by Nonso Nnamoko, Farath Arshad, David England, Jiten Vora and James Norman
Special Issue
This paper aims to demonstrate the utility of fuzzy set theory in the design process of a diabetes management system that enables patients to make short term alterations (particularly lifestyle) to their overall regimen as required. The model is a Mamdani Fuzzy Inference System (FIS) configured through domain specific information from experts and recognised diabetes management algorithms. The FIS takes a multi-input multi-output (MIMO) design approach with seven inputs variables (age, gender, weight, height, blood glucose (BG), exercise and diet) and three outputs (glycatedhaemoglobin (A1c), exercise and diet level assessments). Goodness of fit test was conducted based on Mean Square Error (MSE), Normalised Mean Square Error (NMSE) and Normalised Root Mean Square Error (NRMSE) between observed/advised and predicted output values. Overall MSE of 0.0899 shows good fit. For each of the output pairs (A1c, exercise and diet), NRMSE (0.7387, 0.7881 and 0.3716) and NMSE (0.9317, 0.9551 and 0.6051) shows good fit for A1c and exercise, but poor fit for diet. Intelligent models of this sort can help simplify management information for diabetes patients, reduce routine workload for clinicians and allow them to focus more on critical issues. Fully developed, this system can be used to build a database of diabetes management cases that includes daily life event information, ultimately leading to automated care for patients through technology.why does my boyfriend cheat
site how to get your boyfriend to cheat on you
desi adult stories
open maami sex stories
internet drug coupons
fyter.cn drug coupons
Journal of Computer Sciences and Applications. 2015, 3(3A), 40-45. DOI: 10.12691/jcsa-3-3A-5
Pub. Date: July 23, 2015
15950 Views4784 Downloads2 Likes1 Citations
by Bashar Alohali, Kashif Kifayat, Qi Shi and William Hurst
Special Issue
A Smart grid is a modern electricity delivery system. It is an integration of energy systems and other necessary elements including traditional upgrades and new grid technologies with renewable generation and increased consumer storage. It uses information and communication technology (ICT) to operate, monitor and control data between the generation source and the end user. Smart grids have duplex power flow and communication to achieve high efficiency, reliability, environmental, economics, security and safety standards. However, along with unique facilities, smart grids face security challenges such as access control, connectivity, fault tolerance, privacy, and other security issues. Cyber-attacks, in the recent past, on critical infrastructure including smart grids have highlighted security as a major requirement for smart grids. Therefore, cryptography and key management are necessary for smart grids to become secure and realizable. Key management schemes are processes of key organizational frameworks, distribution, generation, refresh and key storage policies. Currently, several secure schemes, related to key management for smart grid have been proposed to achieve end-to-end secure communication. This paper presents a comprehensive survey and discussion on the current state of the key management of smart grids.adult breastfeeding stories
go mom sex stories
neurontin 400mg
link zovirax pill
pet prescription discount card
link lilly cialis coupon
coupons for drugs
click cialis savings and coupons
Journal of Computer Sciences and Applications. 2015, 3(3A), 27-39. DOI: 10.12691/jcsa-3-3A-4
Pub. Date: July 23, 2015
16962 Views5212 Downloads3 Likes2 Citations
by Paul Buck and Qi Shi
Special Issue
Web Services are an emerging facet of Service Oriented Architecture and have promised to address the challenging issue of application integration. Web Services, as a concept, have been developed in order to build and create distributed software applications. These services have many advantages such as, the interoperability between heterogeneous applications, and the ability to design and launch these services regardless of platform, programming language or operating system. For enterprises and academic establishments this is advantageous in a number of ways. It has become apparent however that Web Services face many diverse challenges which are preventing the technology from truly being adopted. Many industries such as defence and critical infrastructure have become increasingly interested in the use of Web Services but in order for them to play an integral part in today’s society, an array of issues must first be addressed. We believe that as an issue, trust can be considered as one of the main technological barriers currently facing Web Services, in particular, trust challenges such as reliability and security. By implementing Web Services into systems that rely on having high standards of reliability and security, trust needs to be guaranteed between the provider and the consumer. One way to help provide assurance for this is to provide adequate means of testing. At its core, testing is the process of executing a program with the intent of finding errors to ensure whether a system is functioning as intended. This can involve activities such as specifying test cases, generating test data, monitoring test execution, measuring test coverage, validating test results and tracking system errors. In recent years, research on testing Web Services and Web Service compositions has been gaining much attention and is growing at a rapid pace. Testing is vital in any environment to help ensure a degree of trust. While there are many issues facing Service Oriented Architecture and in particular, Web Service technology, the trust challenge is a particularly critical issue which needs to be addressed. This paper outlines current research for the effective means of testing Web Services, online and in the cloud computing environment. We aim to provide means for Web Services to be composed and tested in real time, over the cloud, utilising test case generation methods and Oracle decision making. By testing Web Services and ensuring their functionality, we can provide a degree of trust to the service consumer, that the Service they are requesting is available and will function as intended. We have detailed the importance of Service testing and the reason for why it should be considered as an immediate issue to address.coupon free
read discount prescription cards
manual vacuum aspiration abortion
site how abortions are performed
low blood sugar
blood sugar control
avodart buy uk
avodart avodart buy uk
Journal of Computer Sciences and Applications. 2015, 3(3A), 21-26. DOI: 10.12691/jcsa-3-3A-3
Pub. Date: July 23, 2015
13129 Views4223 Downloads3 Likes1 Citations
by ÁineMac Dermott, Qi Shi and Kashif Kifayat
Special Issue
Moving services to the Cloud is a trend that has steadly gained popularity over recent years, with a constant increase in sophistication and complexity of such services. Today, critical infrastructure operators are considering moving their services and data to the Cloud. Infrastructure vendors will inevitably take advantage of the benefits Cloud Computing has to offer. As Cloud Computing grows in popularity, new models are deployed to exploit even further its full capacity, one of which is the deployment of Cloud federations. A Cloud federation is an association among different Cloud Service Providers (CSPs) with the goal of sharing resources and data. In providing a larger-scale and higher performance infrastructure, federation enables on-demand provisioning of complex services. In this paper we convey our contribution to this area by outlining our proposed methodology that develops a robust collaborative intrusion detection methodology in a federated Cloud environment. For collaborative intrusion detection we use the Dempster-Shafer theory of evidence to fuse the beliefs provided by the monitoring entities, taking the final decision regarding a possible attack. Protecting the federated Cloud against cyber attacks is a vital concern, due to the potential for significant economic consequences.why do men cheat on their girlfriends
link i had a dream my girlfriend cheated on me
rite aid coupons 2015
link walgreens photo in store coupon
discount prescription drug cards
open cialis prescription coupon
info on abortion
read average abortion cost
Journal of Computer Sciences and Applications. 2015, 3(3A), 10-20. DOI: 10.12691/jcsa-3-3A-2
Pub. Date: July 23, 2015
15868 Views5481 Downloads2 Likes2 Citations
by William Hurst and Chelsea Dobbins
Special Issue
The amount of information that is being created, every day, is quickly growing. As such, it is now more common than ever to deal with extremely large datasets. As systems develop and become more intelligent and adaptive, analysing their behaviour is a challenge. The heterogeneity, volume and speed of data generation are increasing rapidly. This is further exacerbated by the use of wireless networks, sensors, smartphones and the Internet. Such systems are capable of generating a phenomenal amount of information and the need to analyse their behaviour, to detect security anomalies or predict future demands for example, is becoming harder. Furthermore, securing such systems is a challenge. As threats evolve, so should security measures develop and adopt increasingly intelligent security techniques. Adaptive systems must be employed and existing methods built upon to provide well-structured defence in depth. Despite the clear need to develop effective protection methods, the task is a difficult one, as there are significant weaknesses in the existing security currently in place. Consequently, this special issue of the Journal of Computer Sciences and Applications discusses big data analytics in intelligent systems. The specific topics of discussion include the Internet of Things, Web Services, Cloud Computing, Security and Interconnected Systems.my husband cheated with a man
sigridw.com beautiful women cheat
discount prescriptions online
link free coupon sites
discount prescription coupons
read discount prescription drug card
discount prescription drug cards
open cialis prescription coupon
info on abortion
read average abortion cost
cialis coupons free
link cialis discount coupons online
amoxicillin bivirkninger
link amoxicillin rash
Journal of Computer Sciences and Applications. 2015, 3(3A), 1-9. DOI: 10.12691/jcsa-3-3A-1
Pub. Date: July 23, 2015
16679 Views5378 Downloads5 Likes2 Citations