Results (552)
Search Parameters:
Keyword: ISISIFT Implementation based on LEON3 Processor
This paper proposes a new method of implementation of the part of SIFT (Scale-Invariant Feature Transform) algorithm used to extract the feature of an image of a size 256×256 of pixels, which is mainly based on the using the LEON3 soft core processor .With this method it is possible to detect points of interest and…
Read MoreDeterminants that Influence Consumers’ Intention to Purchase Smart Watches in the UAE: A Case of University Students
It has been observed that the smartwatches have emerged quickly on the digital era with the ability to significantly influence daily life and improve users’ wellbeing, decisions, and behaviour. Nonetheless they are in their stages of adoption, smartwatches are marked the most widespread type of wearable technologies. Considering this, present work has been carried out…
Read MoreWireless Sensor Networks Simulation Model to Compute Verification Time in Terms of Groups for Massive Crowd
Everyone needs fast response or output against its request or need. Therefore, technologies are used to make the processing fast and accurate according to our needs. But in some situations, still we need to do more. Especially, when we need to process a massive or huge crowd of people in limited time frame such as…
Read MoreAn algorithm for Peruvian counterfeit Banknote Detection based on Digital Image Processing and SVM
In this work we propose an algorithm for Peruvian counterfeit banknotes detection. Our algorithm operates in banknotes with 50, 100 and 200 soles denominations that were manufactured from 2009 onwards. This algorithm offers an automatic diagnosis based on digital image processing and support vector machines (SVM). Current Peruvian counterfeit detection systems are specially designed to…
Read MoreAn Operational Responsibility and Task Monitoring Method: A Data Breach Case Study
As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…
Read MoreThe Performance of Project Teams Selected Based on Student Personality Types: A Longitudinal Study
The use of heuristic methods in teaching is not possible without the cooperation of all or part of the students’ academic group. That is, the teacher who made the decision to apply the heuristic method de facto solves the issues of organizing project method in teaching. There are a large number of indications on the…
Read MorePrioritization of Sustainable Supply Chain Management Practices in an Automotive Elastomer Manufacturer in Thailand
Nowadays the sustainable awareness trend is increasing. The consumers’ attitude has changed, causing companies to pay more attention to management in a sustainable way. Effective sustainable supply chain management (SSCM) can increase social, economic, and environmental benefits. Important factors from literatures were gather and organized to be a framework for SSCM. The proposed framework incorporates…
Read MoreVariation in Self-Perception of Professional Competencies in Systems Engineering Students, due to the COVID -19 Pandemic
The objective of this article is to determine if the self-perception of professional competences has been affected, in systems engineering students, during the health emergency declared in Peru by Covid-19; The results will allow the public university of Peru to make corrective decisions and formulate proposals to improve the functioning of the variable under study.…
Read MoreStrategic Management of Brand Positioning in the Market
In the modern marketing system in a mass consumer society, the central place is given to the formation and promotion of brands. Professional conceptual approaches to brand management are able to preserve and increase the value and stability of the brand and allow the brand to survive in the most difficult competitive and crisis market…
Read MoreMethod of Technological Forecasting of Market Behaviour of R&D Products
The current concept of open innovation corresponds to the R&D products transfer model – “role changes”. One of the fundamental provisions of the model is that R&D products are considered for commercialization not only at the final stage of technological readiness, but at any of them. In today’s changing market environment, special attention is paid…
Read MoreCyclic Evaluation of Capacity of Recovered Traction Battery after Short-Circuit Damage
Presented paper discusses possibilities related to the recovery of the damaged lithium batteries after the short-circuit. The recovery procedure was applied on the selected traction LiFePO4 40Ah cell which was initially short-circuited. After the short-circuit, the damaged cell has visible damage of the electro-mechanical properties. For the recovery of damaged traction cell as much as…
Read MoreGene Selection for Cancer Classification: A New Hybrid Filter-C5.0 Approach for Breast Cancer Risk Prediction
Despite the significant progress made in data mining technologies in recent years, breast cancer risk prediction and diagnosis at an early stage using DNA microarray technology still a real challenging task. This challenge comes especially from the high-dimensionality in gene expression data, i.e., an enormous number of genes versus a few tens of subjects (samples).…
Read MoreA Recommendation Approach in Social Learning Based on K-Means Clustering
E-learning, among the most prominent modes of learning, offers learners the opportunity to attend online courses. To improve the quality of online learning, social learning through social networks promotes interaction and collaboration among learners. As part of the learning process management in these environments, the implementation of recommendation systems facilitates the provision of content adapted…
Read MoreAn Enhanced Artificial Intelligence-Based Approach Applied to Vehicular Traffic Signs Detection and Road Safety Enhancement
The paper treats a problem for detection and recognition objects in computer vision sector, where researchers recommended OpenCV software and development tool, it’s several and better-remembered library resource for isolating, detecting, and recognition of particular objects, what we would find an appropriate system for detecting and recognition traffic roads signs. The robustness with optimization is…
Read MoreMultiple Machine Learning Algorithms Comparison for Modulation Type Classification Based on Instantaneous Values of the Time Domain Signal and Time Series Statistics Derived from Wavelet Transform
Modulation type classification is a part of waveform estimation required to employ spectrum sharing scenarios like dynamic spectrum access that allow more efficient spectrum utilization. In this work multiple classification features, feature extraction, and classification algorithms for modulation type classification have been studied and compared in terms of classification speed and accuracy to suggest the…
Read MoreComparison of Machine Learning Parametric and Non-Parametric Techniques for Determining Soil Moisture: Case Study at Las Palmas Andean Basin
Soil moisture is one of the most important variables to monitor in agriculture. Its analysis gives insights about strategies to utilize better a particular area regarding its use, i.e., pasture for cows (or similar), production forests, or even to answer what crops should be planted. The vertical structure of the soil moisture plays an important…
Read MoreDriving Behaviour Identification based on OBD Speed and GPS Data Analysis
Vehicle accidents, particularly in small and large urban areas, are rising tremendously day by day worldwide. As a recent research subject in automaton transportation, the subsequent collision has become a vital issue and emergency. Internet of things (IoT) and the Internet of Vehicles (IoV) have become very popular these days because of their versatility, and…
Read MoreTraffic Aggregation Techniques for Optimizing IoT Networks
Internet of Things (IoT) is changing the world through a new wave of revolution for communications technologies that are no more limited to the human being. One of the main challenges that result from the exponential spread of IoT technology is the difference in the traffic characteristics between classical human communications and advanced things communications.…
Read MoreDevelopment of Hexa Spacer Damper for 765 kV Transmission Lines’ Vibration Damping
In this paper, hexa spacer damper is proposed and its vibration damping effect on the 765 kV power transmission network under the influence of fluctuating wind (10-60 Hz) loading is validated. This asymmetrical loadings led the bundle of Zebra ACSR conductor to be twisted and hence, cause mechanical and electrical instabilities across the span length.…
Read MoreEcosystem of Renewable Energy Enterprises for Sustainable Development: A Systematic Review
In the Global sphere, the social, environmental, and economic pillars are the main contributors and accelerators to the sustainable development goals. As a result, the latter creates a platform for interdisciplinary researchers, society and decision-makers to collaborate in formulating ways to minimize factors contributing to environmental concerns. Energy is currently referred to as one of…
Read MoreEnvironmental Entrepreneurship as an Innovation Catalyst for Social Change: A Systematic Review as a Basis for Future Research
There are pressures to adopt sustainable behaviour more so in generating profits and benefiting the society to accelerate green efforts through a green framework. The overarching goal of the paper is premised through various works of literature, building the ecosystem the elements highlighted by most researchers in the field of environmental entrepreneurship. The various models…
Read MoreChaos-Based Image Encryption Using Arnold’s Cat Map Confusion and Henon Map Diffusion
This research designed an image encryption system that focused on securing teledermatology data in the form of skin disease images. The encryption and decryption process of this system is done on the client side using chaos-based encryption with confusion and diffusion techniques. Arnold’s cat map is the chaotic map model used for confusion, while the…
Read MoreOptimizing the Wind Farm Layout for Minimizing the Wake Losses
The development of wind farms requires an optimal design of wind turbines layout. The main goal of this optimization is to minimize the wake effect through the optimal placement of the wind turbines. The current study aims to standardize the wake losses among all wind turbines in the wind farm and bringing their losses to…
Read MoreClassification of Wing Chun Basic Hand Movement using Virtual Reality for Wing Chun Training Simulation System
To create a Virtual Reality (VR) system for Wing Chun’s basic hand movement training, capturing, and classifying movement data is an important step. The main goal of this paper is to find the best possible method of classifying hand movement, particularly Wing Chun’s basic hand movements, to be used in the VR training system. This…
Read MoreIndoor Positioning System using WKNN and LSTM Combined via Ensemble Learning
Indoor positioning system (IPS) has become a high demand research field to be developed and has made considerable progress in recent years. Wi-Fi fingerprinting is the most promising technique that produces an acceptable result. However, despite the large amount of research that has been done using Wi-Fi fingerprinting, only a few Wi-Fi based IPS in…
Read More
