Results (551)
Search Parameters:
Keyword: REMTowards Classification of Shrimp Diseases Using Transferred Convolutional Neural Networks
Vietnam is one of the top 5 largest shrimp exporters globally, and Mekong delta of Vietnam contributes more than 80% of total national production. Along with intensive farming and growing shrimp farming area, diseases are a severe threat to productivity and sustainable development. Timely response to emerging shrimp diseases is critical. Early detection and treatment…
Read MoreClustering of Mindset towards Self-Regulated Learning of Undergraduate Students at the University of Phayao
The effects of Covid-19 severely affected the Thai higher education model. Therefore, there are three significant objectives in this research: (1) to cluster the mindsets and attitudes toward self-regulated learning styles of undergraduate students at the University of Phayao. (2) to construct a predictive model for recommending an appropriate student learning clusters. (3) to evaluate…
Read MoreDesign of a Flapping Wings Butterfly Robot based on Aerodynamics Force
Insect robots are always amazed by humans due to their ability to fly using a wing flapping mechanism. The butterfly robot was designed in this research based on aerodynamics and aeroelastic especially for designing a flapping mechanism due to its complexity. A butterfly wing structure was designed by considering aerodynamics forces based on assumptions. Aerodynamic…
Read MoreModeling and Transformation from Temporal Object Relational Database into Mongodb: Rules
With such a big volume of data growing tremendously every day, and the storage of important volume of data becoming increasingly more flexible, NoSQL(Not only SQL or Non-Relational ) database are designed to store a large amount of information and are growing for big data systems in web analytics. It an approach does not require…
Read MoreNeural Network-Based Fault Diagnosis of Joints in High Voltage Electrical Lines
In this paper a classification system based on a complex-valued neural network is used to evaluate the health state of joints in high voltage overhead transmission lines. The aim of this method is to prevent breakages on the joints through the frequency response measurements obtained at the initial point of the network. The specific advantage…
Read MoreAssessing the Operator’s Readiness to Perform Tasks of Controlling by the Unmanned Aerial Platforms
Together with the intensity of development in the field of technology of unmanned platforms and their effective use for solving various tasks of peacetime and war, the requirements for the training of the operator managing the platform also increase. This fully applies to personnel providing the flight of manned means. Nevertheless, there are significant differences…
Read MoreArtificial Intelligence Approach for Target Classification: A State of the Art
The classification of static or mobile objects, from a signal or an image containing information as to their structure or their form, constitutes a constant concern of specialists in the electronic field. The remarkable progress made in past years, particularly in the development of neural networks and artificial intelligence systems, has further accentuated this trend.…
Read MoreDeep Learning Model for A Driver Assistance System to Increase Visibility on A Foggy Road
For many years, a lot of researches have been made to develop Advanced Driver Assistance Systems (ADAS) that are based on integrated systems. The main objective is to help drivers. Hence, keeping them safe under different driving conditions. Visibility for drivers remains the biggest problem faced on the road in an atmosphere of fog. In…
Read MoreNonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection
Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…
Read MoreDynamic Decision-Making Process in the Opportunistic Spectrum Access
We investigate in this paper many problems related to the decision-making process in the Cognitive Radio (CR), where a Secondary User (SU) tries to maximize its opportunities by finding the most vacant channel. Recently, Multi-Armed Bandit (MAB) problems attracted the attention to help a single SU, in the context of CR, makes an optimal decision…
Read MoreIndustry 4.0 Operators: Core Knowledge and Skills
One of the most important technological changes due to the arrival of Industry 4.0, an initial, gradual, and complex process of technology transfer is taking place, which strongly relies on the integration of universities, industries, and governments. In this context, to make the Industry 4.0 approach a reality, several requirements need to be met. One…
Read MoreModelling and Simulation of Aerodynamic Parameters of an Airship
The dynamic modelling of an airship is the primary requirement in designing and developing a control system for a particular application. Extracting/predicting/modelling the aerodynamic coefficients is a crucial step towards the modelling of an airship. There is a huge amount of literature on the aerodynamic modelling of airships which presents experimental as well as analytical…
Read MoreA Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network
Restoring, estimating the fully 3D hand skeleton and pose from the image data of the captured sensors/cameras applied in many applications of computer vision and robotics: human-computer interaction; gesture recognition, interactive games, Computer-Aided Design (CAD), sign languages, action recognition, etc. These are applications that flourish in Virtual Reality and Augmented Reality (VR/AR) technologies. Previous survey…
Read MoreComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreMulti-Agent Data Recognition System Based on Received Signal in Antenna on Board Telecom System
Information data recognition during traditional operating step in telecommunication system, as their interpretation, presents an important active research field. In this context, we propose as a solution multi-agent data identification system starting with received signal parameters in antenna network connected on board telecom system. Due to the Information Identification Data (IID) response variability that differ…
Read MoreBusiness Process Design for Widuri Indah School Management System with the Support of Cloud Computing
This study aims to design business processes or school management solutions that are right for the school. Widuri Indah School is private school that has not been integrated with the school management system. Qualitative method such as observation and interview are conducted to gain insights about main activities and support activities in Widuri Indah school…
Read MoreMonte Carlo Estimation of Dose in Heterogeneous Phantom Around 6MV Medical Linear Accelerator
In this work, we completed a validation of the Varian Clinac IX equipped with the High Definition Multi-Leaf Collimator (HD 120 MLC) instead of the removable jaws, using GATE Monte Carlo Platform version 8.2. We validated the multileaf collimator (MLC) geometry by simulating two dosimetric functions (Percentage Depth Dose (PDD) and Dose Profile (DP)), for…
Read MorePerformance of Robust Confidence Intervals for Estimating Population Mean Under Both Non-Normality and in Presence of Outliers
We proposed two robust confidence interval estimators, namely, the median interquartile range confidence interval (MDIQR) and the trimean interquartile range confidence interval (TRIQR) for the population mean (µ) as an alternative to the classical confidence interval. The proposed methods are based on the asymptotic normal theorem (ANT) for the sample median (MD) and the sample…
Read MoreA Framework for Measuring Workforce Agility: Fuzzy Logic Approach Applied in a Moroccan Manufacturing Company
In today’s Moroccan business environment, companies need to implement organization agility by developing an agile workforce that is able to deal with the environment volatility. Thus, the agile workforce concept has been appeared as a necessary and sufficient condition to achieve agility. Focusing on agile enablers influencing workforce agility is an important area but currently…
Read MoreSentence Retrieval using Stemming and Lemmatization with Different Length of the Queries
In this paper we focus on Sentence retrieval which is similar to Document retrieval but with a smaller unit of retrieval. Using data pre-processing in document retrieval is generally considered useful. When it comes to sentence retrieval the situation is not that clear. In this paper we use TF-ISF (term frequency – inverse sentence frequency)…
Read MoreANN Based MRAC-PID Controller Implementation for a Furuta Pendulum System Stabilization
Nowadays, process automation and smart systems have gained increasing importance in a wide variety of sectors, and robotics have a fundamental role in it. Therefore, it has attracted greater research interests; among them, Underactuated Mechanical Systems (UMS) have been the subject of many studies, due to their application capabilities in different disciplines. Nevertheless, control of…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreStudy of Wrinkling and Thinning Behavior in the Stamping Process of Top Outer Hatchback Part on the SCGA and SPCC Materials
The objective of the research is to determine the changes in wrinkling and thinning behavior in the stamping process of the top outer hatchback. The study was conducted using two types of materials, i.e., SCGA (Steel Cold rolled Galvanized Annealed) and SPCC (Steel Plate Cold rolled Coiled) with a thickness of 0.80 mm. During the…
Read More
