Volume 3, Issue 3A

Fuzzy Inference Model for Type 2 Diabetes Management: a Tool for Regimen Alterations
Special Issue
This paper aims to demonstrate the utility of fuzzy set theory in the design process of a diabetes management system that enables patients to make short term alterations (particularly lifestyle) to their overall regimen as required. The model is a Mamdani Fuzzy Inference System (FIS) configured through domain specific information from experts and recognised diabetes management algorithms. The FIS takes a multi-input multi-output (MIMO) design approach with seven inputs variables (age, gender, weight, height, blood glucose (BG), exercise and diet) and three outputs (glycatedhaemoglobin (A1c), exercise and diet level assessments). Goodness of fit test was conducted based on Mean Square Error (MSE), Normalised Mean Square Error (NMSE) and Normalised Root Mean Square Error (NRMSE) between observed/advised and predicted output values. Overall MSE of 0.0899 shows good fit. For each of the output pairs (A1c, exercise and diet), NRMSE (0.7387, 0.7881 and 0.3716) and NMSE (0.9317, 0.9551 and 0.6051) shows good fit for A1c and exercise, but poor fit for diet. Intelligent models of this sort can help simplify management information for diabetes patients, reduce routine workload for clinicians and allow them to focus more on critical issues. Fully developed, this system can be used to build a database of diabetes management cases that includes daily life event information, ultimately leading to automated care for patients through technology.
why does my boyfriend cheat site how to get your boyfriend to cheat on you
desi adult stories open maami sex stories
erotic preteen sex stories survivingediscovery.com adult teacher anal sex stories
how much does an abortion cost montechristo.co.za how expensive are abortions
why people cheat dating sites for married people married looking to cheat
women cheat on men how to cheat on husband married men who cheat
women love to cheat meet and cheat why wife cheat
copay cards for prescription drugs cialis coupons from lilly printable coupons for cialis
prescription transfer coupon copay cards for prescription drugs free coupon for viagra
internet drug coupons fyter.cn drug coupons
how many women cheat storyofcheating.com why do people cheat
cialis discount coupons sporturfintl.com 2015 cialis coupon
free prescription discount cards codesamples.in drug coupons
selegilin preis selegilin beipackzettel selegilin tabletta
Journal of Computer Sciences and Applications. 2015, 3(3A), 40-45. DOI: 10.12691/jcsa-3-3A-5
Pub. Date: July 23, 2015
15950 Views4784 Downloads2 Likes1 Citations
A Survey on Cryptography Key Management Schemes for Smart Grid
Special Issue
A Smart grid is a modern electricity delivery system. It is an integration of energy systems and other necessary elements including traditional upgrades and new grid technologies with renewable generation and increased consumer storage. It uses information and communication technology (ICT) to operate, monitor and control data between the generation source and the end user. Smart grids have duplex power flow and communication to achieve high efficiency, reliability, environmental, economics, security and safety standards. However, along with unique facilities, smart grids face security challenges such as access control, connectivity, fault tolerance, privacy, and other security issues. Cyber-attacks, in the recent past, on critical infrastructure including smart grids have highlighted security as a major requirement for smart grids. Therefore, cryptography and key management are necessary for smart grids to become secure and realizable. Key management schemes are processes of key organizational frameworks, distribution, generation, refresh and key storage policies. Currently, several secure schemes, related to key management for smart grid have been proposed to achieve end-to-end secure communication. This paper presents a comprehensive survey and discussion on the current state of the key management of smart grids.
why does my boyfriend cheat cheat on boyfriend how to get your boyfriend to cheat on you
why husband cheat blog.123landlord.com infidelity signs
how to cheat on my husband justinbuchanan.com looking to cheat
adult breastfeeding stories go mom sex stories
lesbian sex stories linotancredi.com mom sex stories
viagra free sample coupons printable viagra coupon viagra coupon
printable free coupons bvandam.com free rx coupons
neurontin 400mg link zovirax pill
discount drug coupons viagra coupons from pfizer viagra coupon card
internet drug coupons floridafriendlyplants.com viagra prescription coupon
can i take antabuse and naltrexone can i take antabuse and naltrexone can i take antabuse and naltrexone
lisinopril and arm pain lisinopril and arm pain lisinopril and arm pain
pet prescription discount card link lilly cialis coupon
coupons for drugs click cialis savings and coupons
cialis savings and coupons blog.nvcoin.com new prescription coupons
Journal of Computer Sciences and Applications. 2015, 3(3A), 27-39. DOI: 10.12691/jcsa-3-3A-4
Pub. Date: July 23, 2015
16962 Views5212 Downloads3 Likes2 Citations
Service Oriented Testing for Web Services
Special Issue
Web Services are an emerging facet of Service Oriented Architecture and have promised to address the challenging issue of application integration. Web Services, as a concept, have been developed in order to build and create distributed software applications. These services have many advantages such as, the interoperability between heterogeneous applications, and the ability to design and launch these services regardless of platform, programming language or operating system. For enterprises and academic establishments this is advantageous in a number of ways. It has become apparent however that Web Services face many diverse challenges which are preventing the technology from truly being adopted. Many industries such as defence and critical infrastructure have become increasingly interested in the use of Web Services but in order for them to play an integral part in today’s society, an array of issues must first be addressed. We believe that as an issue, trust can be considered as one of the main technological barriers currently facing Web Services, in particular, trust challenges such as reliability and security. By implementing Web Services into systems that rely on having high standards of reliability and security, trust needs to be guaranteed between the provider and the consumer. One way to help provide assurance for this is to provide adequate means of testing. At its core, testing is the process of executing a program with the intent of finding errors to ensure whether a system is functioning as intended. This can involve activities such as specifying test cases, generating test data, monitoring test execution, measuring test coverage, validating test results and tracking system errors. In recent years, research on testing Web Services and Web Service compositions has been gaining much attention and is growing at a rapid pace. Testing is vital in any environment to help ensure a degree of trust. While there are many issues facing Service Oriented Architecture and in particular, Web Service technology, the trust challenge is a particularly critical issue which needs to be addressed. This paper outlines current research for the effective means of testing Web Services, online and in the cloud computing environment. We aim to provide means for Web Services to be composed and tested in real time, over the cloud, utilising test case generation methods and Oracle decision making. By testing Web Services and ensuring their functionality, we can provide a degree of trust to the service consumer, that the Service they are requesting is available and will function as intended. We have detailed the importance of Service testing and the reason for why it should be considered as an immediate issue to address.
coupon free read discount prescription cards
walgreens photo code ps4haber.com walgreens print coupon
why husbands cheat percentage of women who cheat what makes husbands cheat
manual vacuum aspiration abortion site how abortions are performed
printable free coupons drugs coupons free rx coupons
rite aid coupons 2015 walgreens photo coupon prints walgreens photo in store coupon
can i take antabuse and naltrexone can i take antabuse and naltrexone can i take antabuse and naltrexone
abortion prices blogs.visendo.de average cost of abortion
low blood sugar blood sugar control
cialis marche pas avec moi cialis marche pas avec moi cialis marche pas avec moi
cialis discount coupons sporturfintl.com 2015 cialis coupon
avodart buy uk avodart avodart buy uk
Journal of Computer Sciences and Applications. 2015, 3(3A), 21-26. DOI: 10.12691/jcsa-3-3A-3
Pub. Date: July 23, 2015
13129 Views4223 Downloads3 Likes1 Citations
Collaborative Intrusion Detection in Federated Cloud Environments
Special Issue
Moving services to the Cloud is a trend that has steadly gained popularity over recent years, with a constant increase in sophistication and complexity of such services. Today, critical infrastructure operators are considering moving their services and data to the Cloud. Infrastructure vendors will inevitably take advantage of the benefits Cloud Computing has to offer. As Cloud Computing grows in popularity, new models are deployed to exploit even further its full capacity, one of which is the deployment of Cloud federations. A Cloud federation is an association among different Cloud Service Providers (CSPs) with the goal of sharing resources and data. In providing a larger-scale and higher performance infrastructure, federation enables on-demand provisioning of complex services. In this paper we convey our contribution to this area by outlining our proposed methodology that develops a robust collaborative intrusion detection methodology in a federated Cloud environment. For collaborative intrusion detection we use the Dempster-Shafer theory of evidence to fuse the beliefs provided by the monitoring entities, taking the final decision regarding a possible attack. Protecting the federated Cloud against cyber attacks is a vital concern, due to the potential for significant economic consequences.
why do men cheat on their girlfriends link i had a dream my girlfriend cheated on me
positive abortion stories abortion procedure abortion at 5 weeks
cheat husband My boyfriend cheated on me my husband cheated
rite aid coupons 2015 link walgreens photo in store coupon
naltrexone serdarnas.com diprolene 0.05%
pet rx coupon discount prescriptions pharmacy codes
discount prescription drug cards open cialis prescription coupon
internet drug coupons viagra coupons from manufacturer drug coupons
info on abortion read average abortion cost
cialis discount coupons sporturfintl.com 2015 cialis coupon
cialis gel blog.devparam.com cialis forum hr
niacin centauricom.com niasinamid
reglan bez recepta tracyawheeler.com reglan upute
side effects of naltrexone implant naltrexone alcoholism medication naloxone alcohol treatment
Journal of Computer Sciences and Applications. 2015, 3(3A), 10-20. DOI: 10.12691/jcsa-3-3A-2
Pub. Date: July 23, 2015
15868 Views5481 Downloads2 Likes2 Citations
Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems
Special Issue
The amount of information that is being created, every day, is quickly growing. As such, it is now more common than ever to deal with extremely large datasets. As systems develop and become more intelligent and adaptive, analysing their behaviour is a challenge. The heterogeneity, volume and speed of data generation are increasing rapidly. This is further exacerbated by the use of wireless networks, sensors, smartphones and the Internet. Such systems are capable of generating a phenomenal amount of information and the need to analyse their behaviour, to detect security anomalies or predict future demands for example, is becoming harder. Furthermore, securing such systems is a challenge. As threats evolve, so should security measures develop and adopt increasingly intelligent security techniques. Adaptive systems must be employed and existing methods built upon to provide well-structured defence in depth. Despite the clear need to develop effective protection methods, the task is a difficult one, as there are significant weaknesses in the existing security currently in place. Consequently, this special issue of the Journal of Computer Sciences and Applications discusses big data analytics in intelligent systems. The specific topics of discussion include the Internet of Things, Web Services, Cloud Computing, Security and Interconnected Systems.
why does my boyfriend cheat cheat on boyfriend how to get your boyfriend to cheat on you
married men cheat blog.sitters4charities.org love affairs with married men
my husband cheated with a man sigridw.com beautiful women cheat
neurontin 400mg levofloxacin zovirax pill
cipro 250mg shouldersofgiants.co.uk sildenafil citrate 200mg
discount prescriptions online link free coupon sites
promo code for walgreens walgreens in store photo coupon walgreens photo coupons online
discount prescription coupons read discount prescription drug card
discount prescription drug cards open cialis prescription coupon
info on abortion read average abortion cost
cialis coupon code cialis coupon code coupon prescription
cialis discount coupons sporturfintl.com 2015 cialis coupon
cialis coupons free link cialis discount coupons online
cialis gel cialis forum hr cialis forum hr
amoxicillin bivirkninger link amoxicillin rash
Journal of Computer Sciences and Applications. 2015, 3(3A), 1-9. DOI: 10.12691/jcsa-3-3A-1
Pub. Date: July 23, 2015
16679 Views5378 Downloads5 Likes2 Citations