Results (502)
Search Parameters:
Keyword: NetworkA Method for Detecting Human Presence and Movement Using Impulse Radar
Using non-invasive and non-contact sensors to measure a person’s presence or movement helps improve the quality of life for both healthy people and patients. In this paper, a method of measuring the presence and motion of a person is proposed by utilizing UWB Impulse Radar, which is low power consumption and safe to radiate to…
Read MoreA Review on Cross-Layer Design Approach in WSN by Different Techniques
Wireless Sensor Networks (WSN) include a large number of sensor nodes that are connected to each other with the limitations in energy sources, battery life, memory, mobility and computational capacity. Since the traditional layered architecture was appropriate only for the wired network. It works within a strict boundary that leads to more energy usage as…
Read MorePerformance Analysis of Go-Back-N ARQ Protocol Used in Data Transmission Over Noisy Channels
Automatic Repeat reQuest (ARQ) protocols are used to control transmission errors in data communications. They are used at Data Link Control (DLC) sublayer of Data Link Layer (DLL) of OSI (Open Systems Interconnection) network model to achieve flow and error control and provide smooth and reliable transmission between network nodes. ARQ protocols use acknowledgments and…
Read MoreReal-Time Traffic Sign Detection and Recognition System for Assistive Driving
Road traffic accidents are primarily caused by drivers error. Safer roads infrastructure and facilities like traffic signs and signals are built to aid drivers on the road. But several factors affect the awareness of drivers to traffic signs including visual complexity, environmental condition, and poor drivers education. This led to the development of different ADAs…
Read MoreHuman-Robot Multilingual Verbal Communication – The Ontological knowledge and Learning-based Models
In their verbal interactions, humans are often afforded with language barriers and communication problems and disabilities. This problem is even more serious in the fields of education and health care for children with special needs. The use of robotic agents, notably humanoids integrated within human groups, is a very important option to face these limitations.…
Read MoreThe Sound of Trust: Towards Modelling Computational Trust using Voice-only Cues at Zero-Acquaintance
Trust is essential in many interdependent human relationships. Trustworthiness is measured via the effectiveness of the relationships involving human perception. The decision to trust others is often made quickly (even at zero acquaintance). Previous research has shown the significance of voice in perceived trustworthiness. However, the listeners’ characteristics were not considered. A system has yet…
Read MoreArtificial Intelligence Approach for Target Classification: A State of the Art
The classification of static or mobile objects, from a signal or an image containing information as to their structure or their form, constitutes a constant concern of specialists in the electronic field. The remarkable progress made in past years, particularly in the development of neural networks and artificial intelligence systems, has further accentuated this trend.…
Read MoreA CNN-based Differential Image Processing Approach for Rainfall Classification
With the aim of preventing hydro-geological risks and overcoming the problems of current rain gauges, this paper proposes a low-complexity and cost-effective video rain gauge. In particular, in this paper the authors propose a new approach to rainfall classification based on image processing and video matching process employing convolutional neural networks (CNN). The system consists…
Read MoreFuzzy-logical Control Models of Nonlinear Dynamic Objects
The article considers the task of developing a fuzzy-logical PID-type controller for a nonlinear dynamic system. A feature of the structure is presented, which consists in simplifying its controller by decomposition. In the simplest version, three fuzzy controllers are used with one input and one output and separate rule bases. Parameters of fuzzy controllers are…
Read MoreKeyword Driven Image Description Generation System
Image description generation is an important area in Computer Vision and Natural Language Processing. This paper introduces a novel architecture for an image description generation system using keywords. The proposed architecture uses a high-level feature such as keywords for generating captions. The important component of caption generation is the deep Bidirectional LSTM network. The space…
Read MoreDevelopment of Soil Moisture Monitoring by using IoT and UAV-SC for Smart Farming Application
Soil moisture is a fundamental factor for smart farming that is used to control the water management system. In this paper, the unmanned aerial vehicle (UAV) small cell (UAV-SC) can provide Internet of things (IoT) as the hotspot mobility network, due to the minimum limitation energy of connected IoT. The development of ground sensor (GS)…
Read MoreComputational Intelligence and Statistical Learning Performances on Predicting Dengue Incidence using Remote Sensing Data
Dengue is a viral infection disease transmitted to people through the bite of specific mosquito species living in a tropical zone. According to the World Health Organization, dengue has been listed among the top-ten diseases for 2019 as it makes 3.9 billion people in 128 countries be at risk of infection. One major cause of…
Read MoreDistributed Microphone Arrays, Emerging Speech and Audio Signal Processing Platforms: A Review
Given ubiquitous digital devices with recording capability, distributed microphone arrays are emerging recording tools for hands-free communications and spontaneous tele-conferencings. However, the analysis of signals recorded with diverse sampling rates, time delays, and qualities by distributed microphone arrays is not straightforward and entails important considerations. The crucial challenges include the unknown/changeable geometry of distributed arrays,…
Read MoreDeep Learning Model for A Driver Assistance System to Increase Visibility on A Foggy Road
For many years, a lot of researches have been made to develop Advanced Driver Assistance Systems (ADAS) that are based on integrated systems. The main objective is to help drivers. Hence, keeping them safe under different driving conditions. Visibility for drivers remains the biggest problem faced on the road in an atmosphere of fog. In…
Read MoreCluster Centroid-Based Energy Efficient Routing Protocol for WSN-Assisted IoT
Wireless sensor network is highly resource constrained, where energy efficiency and network lifetime plays a major role for its sustenance. As the sensor nodes are battery operated and deployed in hostile environments, either recharging or replacement of batteries in sensor nodes is not possible after its deployment in inaccessible areas. In such condition, energy is…
Read MoreDynamic Decision-Making Process in the Opportunistic Spectrum Access
We investigate in this paper many problems related to the decision-making process in the Cognitive Radio (CR), where a Secondary User (SU) tries to maximize its opportunities by finding the most vacant channel. Recently, Multi-Armed Bandit (MAB) problems attracted the attention to help a single SU, in the context of CR, makes an optimal decision…
Read MoreMalware Classification Based on System Call Sequences Using Deep Learning
Malware has always been a big problem for companies, government agencies, and individuals because people still use it as a primary tool to influence networks, applications, and computer operating systems to gain unilateral benefits. Until now, malware detection with heuristic and signature-based methods are still struggling to keep up with the evolution of malware. Machine…
Read MoreMulti-Agent Data Recognition System Based on Received Signal in Antenna on Board Telecom System
Information data recognition during traditional operating step in telecommunication system, as their interpretation, presents an important active research field. In this context, we propose as a solution multi-agent data identification system starting with received signal parameters in antenna network connected on board telecom system. Due to the Information Identification Data (IID) response variability that differ…
Read MoreOffline Signature Recognition and Verification Using ORB Key Point Matching Techniques
An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreMeasurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia
The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…
Read MoreA Survey on Image Forgery Detection Using Different Forensic Approaches
Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…
Read MoreDesign and Optimization of Dual-Band Branch-Line Coupler with Stepped-Impedance-Stub for 5G Applications
This paper presents a design optimization of a dual-band branch-line coupler with stepped-impedance-stub lines. This coupler operates over 5G NR frequency bands n5 and n2, developed by 3GPP for the 5G (fifth generation) mobile network, and these two bands are centered at 0.85 GHz and 1.9 GHz respectively. To achieve the design specifications an adjusted…
Read MoreANN Based MRAC-PID Controller Implementation for a Furuta Pendulum System Stabilization
Nowadays, process automation and smart systems have gained increasing importance in a wide variety of sectors, and robotics have a fundamental role in it. Therefore, it has attracted greater research interests; among them, Underactuated Mechanical Systems (UMS) have been the subject of many studies, due to their application capabilities in different disciplines. Nevertheless, control of…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read More
