No abstract available.
Proceeding Downloads
A Model-Based Standardized Testing Approach for Low-Cost Mechanical Ventilator
This paper introduces a standardized testing approach specifically designed for low-cost mechanical ventilators. The primary objective is to ensure that these ventilators are safe, reliable, and perform optimally. Given the surge in demand for affordable ...
Research and implementation on automatic test verification technology for trust root and trust function
Trusted Computing technology is the basic key technology in cybersecurity. Trusted Computing is based on trusted root of TPCM, Equal Protection 2.0 has make clear requirements for trusted verification, but lack of testing methods and tools for the ...
A Review of Human Factors in Remote Software Project Management: A Progressive Look at Human Based Issues in Remote Software Development Environments
There is a documented high rate of project failure within the software engineering community. Many researchers have discussed what the issues are and how to solve them using novel processes, technology, and tools, but the statistics remain mostly ...
Assertive Wiki: An Experience Report In The Industry on the Redesign of Software Requirements Documentation
The development of requirements documentation in the software life cycle process is a crucial step in requirements engineering. However, due to excessive documentation, multiple databases for reference, and difficulties in understanding requirements, ...
Offline Digital Signature Validation Model with Enhanced Time-Stamping
The growing advantage of digital signature has raised an increasing interest in government entities as well as in enterprises to integrate digital signature within their workflows specially with the Egyptian government plans of digital transformation, ...
The Impact of Trendy Topics on Information Diffusion
This paper presents a new information diffusion model that studies the impact of trendy topics on the diffusion process based on content analysis. The suggested model (<Formula format="inline"><TexMath><?TeX $SI_{t_w}R$?></TexMath><AltText>Math 1</...
Visualization Dashboard for Recommending Attack Patterns Using Topic Modeling
The Common Attack Pattern Enumeration and Classification (CAPEC) database is a great resource that software developers can consult to gain a deeper understanding of techniques used by attackers to exploit the vulnerabilities of a software. Attack ...
A New Graph-Based Reinforcement Learning Environment for Targeted Molecular Generation and Optimization✱
- Amgad Abdallah Mahmoud,
- Nada Adel Alyan,
- Ahmed Elkerdawy,
- Shihori Tanabe,
- Andres Frederic,
- Andreas Pester,
- Hesham Ali
Generating a new molecule that satisfies certain desirable objectives or optimizing an existing molecule to meet additional requirements continues to play a crucial part in the important area of computer-aided drug design. Many research studies have ...
Deep Recurrent Neural Network Approach with LSTM Structure for Hand Movement Recognition Using EMG Signals
Due to the increasing number of amputees and the need to use prosthetics that simulate human limbs, an improved technique is proposed to classify hand gestures using Deep Recurrent Neural Networks (DRNN) based on the surface Electromyographic (sEMG) ...
Student Solutions - Soft and Hard in Magnetic Sensing Applications
The actual paper was developed some flexible solutions for students training in magnetic measurements based on the new AICHII magnetic sensor table to detect low levels in the range of nT and was used by our team in Magnetic Measurements in the Master on ...
Instruments for sound therapy vs. music therapy for teenager's emotional development
Sound and music therapy has been used to cope with changes during this period of life. This study was conducted to determine and compare the effect of two types of therapeutic interventions. It aimed to compare the efficiency of sound therapy (passive ...
Exploring the relationship between music, medicine and physics. Why pluralism is necessary in music therapy?
A variety of fields, including music, psychology, neuroscience, and medicine, are naturally incorporated into music therapy. In this article, we will discuss the intersection of music therapy with physics and medicine, which are two of the realms that ...
A Novel Optimized Resource Allocation Algorithm using GWO Optimization Technique for WBAN
Wireless Body Area Networks have severe challenges in energy management to enhance the longevity of the system. Specifically, for a WBAN system that operates by ambient energy sources. The system combines energy scavenging modules integrated into the ...
Security Issues in the Deep and Dark Web: What to know?
Anything beyond Surface Web is defined as the Deep Web. In the literature, several researchers use the terms Deep Web and Dark Web interchangeably, but this is a misperception. The latter is a subpart of the deep web, and needs special software to access ...
Employing Frequency Independent Structure for Ultra-Wide Band Antenna
The paper presents a novel and compact design for an ultra-wideband antenna based on frequency independent ethos. It consists of a Log-Periodic monopole structure with specific angle for the radiating patch with a defected ground plane. The antenna is ...
Index Terms
- Proceedings of the 2023 12th International Conference on Software and Information Engineering