cis.v17n1p1","url":null,"abstract":"This paper introduces a unique perspective. Rather than focusing on improving the already significant achievements of existing artificial intelligence algorithms, it investigates the potential of merging various algorithms to enhance their overall capabilities. Essential design aspects required for this integration are examined, and a prototype system is developed to demonstrate the practical application of these design principles. This method aims to broaden the range of capabilities accessible to a system, addressing the limitation of the narrow focus prevalent in contemporary artificial intelligence.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"115 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140475765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信