Results (653)
Search Parameters:
Keyword: AnalysisAdvancements in Explainable Artificial Intelligence for Enhanced Transparency and Interpretability across Business Applications
This manuscript offers an in-depth analysis of Explainable Artificial Intelligence (XAI), em- phasizing its crucial role in developing transparent and ethically compliant AI systems. It traces AI’s evolution from basic algorithms to complex systems capable of autonomous de- cisions with self-explanation. The paper distinguishes between explainability—making AI decision processes understandable to humans—and interpretability, which provides…
Read MoreEarly Detection of SMPS Electromagnetic Interference Failures Using Fuzzy Multi-Task Functional Fusion Prediction
This study addresses the need for improved prognostics in switch-mode power supplies (SMPS) that incorporate electromagnetic interference (EMI) filters, with a focus on aluminum electrolytic capacitors, which are critical for the reliability of these systems. The primary aim is to develop a robust model-based approach that can accurately predict the degradation and operational lifetime of…
Read MoreMalaysia’s Renewable Energy Policy and its Impact on ASEAN Countries
As the global community increasingly shifts its focus towards sustainable development and combating climate change, renewable energy policies have become pivotal in shaping national and regional energy landscapes. Malaysia, as a developing nation with a rapidly growing economy, has recognized the importance of renewable energy sources in achieving its socio-economic goals while addressing environmental concerns.…
Read MoreSpatial Distribution Patterns of the Royal Development Projects Initiated by King Rama 9th of Thailand
The study aimed to create a chronological overview of the royal development projects initiated by King Rama IX and to analyze their spatial distribution patterns. The research used a mixed-methods approach, combining quantitative and qualitative data collection methods such as obtaining data from relevant offices, internet research, and field observations. Data analysis involved descriptive statistics…
Read MoreDevelopment of a GSM-RC Automated Device for Measuring Mobile Communication Signal Strength and Meteorological Parameters
The automated Global System for Mobile Communication Signal Strength and Radio Climatological (GSM-RC) measuring device is an integration of different electronic sensors in a box for an in-situ measuring system. The sensor, data logging, and communication subsystems are integrated for transmitting information on meteorological parameters (MPs) and GSM signal strength level (SSL). The goal is…
Read MoreInvestigating Heart Rate Variability Index Classification in Macaca fascicularis and Humans: Exploring Applications for Personal Identification and Anonymization Studies
In this paper, we determine the feasibility of differentiating between the heart rate patterns of Macaca fascicularis and human infants by comparing pertinent hyperparameters. This verification process was undertaken to ascertain the suitability of Macaca fascicularis heart rate data as a testbed for evaluating heart rate parameter privacy safeguarding methodologies. The biological characteristics of Macaca…
Read MoreStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreTowards Real-Time Multi-Class Object Detection and Tracking for the FLS Pattern Cutting Task
The advent of laparoscopic surgery has increased the need to incorporate simulator-based training into traditional training programs to improve resident training and feedback. However, current training methods rely on expert surgeons to evaluate the dexterity of trainees, a time-consuming and subjective process. Through this research, we aim to extend the use of object detection in…
Read MoreDesign and Prototyping of a 3DOF Worm-drive Robot Arm
Many designs for robot arms exist. Here we present an affordable revolute arm, capable of executing simple pick-and-place tasks. The arm employs a double parallelogram structure, which ensures its endpoint angle in the plane of the upper arm remains fixed without the need for additional actuation. Its limbs are fabricated from circular tubes made from…
Read MoreModeling Control Agents in Social Media Networks Using Reinforcement Learning
Designing efficient control strategies for opinion dynamics is a challenging task. Understanding how individuals change their opinions in social networks is essential to countering malicious actors and fake news and mitigating their effect on the network. In many applications such as marketing design, product launches, etc., corporations often post curated news or feeds on social…
Read MoreMRI Semantic Segmentation based on Optimize V-net with 2D Attention
Over the past ten years, deep learning models have considerably advanced research in artificial intelligence, particularly in the segmentation of medical images. One of the key benefits of medical picture segmentation is that it allows for a more accurate analysis of anatomical data by separating only pertinent areas. Numerous studies revealed that these models could…
Read MoreProportional Derivative and Proportional Integral Derivative Controllers for Frequency Support of a Wind Turbine Generator in a Diesel Generation Mix
The levelized cost of electricity production is highly dependent on the cost of fuel oil on the world market. In order to reduce the dependency on the fuel oil, many countries are adopting an energy transition towards distributed generation. Distributed generation can be described as various means of generating electricity at or near where it…
Read MoreA Circuit Designer’s Perspective to MOSFET Behaviour: Common Questions and Practical Insights
Metal Oxide Semiconductor Field-Effect Transistors are commonly taught in courses for electrical engineers as they are the most common components within integrated circuits. However, despite numerous papers and books on MOSFETs, students still struggle with understanding their behaviour, particularly in the saturation region. This paper presents an expanded explanation of MOSFET behaviour, with a consistent…
Read MoreDesign and Manufacturing of Soft Grippers for Robotics by Injection Molding Technology
Soft robots have softer, more flexible, and more compliant characteristics than traditional rigid robots. These qualities encourage more secure relationships between people and machines. Nevertheless, traditional robots continue to rule the commercial sector. Due to the high cost of gripper production, soft robots are very far from being commercially feasible. This research focuses on fabricating…
Read MoreThe Design, Optimization, and Experimental Study of Hub and Axial Flux BLDC Motor Under Operating Conditions For Light Electric Vehicles
In this study, we conducted an experimental study and efficiency optimization of the outer rotor (hub) BLDC (brushless direct current) motor and axial BLDC motor for light electric vehicles. Both motors were investigated in the simulation environment and experimentally. The axial flux BLDC motor had a rated power of 10 KW, and a rated speed…
Read MoreA Numerical Study on The Change in Safety Factor (FOS) According to Slope Angle Change for The Establishment of Photovoltaic Facilities Using SRM (Strength Reduction Method)
As the significance of new and renewable energy is highlighted, land-based solar power generation has seen remarkable progress. This study utilizes the Strength Reduction Method in DIANA, a numerical analysis software, to assess the stability concerning various variables, such as slope angle, water level, water depth, and changes in material properties, with a focus on…
Read MoreInferring Student Needs Based on Facial Expression in Video Images
Limited interactive communication modes between students and teachers in online environments may lead to teachers misinterpreting or overlooking student needs during online teaching. Students learning online may also hesitate to make their needs known even when latent desires in teaching flow, pacing, and review, may be beneficial to the quality of the learning experience. The…
Read MoreAssessment of Scattered-Bend Loss in Polymer Optical Fiber (POF) Displacement Sensor
This work investigated the coupling behavior of the scattered-bend loss in displacement sensor during the bending of the fiber by using a multimode polymer optical fiber (POF). To utilize the scattered-bend effect for displacement measurement, a side coupling technique can be used by twisting a pair of POF fibers and bent the structure into a…
Read MoreThe First Application of the Multistage One-Shot Decision-Making Approach to Reevaluate a Technology Project Decision Problem
Decision-makers must make a suitable sequence of decisions under uncertainty in a relatively long period for particular projects and situations. Conventional decision-making approaches under uncertainty are based on expected utility theory and do not sufficiently reflect the one-time nature of decisions. Similarly, the conventional approaches do not adequately incorporate the decision-maker’s intuitions in the decision-analysis…
Read MoreMultiple Criteria Decision-making: Risk Analyses for the Soft Target
This article focuses on risk analysis using a multi-criteria decision-making method. Due to many performed risk analyses for soft targets, we are constantly trying to find new methods for objective risk assessment. Many risk analyses are subjective, which is a problem when planning security measures and comparing results (different events, objects, places, etc.). In this…
Read MoreA Model for Teaching Mathematics to Gifted Students Based on an Effective Combination of Various Approaches for their Preparation
Currently one of the urgent goals of mathematical education is the organization of effective work with gifted students. Based on the study of various approaches to teaching mathematically gifted students, many years of experience of teachers, students’ work, and an analysis of curricula and materials for schools with in-depth study of mathematics, an author’s model…
Read MorePrototype to Identify the Capacity in Cybersecurity Management for a Public Organization
Public organizations are subjected to a complex security situation, which can be addressed by permanently strengthening and evaluating their cybersecurity capabilities. The objective of this research is to develop a model to identify the cybersecurity management capacity of public organizations. The deductive method was applied for the review and analysis of criteria, factors and variables…
Read MoreTechnical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems
In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…
Read MoreOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read More
