Results (477)
Search Parameters:
Keyword: Control5G mm-wave Band pHEMT VCO with Ultralow PN
Oscillator phase noise (PN) has a strong impact on the spectral purity of the RF signal in wireless systems and is, therefore, a main challenge when designing a local oscillator. In this paper, we propose a new approach for designing a low PN oscillator based on the Time-Invariant Linear Model of phase noise. It leads…
Read MoreA Solution Applying the Law on Road Traffic into A Set of Constraints to Establish A Motion Trajectory for Autonomous Vehicle
With a model predictive control approach and to set the motion trajectory for an autonomous vehicle in situations where emergency braking cannot be performed, in this paper, we propose a solution to apply the law on road traffic into a set of constraints and thereby build an objective function to create motion trajectory for autonomous…
Read MorePrognosis of Failure Events Based on Labeled Temporal Petri Nets
To reduce the risk of accidental system shutdowns, we propose to control system developers (supervisor, SCADA) a prediction tool to determine the occurrence date of an imminent failure event. The existing approaches report the rate of occurrence of a future failure event (stochastic method), but do not provide an estimation date of its occurrence. The…
Read MoreThe Design of an Experimental Model for Deploying Home Area Network in Smart Grid
In the smart power grid, designing an efficient and reliable communication architecture has an important role in improving efficiency, and maintaining the connectivity of different network components. The home area network (HAN) provides an energy management system in houses since it enables home energy control and monitoring. So, it is imperative to determine a HAN…
Read MoreAngular Orientation of Steering Wheel for Differential Drive
Several drive mechanisms for different robots are at hand in current days. Bicycle steering, Ackerman steering, differential drive are some principal drive mechanisms that are being deployed in robots these days. The differential drive needs the wheel rotations to be updated very frequently. But it is most commonly deployed on the robots with two wheels…
Read MoreDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreAnalysis of the Blockchain for Adoption in Electronic Commerce Management in Ecuador
The document describes the advancement of technology in commercial negotiations and functionality for various electronic transactions in Ecuador, with the aim of analyzing the blockchain and its adoption in managing e-commerce. The quantitative approach with a deductive and descriptive method has been used to identify the benefits in transactional activities and data security, both customers…
Read MoreReview on Smart Electronic Nose Coupled with Artificial Intelligence for Air Quality Monitoring
With the advent of the Internet of Things Technologies (IOT), smart homes, and smart city applications, E-Nose was created. Almost of gas sensors consisting the electronic nose system suffer from cross sensitivity and lack of selectivity. Coupling smart gas sensors with artificial intelligence algorithms can thus empower conventional gas sensing technologies and increase accuracy in…
Read MoreClassification of Timber Load on Trucks
All trucks heading into the paper mill MONDI, Slovakia, have to pass an automatic security check. It controls if storage of its wood load meets all standards of safety. Each truck is scanned by a group of 2D scanners. After that the inspection of timber load is done by a software with use of the…
Read MoreAlternative Braking Method for Small Scaled-Wind Turbines Connected DC Green House with Analogical Experiment on Blade Destruction
To supply a stable and efficient electricity, small-scaled wind turbine’s brake system plays an immense role in various wind speeds. Small-wind power generation systems are difficult to operate in strong wind region since the turbine could be over-rotated and damaged if the brake system is not robust enough to maintain a stable angular velocity. Most…
Read MorePromoting Continuous Professional Development Among Academics from A Vocational College by Using A Practical Workshop Based on Arduino Technology
The internet of things has resulted in the design and development of many electronic sensors that need to be integrated with various technologies. Engineering academics need ongoing training relating to this integration as they need to subsequently teach their students. This relates to continuous professional development. The purpose of this article is to illustrate how…
Read MoreExtending Movable Surfaces with Touch Interaction Using the VirtualTablet: An Extended View
Immersive output and natural input are two core aspects of a virtual reality experience. Current systems are frequently operated by a controller or gesture-based approach. However, these techniques are either very accurate but require an effort to learn, or very natural but miss haptic feedback for optimal precision. We transfer ubiquitous touch interaction with haptic…
Read MoreScapy Scripting to Automate Testing of Networking Middleboxes
Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…
Read MoreElectronic Steering of the Vehicle Axle with Force Feedback
The technology of electronic steering with force feedback is related to electronic vehicle control. This technology is also known as “steer-by-wire” technology and is specific in that there is not any mechanical connection between the axle and the steering wheel. This technology is currently not very widespread. However, developments in the automotive industry are slowly…
Read MoreEnhancing an SDN Architecture with DoS Attack Detection Mechanisms
A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…
Read MoreHybrid Solar Thermal/Electricity Automated Oven
This paper presents hybrid solar thermal/electricity automated oven. The work compares sliding mode control (SMC) to traditional PID control of the oven system using MATLAB/Simulink 2014b model. SMC control method shows faster rise and settling time. The control technique has been designed to automate change of temperature level of the oven by accepting multiple reference…
Read MoreModel of Automatic Parking House
This article deals with the issue of parking houses, storage mechanisms and how to control them. A laboratory model of a multi-storey underground automatic parking house was designed and created for this purpose, which is used to test a new innovative way of storing cars and specialized approaches to driving actuators. The model is based…
Read MoreNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read MoreA Regenerative Energy Recovery System for Electric Vehicles Charging A Battery at A Low Speed
In this paper, a regenerative energy recovery system for electric vehicles charging a battery at a low speed is proposed. When a permanent magnet synchronous motor driving the electric vehicles is driven by a generator, the generated voltage is controlled to rise or drop by using the L-C resonance circuit. As the circuit only has…
Read MoreBiofortification of the Ryegrass (Lolium multiflorum L.) with Chicken Manure Compost in the Central Sierra of Peru
In Peru, large volumes of chicken manure are produced, whose compost applied at normal levels improves the ryegrass yield and protein intake, to obtain organic products and contribute to animal, environmental and human health. To evaluate the biofortifying effect of Chicken Manure Compost (CMC) incorporated in (T1): 0, (T2): 10 and (T3): 20 t ha-1…
Read MoreResource Selection Service Based on Neural Network in Fog Environment
As an emergent technology in Internet of Things (IoT), the ultimate target of fog computing is to provide a widely distributed computational resources and data repository closer to the network edge providing heterogeneous systems both in terms of software and hardware. The fog system must have the capability to deal with huge number of resources…
Read MoreStress Response Index for Traumatic Childhood Experience Based on the Fusion of Hypothalamus Pituitary Adrenocorticol and Autonomic Nervous System Biomarkers
Stress occurring in the early days of an individual was often assumed to cause several health consequences. A number of reports indicated that having to deal with unfavourable events or distress situation at a young age could tweak stress responses leading to a broad spectrum of poor mental and physical health condition. Therefore, changes identified…
Read MoreEnabling 3D Heterogeneous Structures Towards Smart Chips: A Review
This review paper discusses recent research outcomes of fabricating three-dimensional (3D) heterogeneous structures in complementary metal-oxide-semiconductor (CMOS) integrated circuit (IC) technologies to enable smart future chips. The CMOS-based 3D heterogeneous structures demonstrated are vertical magnetic-cored inductors for radio-frequency (RF) ICs, through-back-end-of-line (BEOL) metal wall structures for global flying noise isolation, above-IC nano crossbar array electrostatic…
Read MoreConfigurable Process Model: Discovery Approach from Event Logs
In the domain of business process management, the configurable process model is widely used to optimize time and cost of business process models design, which is known as the concept of “reuse”. Using process mining techniques for process model discovery helps to provide a better view on processes and improve quality of models. The majority…
Read More
