Results (534)
Search Parameters:
Keyword: SystemsWideband and High-Gain Aperture Coupled Feed Patch Array Antenna for Millimeter-Wave Application
Millimeter-wave (mmW) antenna is one of the most important parts of the fifth-generation (5G) systems because of its advanced characteristics, for example, wideband and high transmission rate. In this paper, an mmW 4×1 array antenna with high gain and wideband based on an aperture coupled feeding patch (ACFP) antenna is presented. The proposed array antenna…
Read MoreMulti Closed-loop Adaptive Neuro-Fuzzy Inference System for Quadrotor Position Control
This paper deals with a multi closed-loop adaptive neuro-fuzzy inference system (ANFIS) design for the under-actuated quadrotor systems. First, the training data set for the fuzzy inference system is obtained using a proportional integral derivative controller. Then, an initial ANFIS controller is designed, where the integral control action is preserved in the multi-closed-cloop ANFIS for…
Read MoreGenetic Organization and Evolution of Electromechanical Objects with Adaptive Geometry of Active Zone
The paper is devoted to the presentation of a new methodological approach (new philosophy) to the formulation and solution of directed search and synthesis of electromechanical objects for a given function problems. The object under the study is a class of electrical machines and electromechanical devices which operation is carried out with a variable structure…
Read MoreComponent of Trust for Developing Crowdwork System: A Systematic Literature Review
Crowdwork is a system that brings job providers and crowdworkers in a portal. Nowadays, many companies are turning to freelancing rather than hiring full-time employees. In addition, the workers have also switched to working as freelancers. New problems also arise in the crowdwork system. Trust is one of the main issues that arise in the…
Read MoreFactors Influencing the Intention to Use Technology Services to Implement Self-Service Technology Case Study: Situation Pandemic Covid-19
This study aims to analyze a person’s intention in using self-service technology (SST) services during the pandemic COVID-19. Where this time, raising problems one of the social distancing that affects a service provided, especially on services that use technology that applies SST. This study develops from previous research where the customer has satisfaction in using…
Read MoreA Novel Demand Side Management by Minimizing Cost Deviation
In the recent times power shortage has been a major setback to deal for the effective operation of power systems. Bridging the gap between generation and demand is known as Demand Side Management (DSM). For an effective DSM strategy to be implemented, it is crucial that both utility and customers be involved. By DSM, the…
Read MoreA User-Item Collaborative Filtering System to Predict Online Learning Outcome
Education has seen the rapid development of online learning. Many researchers have conducted studies on the use of recommendation systems in online learning. However, until now, several similar studies still focus on the accuracy of the prediction results. Various obstacles were encountered related to changes in the face to face learning process into online learning.…
Read MoreFast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus
Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…
Read MoreCriteria to Implement a Supervision System in the Petroleum Industry: A Case Study in a Terminal Storage Facility
A liquid petroleum storage facility (Terminal), is a platform used to store petroleum products. Terminals plays a strategic role on the oil and gas supply chain. There are three types of terminals: a fully automated terminal, a partially automated terminal and a fully manual terminal. To increase their efficiency and safety in a very competitive…
Read MoreDetermination of ERP Readiness Assessment using Agile Parameters: A Case Study
At present, in the era of digitization the organizations need Enterprise Resource Planning (ERP) systems to have the ability adapt to changes with rapid response in order to increase the competitive advantage. The fact, many companies have failed to implement ERP which is proven to be not go live on time, so that the implementation…
Read MoreDeep Learning Approach for Automatic Topic Classification in an Online Submission System
Topic classification is a crucial task where knowledge categories exist within hierarchical information systems designed to facilitate knowledge search and discovery. An application of topic classification is article (e.g., journal/conference paper) classification which is very useful for online submission systems. In fact, numerous online journals/magazine submission systems usually receive thousands of article submissions or even…
Read MoreModeling and Transformation from Temporal Object Relational Database into Mongodb: Rules
With such a big volume of data growing tremendously every day, and the storage of important volume of data becoming increasingly more flexible, NoSQL(Not only SQL or Non-Relational ) database are designed to store a large amount of information and are growing for big data systems in web analytics. It an approach does not require…
Read MorePerformance Analysis of Go-Back-N ARQ Protocol Used in Data Transmission Over Noisy Channels
Automatic Repeat reQuest (ARQ) protocols are used to control transmission errors in data communications. They are used at Data Link Control (DLC) sublayer of Data Link Layer (DLL) of OSI (Open Systems Interconnection) network model to achieve flow and error control and provide smooth and reliable transmission between network nodes. ARQ protocols use acknowledgments and…
Read MoreIoT Based Human Activity Recognition System Using Smart Sensors
Internet of Things provides a virtual view of real-life things by guiding challenges faced by persons in daily life. It is reforming our world with trillions of sensors and other IoT enabled devices by creating a smart environment. Effective use of IoT sensors in various smart IoT applications is very important. After analyzing different sensor…
Read MoreRemote Control of Garden Plantation Water Pumps using Arduino and GSM Mobile
A remotely mobile phone controlled electronic system for supplying water to garden plantations in a greenhouse or similar environment was designed and experimentally implemented. The system monitors the garden environmental conditions such as soil moisture, temperature, humidity and sunlight and a remote user can send commands from his mobile phone such as to switch ON/OFF…
Read MoreArtificial Intelligence Approach for Target Classification: A State of the Art
The classification of static or mobile objects, from a signal or an image containing information as to their structure or their form, constitutes a constant concern of specialists in the electronic field. The remarkable progress made in past years, particularly in the development of neural networks and artificial intelligence systems, has further accentuated this trend.…
Read MoreFuzzy-logical Control Models of Nonlinear Dynamic Objects
The article considers the task of developing a fuzzy-logical PID-type controller for a nonlinear dynamic system. A feature of the structure is presented, which consists in simplifying its controller by decomposition. In the simplest version, three fuzzy controllers are used with one input and one output and separate rule bases. Parameters of fuzzy controllers are…
Read MoreKeyword Driven Image Description Generation System
Image description generation is an important area in Computer Vision and Natural Language Processing. This paper introduces a novel architecture for an image description generation system using keywords. The proposed architecture uses a high-level feature such as keywords for generating captions. The important component of caption generation is the deep Bidirectional LSTM network. The space…
Read MorePotential of Solar Energy in Residential Rooftop Surface Area in Semarang City, Indonesia
This study examines the potential of solar energy in the urban environment with a case study in Semarang, Indonesia by analyzing the intensity of solar radiation and the residential rooftop area. The study aims to obtain a quantitative description of the potential for electricity production from rooftop solar photovoltaic systems in residential areas and estimate…
Read MoreDeep Learning Model for A Driver Assistance System to Increase Visibility on A Foggy Road
For many years, a lot of researches have been made to develop Advanced Driver Assistance Systems (ADAS) that are based on integrated systems. The main objective is to help drivers. Hence, keeping them safe under different driving conditions. Visibility for drivers remains the biggest problem faced on the road in an atmosphere of fog. In…
Read MoreDiffusion of Technology for Language Challenges in the South African Healthcare Environment
Even though mobile technologies are increasingly used to enable communications between providers and receivers of healthcare services, there remain severity challenges owing to the use of various indigenous languages in many Africa countries. Some of the challenges get worst in a countries like South Africa where there are eleven official languages. As a result, interpreters…
Read MoreNonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection
Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…
Read MoreMalware Classification Based on System Call Sequences Using Deep Learning
Malware has always been a big problem for companies, government agencies, and individuals because people still use it as a primary tool to influence networks, applications, and computer operating systems to gain unilateral benefits. Until now, malware detection with heuristic and signature-based methods are still struggling to keep up with the evolution of malware. Machine…
Read MoreComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreDesign of an EEG Acquisition System for Embedded Edge Computing
The human brain is one of the most complex machines on the planet. Being the only method to get real-time data with high temporal resolution from the brain makes EEG a highly sought upon signal in the neurological and psychiatric domain. However, recent developments in this field have made EEG more than just a tool…
Read More
