Results (440)
Search Parameters:
Keyword: ProblemDistributed Microphone Arrays, Emerging Speech and Audio Signal Processing Platforms: A Review
Given ubiquitous digital devices with recording capability, distributed microphone arrays are emerging recording tools for hands-free communications and spontaneous tele-conferencings. However, the analysis of signals recorded with diverse sampling rates, time delays, and qualities by distributed microphone arrays is not straightforward and entails important considerations. The crucial challenges include the unknown/changeable geometry of distributed arrays,…
Read MoreLogistics Solutions in the Preparation Phase for the Appearance of Disasters
Natural disasters have caused not only economic but also human losses. These events bring with them, among other things, deficiencies in the supply of food, clothing, health and cleaning products, to name a few. This situation makes it imperative to locate facilities that can supply the needs, as mentioned earlier, to the victims in the…
Read MoreDynamic Decision-Making Process in the Opportunistic Spectrum Access
We investigate in this paper many problems related to the decision-making process in the Cognitive Radio (CR), where a Secondary User (SU) tries to maximize its opportunities by finding the most vacant channel. Recently, Multi-Armed Bandit (MAB) problems attracted the attention to help a single SU, in the context of CR, makes an optimal decision…
Read MoreA Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network
Restoring, estimating the fully 3D hand skeleton and pose from the image data of the captured sensors/cameras applied in many applications of computer vision and robotics: human-computer interaction; gesture recognition, interactive games, Computer-Aided Design (CAD), sign languages, action recognition, etc. These are applications that flourish in Virtual Reality and Augmented Reality (VR/AR) technologies. Previous survey…
Read MoreContribution in Private Cloud Computing Development based on Study and KPI Analysis
The preset paper describes a contributes in the implementation of private Cloud Computing. Exhaustive study made validates Cloud environment creation and successful deployed Solution Configuration choice. Related solution ensures a good investment that reduces energy costs of the data center, minimizes network traffic cost proven as an NP-hard problem. In addition, each virtual machine (VsM)…
Read MoreMulti-Agent Data Recognition System Based on Received Signal in Antenna on Board Telecom System
Information data recognition during traditional operating step in telecommunication system, as their interpretation, presents an important active research field. In this context, we propose as a solution multi-agent data identification system starting with received signal parameters in antenna network connected on board telecom system. Due to the Information Identification Data (IID) response variability that differ…
Read MoreRobust Static Output-Feedback Fault Tolerant Control for a Class of T-S Fuzzy Systems using Adaptive Sliding Mode Observer Approach
In this paper, the problems of actuator and sensor fault estimation (FE) and fault-tolerant control (FTC) for uncertain nonlinear systems represented by Takagi-Sugeno (T-S) fuzzy models are investigated. First, a robust fuzzy adaptive sliding mode observer (SMO) is designed to simultaneously estimate system states and both actuator and sensor faults. Then, using the obtained on-line…
Read MoreCitizen Behavior: The Evaluation of Complaint Application that Connected to Smart City
SIARAN is application which is created by Government of South Tangerang City, Indonesia. The application is e-government services social media based. It is designed for citizens to be able to report problems that occur around South Tangerang City. The research was conducted to find out the factors that affect the intention of SIARAN’s users. The…
Read MoreOffline Signature Recognition and Verification Using ORB Key Point Matching Techniques
An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…
Read MoreDynamics Model and Design of SMC-type-PID Control for 4DOF Car Motion Simulator
4-DOF car motion simulator helps to simulate real-life experiences that drivers do not have the opportunity to access the real environment. The dynamics equation of 4-DOF car motion simulator is a very complex problem with many uncertain parameters, so it requires intelligent control algorithms. Sliding mode controller (SMC) can achieve good tracking performance and robustness…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreThe Application of Mobile Learning Technologies at Malaysian Universities Through Mind Mapping Apps for Augmenting Writing Performance
21st century learning focuses on the flow of information, media, and technology. In Malaysia, many university students face problems in English writing. Thus, students should be exposed to the technology training in innovative ways to produce students with a dynamic in this ever-changing world. Recently, the transformation and the evolution of mobile have created a…
Read MoreA Solution Applying the Law on Road Traffic into A Set of Constraints to Establish A Motion Trajectory for Autonomous Vehicle
With a model predictive control approach and to set the motion trajectory for an autonomous vehicle in situations where emergency braking cannot be performed, in this paper, we propose a solution to apply the law on road traffic into a set of constraints and thereby build an objective function to create motion trajectory for autonomous…
Read MoreThe Design of an Experimental Model for Deploying Home Area Network in Smart Grid
In the smart power grid, designing an efficient and reliable communication architecture has an important role in improving efficiency, and maintaining the connectivity of different network components. The home area network (HAN) provides an energy management system in houses since it enables home energy control and monitoring. So, it is imperative to determine a HAN…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreController Design Using Backstepping Algorithm for Fixed-Wing UAV with Thrust Vectoring System
This paper describes the design method of a nonlinear flight controller for a fixed-wing UAV with a thrust vectoring system (TVS) using the backstepping method. The flight dynamics of the UAV exhibits strong nonlinear coupling behavior between its translational and rotational motion. The backstepping algorithm has been successfully applied to controller design for such a…
Read MoreTrajectory Tracking Control of a DC Motor Exposed to a Replay-Attack
This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…
Read MoreEnhanced Collaborative Constellation for Visible Light Communication System
Visible light communication (VLC) that simultaneously gives illumination and information transmission abilities, is recognized as a hopeful competitor for prospective wireless net- works. Furthermore, a channel adaptive collaborative constellation (CASCC) with the capacity of adapting according to the channel condition to enhance the bit error rate (BER) while concurrently improving the versatility of the receiver…
Read MoreA Review on Autonomous Mobile Robot Path Planning Algorithms
The emerging trend of modern industry automation requires intelligence to be embedded into mobile robot for ensuring optimal or near-optimal solutions to execute certain task. This yield to a lot of improvement and suggestions in many areas related to mobile robot such as path planning. The purpose of this paper is to review the mobile…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreA Perturbation Finite Element Approach for Correcting Inaccuracies on Thin Shell Models with the Magnetic Field Formulation
This research makes the improvement of the errors surrounding edges and corners of thin electromagnetic regions by means of the magnetic field finite element formulation. Classical thin shell electromagnetic models are usually replaced by impedance-type interface conditions throughout surfaces that ignore errors in the calculation of the local fields (magnetic vector potentials, magnetic fields, eddy…
Read MoreNon Parallelism and Cayley-Menger Determinant in Submerged Localization
This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreCentralized System of Universities Learning Materials
This article considers the creation of a program / website as an example of a centralized system for all universities in order to more easily familiarize an applicant and / or student with the internal politics and capabilities of the university. Existing problems in the training system are examined, why distance learning is relevant, what…
Read More
