Results (1074)
Search Parameters:
Keyword: HANText Line Segmentation on Myanmar Handwritten Document using Average Linkage Clustering Algorithm
Text line segmentation from document images is a significant challenge in the field of document image analysis. It involves extracting individual text lines from Myanmar handwritten document images to enable text recognition. This task becomes particularly challenging in Myanmar handwritten documents, especially those with irregular or cursive writing styles, due to variations in line spacing,…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreAdvancements in Explainable Artificial Intelligence for Enhanced Transparency and Interpretability across Business Applications
This manuscript offers an in-depth analysis of Explainable Artificial Intelligence (XAI), em- phasizing its crucial role in developing transparent and ethically compliant AI systems. It traces AI’s evolution from basic algorithms to complex systems capable of autonomous de- cisions with self-explanation. The paper distinguishes between explainability—making AI decision processes understandable to humans—and interpretability, which provides…
Read MoreGPT-Enhanced Hierarchical Deep Learning Model for Automated ICD Coding
In healthcare, accurate communication is critical, and medical coding, especially coding using the ICD (International Classification of Diseases) standards, plays a vital role in achieving this accuracy. Traditionally, ICD coding has been a time-consuming manual process performed by trained professionals, involving the assignment of codes to patient records, such as doctor’s notes. In this paper,…
Read MoreRevolutionizing Robo-Advisors: Unveiling Global Financial Markets, AI-Driven Innovations, and Technological Landscapes for Enhanced Investment Decisions
Robo-advisors, fundamental to the financial services sector, have undergone substantial technological metamorphosis. Innovations in artificial intelligence, blockchain, cloud technology, augmented reality, and virtual reality have reshaped the financial industry’s landscape. As automated investment solutions, robo-advisors are on the brink of further technological evolution. This comprehensive research amalgamates historical data, behavioral insights, and emerging market trends…
Read MoreDouble-Enhanced Convolutional Neural Network for Multi-Stage Classification of Alzheimer’s Disease
Being known as an irreversible neurodegenerative disease which has no cure to date, detection and classification of Alzheimer’s disease (AD) in its early stages is significant so that the deterioration process can be slowed down. Generally, AD can be classified into three major stages, ranging from the “normal control” stage with no symptoms shown, the…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreEnhancing Compressive Strength of Pervious Concrete for Use as Pavement Layer in Urban Roads Aper
South African Drainage and Stormwater Systems in urban roads has been of great concern, more so with recent flash floods in Gauteng and KwaZulu Natal Province in South Africa. Pervious concrete can be used to mitigate these challenges for urban roads. Pervious concrete is a concrete that contains no fines or only a small amount…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreDesign of Bio-Inspired Robot Hand Using Multiple Types of Actuators
Many prosthetic hands are focused on appearance and grip strength, however, gestures are also one of the performances that users need for communicating with others as body language to express their feeling and intention. For this paper, the initial prototype of the gesturing robotics hand is presented by using multiple types of actuators concept to…
Read MoreA Numerical Study on The Change in Safety Factor (FOS) According to Slope Angle Change for The Establishment of Photovoltaic Facilities Using SRM (Strength Reduction Method)
As the significance of new and renewable energy is highlighted, land-based solar power generation has seen remarkable progress. This study utilizes the Strength Reduction Method in DIANA, a numerical analysis software, to assess the stability concerning various variables, such as slope angle, water level, water depth, and changes in material properties, with a focus on…
Read MoreAnalysis of Linear and Non-Linear Short-Term Pulse Rate Variability to Evaluate Emotional Changes during the Trier Social Stress Test
In conjunction with psychological stress, physiological indicators such as heart rate (HR) and heart rate variability (HRV) are frequently employed. This study uses a substitute for heart rate variability (HRV) known as short-term pulse rate variability (PRV) to evaluate emotional changes. We examined sixteen college students using a low-cost photoplethysmograph and obtained a short-term PRV…
Read MoreDesign of an Open Source Anthropomorphic Robotic Hand for Telepresence Robot
Most anthropomorphic robotic hands use a lot of actuators to imitate the number of joints and the movement of the human hand. As a result, the forearm of the robot hand has a large size for the installation of all actuators. This robot hand is designed to reduce the number of actuators, but also retain…
Read MoreTechnical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems
In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…
Read MoreBER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks
In the time past, virtually all the contemporary communication systems depend on distinct source and channel encoding schemes for data transmission. Irrespective of the recorded success of the distinct schemes, the new developed scheme known as joint source channel coding technique has proven to have technically outperformed the conventional schemes. The aim of the study…
Read MoreA Study on Novel Hand Hygiene Evaluation System using pix2pix
The novel coronavirus infection (COVID-19), which appeared at the end of 2019 has developed into a global pandemic with numerous deaths, and has also become a serious social concern. The most important and basic measure for preventing infection is hand hygiene. In this study, by photographing palm images of nursing students after hand-washing, using fluorescent…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreLight Modulation Enhancement by using an Impedance Matching Scheme for a Subcarrier Multiplexed Light Transmitter
We propose and analyze new impedance matching schemes to enhance applied voltage to an optical modulator and light modulation for a subcarrier multiplexed light transmitter or a radio-on-fiber transmitter that carries radio-frequency signal through an optical fiber. Our proposal includes two methods using a quarter-wavelength impedance transformer and a tapered microstrip line for impedance matching…
Read MoreEnhancing Decision Trees for Data Stream Mining
Data stream gained obvious attention by research for years. Mining this type of data generates special challenges because of their unusual nature. Data streams flows are continuous, infinite and with unbounded size. Because of its accuracy, decision tree is one of the most common methods in classifying data streams. The aim of classification is to…
Read MoreComparative Analysis and Modern Applications of PoW, PoS, PPoS Blockchain Consensus Mechanisms and New Distributed Ledger Technologies
Central authorities have registered economic transactions based on trust since the dawn of time. With the advent of paper, methods for documenting transactions and records became more difficult and detailed. With the widespread use of computers in recent years, digital recording has made record keeping easier and since then every technical advancement has made data…
Read MoreCoupled Apodization Functions Applied to Enhance Image Quality in Ultrasound Imaging using Phased Arrays
The remarkable presence of side lobes levels in ultrasound B-mode imaging significantly decreases the image quality. Therefore, the use of an apodization function is of great importance. Linear windowing functions are among the most efficient techniques used to optimize antenna directivity by suppression of the side lobes. However, the apodization causes the degradation of lateral…
Read MoreApplication of Geographic Information Systems and Remote Sensing for Land Use/Cover Change Analysis in the Klip River Catchment, KwaZulu Natal, South Africa
Ladysmith is a major economic hub in the uThukela District Municipality. However, it has been experiencing floods almost every year which has resulted in the loss of lives and disruption of business activity within the Ladysmith Central Business District. The main objective of this study was to quantify the land use/cover changes before and after…
Read MoreCyber Incident Handling and the Perceptions of Learners on Cyber Incidents in South African Schools
With increases in technological usage, cyber incidents are also on the rise and have become a major concern in schools across the globe. What is of significant concern is that cyber incidents in South African schools are also on the rise. Existing evidence suggests that, in South Africa there are no clear procedures that are…
Read MoreA Design of Anthropomorphic Hand based on Human Finger Anatomy
In the past decade, multiple anthropomorphic prosthetic hands have been developed to replace the role of human hands. Prostheses should not only replace the functions of human hands in functionality but also replicate human hands in appearance and sense of body-belonging intuitively. Human fingers have very delicate and complex structures, and it is these complex…
Read MoreEnhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection
Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…
Read More
