Sciweavers

EMS
2008
IEEE
13 years 6 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
EMS
2008
IEEE
13 years 11 months ago
Rough Set Generating Prediction Rules for Stock Price Movement
This paper presents rough sets generating prediction rules scheme for stock price movement. The scheme was able to extract knowledge in the form of rules from daily stock movement...
Hameed Al-Qaheri, Shariffah Zamoon, Aboul Ella Has...
EMS
2008
IEEE
13 years 11 months ago
A Weighted Utility Framework for Mining Association Rules
Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of oc...
M. Sulaiman Khan, Maybin K. Muyeba, Frans Coenen
EMS
2008
IEEE
13 years 11 months ago
Modelling the Relationship between Visual Short-Term Memory Capacity and Recall Ability
Previous cognitive modelling work has suggested that the decline of short-term memory (STM) capacity is the dominant factor of age-related decline on recall ability. We report the...
Richard Ll. Smith, Peter C. R. Lane, Fernand Gobet
EMS
2008
IEEE
13 years 11 months ago
Vibration and Input Tracking Control of Flexible Manipulator Using LQR with Non-Collocated PID Controller
This paper presents investigations into the development of control schemes for end-point vibration suppression and input tracking of a flexible manipulator. A constrained planar s...
M. A. Ahmad