Results (42)
Search Parameters:
Keyword: LoRaStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreInterference-Aware Nodes Deployment of a LoRa-Based Architecture for Smart Agriculture in the Southern Region of Senegal
In Senegal, agriculture has always been seen as the foundation on which the socioeconomic development of the country rests. However, in the rural world, agriculture remains traditional at a time when the challenges of food self-sufficiency to accompany emergence are launched. In the southern part of Senegal commonly called Casamance, the abundance of rain makes…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MoreInvestigation of the LoRa Transceiver in Conditions of Multipath Propagation of Radio Signals
The article presents some results of the research of the LoRa module. These modules can be the basis of possible IoT technologies are implementing, providing enough good range of receiving and transmitting messages. The SX1276 transceiver has been testing to determine the signal loss in the propagation channel. These experiments took in a highly-populated Kyiv…
Read MoreBalancing Exploration-Exploitation in the Set Covering Problem Resolution with a Self-adaptive Intelligent Water Drops Algorithm
The objective of the metaheuristics, together with obtaining quality results in reasonable time, is to be able to control the exploration and exploitation balance within the iterative processes of these methodologies. Large combinatorial problems present ample search space, so Metaheuristics must efficiently explore this space; and exploits looking in the vicinity of good solutions previously…
Read MoreBarriers and Supports in Engineering Career Development: An Exploration of First-Year Students
Previous research has found that first-years in college is challenging due to changes in academic demands and the adaptation process. In addition to this, research on career development has found that barriers and supports may influence career interest, motivation to continue and student retention. This study explores the influence of specific supports and barriers among…
Read MoreThe Probe Mark Discoloration on Bond Pad and Wafer Storage
In this report, a probe mark discoloration with donut/circle shape was found. The corrosion formed on Aluminum bond pads. The SEM/EDS, TEM/EELS & AES surface techniques were used to identify this corrosion product. All these material analysis results pointed out the role of fluorine to this discoloration. The HAST testing, all the chip samples obtained…
Read MoreTrace-Driven Simulation of LoRaWAN Air Channel Propagation in an Urban Scenario
Long-range, Low-Power Wide Area Network (LoRaWAN) is a very scalable solution for the Internet of Things (IoT). Due to the air channel environment’s complexity, connectivity is a crucial parameter for successfully planning and deploying the IoT networks. Measurements and simulations have been used to evaluate LoRaWAN propagation models in the Urban environment, but it is…
Read MoreApplications of Causal Modeling in Cybersecurity: An Exploratory Approach
Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…
Read MoreAn Exploratory Qualitative Study of the Influence of Hospital Logistics Factors on Quality of Care and Patient Satisfaction at Public Hospitals in Morocco
The purpose of this qualitative research was to explore the influence of hospital logistics on quality of care and patient satisfaction. Hospital logistics was assessed by considering five factors in the patient pathway, namely: physical accessibility of care, waiting time, consultation time, administrative procedures and hospital hotel services. Semi-structured interviews were conducted, following an interview…
Read MorePhotodecoloration of Methyl Orange Solution Assisted by ZrS3 Powders
Zirconium trisulfide ZrS3 is a representative of transition metal polysulfides containing sulfur as S–1 in polysulfide, usually disulfide S22– groups. Semiconductive zirconium trisulfide which absorbs visible light near UV edge was considered as a possible photocatalyst. We experimentally studied photodecoloration of methyl orange in presence of ZrS3. It was shown for the first time that…
Read MoreOptimization of Sheet Material Layout in Industrial Production Using Genetic Algorithms
We address irregular polygon nesting on sheet materials with a lightweight evolutionary framework that operates directly in the layout space. The method formalizes multi-term fitness combining utilization, overlap penalties, spacing regularity, and local alignment, with all components normalized before aggregation. Feasibility is enforced by an AABB– SAT pipeline and validated via analytic ground-truth cases, degenerate…
Read MorePredictive Analytics in Marketing: Evaluating its Effectiveness in Driving Customer Engagement
Understanding and responding to customer feedback is critical for business success. Customer response data offers valuable insights into preferences, behaviours, and sentiment. By analysing this data, businesses can optimize strategies, enhance customer experiences, and drive growth. Many analysis have been conducted in this field, while the review covers a broad range of AI and ML…
Read MoreSEVEN ReImagined: A Transmedia Storytelling Evolution Proposal
“Seven ReImagined” is an innovative transmedia storytelling project that reshapes the exploration of the seven deadly sins in a modern context. Building upon the original artwork “Seven”, this venture incorporates traditional media, digital tools, and the latest immersive technologies to cultivate profound user engagement and interaction. The project’s objective is to enhance understanding of timeless…
Read MoreHow a Design-Based Research Approach Supported the Development and Rapid Adaptation Needed to Provide Enriching Rural STEM Camps During COVID and Beyond
Like many STEM research projects, the members of the National Science Foundation-funded STEM SEALS project dramatically shifted from in-person delivery of a summer institute to distance-learning with minimal time for preparation. However, the daunting challenge also offered the unique opportunity to apply Design-based Research within an exploratory study to inform and document the progression and…
Read MoreInferring Student Needs Based on Facial Expression in Video Images
Limited interactive communication modes between students and teachers in online environments may lead to teachers misinterpreting or overlooking student needs during online teaching. Students learning online may also hesitate to make their needs known even when latent desires in teaching flow, pacing, and review, may be beneficial to the quality of the learning experience. The…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreThe use of Integrated Geophysical Methods to Assess the Petroleum Reservoir in Doba Basin, Chad
Hydrocarbon exploration and production has been successful in the central region of Doba basin, Chad, north-central Africa. In order to optimize the hydrocarbon production in this area, the combination of seismic and well log datas have been processed and analyzed to better characterize, image and capture the reservoirs. The 3D seismic and well log datas…
Read MoreA New Technique to Accelerate the Learning Process in Agents based on Reinforcement Learning
The use of decentralized reinforcement learning (RL) in the context of multi-agent systems (MAS) poses some difficult problems. The speed of the learning process for example. Indeed, if the convergence of these algorithms has been widely studied and mathematically proven, they suffer from being very slow. In this context, we propose to use RL in…
Read MoreEncompassing Chaos in Brain-inspired Neural Network Models for Substance Identification and Breast Cancer Detection
The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial…
Read MoreBoltzmann-Based Distributed Control Method: An Evolutionary Approach using Neighboring Population Constraints
In control systems, several optimization problems have been overcome using Multi-Agent Sys- tems (MAS). Interactions of agents and the complexity of the system can be understood by using MAS. As a result, functional models are generated, which are closer to reality. Nevertheless, the use of models with permanent availability of information between agents is assumed…
Read MoreEvaluation the Effects of Climate Change on the Flow of the Arkansas River – United States
The behavior of rivers’ hydrology and flow under changing climate has been an objective of interest for long time. In this study the impacts of climate change on streamflow of the Arkansas River will be investigated. The paper is an extension of work originally presented in ASET conference in Dubai. The Arkansas River is a…
Read MoreHow Ready is Renewable Energy? A Review Paper on Educational Materials and Reports Available for the Teaching of Hydrogen Fuel Cells in Schools
Today, the costs of most Renewable Energy (RE) technologies especially hydrogen energy technologies such as fuel cells, are still beyond the means of poorer economies in developing countries. Hence, there is little public awareness and local expertise in RE in these countries and even lesser in hydrogen energy. To solve this problem, it is important…
Read MoreA-MnasNet and Image Classification on NXP Bluebox 2.0
Computer Vision is a domain which deals with the challenge of enabling technology with vision capabilities. This goal is accomplished with the use of Convolutional Neural Networks. They are the backbone of implementing vision applications on embedded systems. They are complex but highly efficient in extracting features, thus, enabling embedded systems to perform computer vision…
Read MoreDesign of Platform to Support Workflow Continuity in Multi-Device Applications
Nowadays, the Internet has become an indispensable tool for the realization and continuity of activity at a different time, place, and technological context (e.g., mobile, pc, tablet), so that interaction techniques through the use of multi-device support have become of great interest. From this perspective, continuity in interactions is an essential concept in the face…
Read More
