- Advanced Statistical Process Monitoring
- Advanced Statistical Methods and Models
- Digital Media Forensic Detection
- Software Engineering Research
- Advanced Software Engineering Methodologies
- Industrial Vision Systems and Defect Detection
- Software Reliability and Analysis Research
- Software System Performance and Reliability
- Fault Detection and Control Systems
- Scientific Measurement and Uncertainty Evaluation
- Advanced Steganography and Watermarking Techniques
- Network Security and Intrusion Detection
- Transportation and Mobility Innovations
- Cultural Heritage Materials Analysis
- Systems Engineering Methodologies and Applications
- Digital Transformation in Industry
- Context-Aware Activity Recognition Systems
- Urban and Freight Transport Logistics
- Anomaly Detection Techniques and Applications
- Software Engineering Techniques and Practices
- Image Processing Techniques and Applications
- Color Science and Applications
- IoT and Edge/Fog Computing
- Polymer Science and PVC
- Plant biochemistry and biosynthesis
Dong A University
2018-2021
Da Nang University of Technology
2018-2021
Laboratoire Génie et Matériaux Textiles
2020-2021
École Nationale Supérieure des Arts et Industries Textiles
2020-2021
Laboratoire de Mathématiques de Bretagne Atlantique
2017-2020
Institute of Art
2020
Dong-A University
2020
University of Liège
2020
Université de Bretagne Occidentale
2017-2019
Université de Bretagne Sud
2017-2019
Abstract In many industrial manufacturing processes, the ratio of variance to mean a quantity interest is an important characteristic ensure quality processes. This called coefficient variation (CV). A lot control charts have been designed for monitoring CV univariate in literature. However, multivariate not received much attention yet. this paper, we investigate variable sampling interval (VSI) Shewhart chart CV. The time between two consecutive samples allowed vary according previous value...
Shewhart's type control charts for monitoring the Multivariate Coefficient of Variation (MCV) have recently been proposed in order to monitor relative variability compared with mean. These approaches are known be rather slow detection small or moderate process shifts. In this paper, improve efficiency, two one-sided Synthetic MCV proposed. A Markov chain method is used evaluate statistical performance charts. Furthermore, computational experiments reveal that outperform Shewhart chart terms...
Management of software architecture knowledge is vital for improving an organisation's architectural capabilities. Despite the recognition importance capturing and reusing knowledge, there currently no suitable support mechanism available. To address this issue, we have developed a conceptual framework managing design knowledge. A Web-based management tool, Process-based Architecture Knowledge Environment (PAKME), has been to that framework. PAKME being trialled help systematise evaluation...
Last mile delivery is a significant component in the growth of e-commerce, especially urban areas. The deliveries dense cities cause several serious issues such as air/noise pollution and congestion. In this study, we compare financial costs CO2 emissions from different last strategies grocery bins scenario Paris with four types vehicles (diesel/electric vans, cargo bikes, autonomous vehicles). We use associated each vehicle type, location data constraints for establishments Paris, scenarios...
In this paper, we present a method to monitor the coefficient of variation (CV) squared using two one-sided synthetic control charts. The numerical results show that our design outperforms two-sided chart monitoring CV. steady-state, which is have practical meaning in many situations, also considered. We use Markov chain evaluate statistical performance proposed Furthermore, effect measurement errors on charts CV firstly investigated.
One-class support vector machines (OCSVM) have been recently applied in intrusion detection. Typically, OCSVM is kernelized by radial basis functions (RBF, or Gaussian kernel) whereas selecting kernel hyperparameter based upon availability of attacks, which rarely applicable practice. This paper investigates the application nested to detect intruders network systems with data-driven optimization. The able improve efficiency over proposed In addition, information farthest and nearest...
The last decade has seen more UN peacekeepers than ever before coming from countries neighboring the host state. This report uses IPI Peacekeeping Database to explore this increase in neighborhood contributions between 1990 and 2017. While less 3 percent of all came next-door neighbors early 1990s, number had increased about 20 by
Microscopic analyses of paper printing show some regularly spaced dots whose the shape depends on technology and tuning printer as well properties. The modeling identification ink interactions are required for qualifying quality, controlling process also authentication issues. In this paper, we propose to model micrometric scan document by a binary response parameters depend location dots. A maximum likelihood algorithm is provided, its performance assessed through simulations true data....
This paper presents a novel system integration technical risk assessment model (SITRAM), which is based on Bayesian belief networks (BBN) coupled with parametric models (PM). provides statistical information for decision makers, improving management of complex projects. System risks (SITR) represent significant part project associated the development large software intensive systems defense and commercial applications. We propose conceptual modeling framework to address problem SITR in early...
In this paper we are concerned by authentication of printer technologies from microscopic analysis print. At scale, a print is made regularly spaced dots whose shape varies to another and also inside the same document. Thus, dot at scale can be considered as an intrinsic signature technologies. Modeling estimating such for really challenging. paper, propose original modeling micrometric scan document printing. It consists in extension binary response model which takes into account shape. The...
Due to the advent of digital technologies, it has become much easier falsify printed documents for malicious purposes. Therefore, is essential research and develop efficient algorithms distinguish authentic from fakes. A source printer identification technique one methods trace documents, thereby protecting reliability integrity documents. This paper proposes a method identify printers using Deep Learning approach. Particularly, we utilise Convolutional Neural Network features extraction...
Essential oil (EO) from leaves of Eucalyptus robusta was extracted by hydrodistillation, and analyzed the chemical composition using gas chromatography- Flame ionization detector (GC-FID), chromatography/mass spectrometry (GC/MS). Thirty constituents leaf EO were identified accounting for 97.48% total EO. Monoterpene hydrocarbons major classes (83.34%) in which 1,8-cineole (29.23%), α-pinene (18.58%), α-phellandrene (14.05%) β-pinene (6.40%) main components. The larvicidal activity test...
Purpose We propose a machine learning based methodology to deal with data collected from mobile application asking users their opinion regarding fashion products. Based on different techniques, the proposed approach relies value chain principle enrich into knowledge, insights and experience. Design/methodology/approach Online interaction usage of social media have dramatically altered both consumers’ behaviors business practices. Companies invest in platforms digital marketing order increase...