Results (638)
Search Parameters:
Keyword: FIEComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreDesign of an EEG Acquisition System for Embedded Edge Computing
The human brain is one of the most complex machines on the planet. Being the only method to get real-time data with high temporal resolution from the brain makes EEG a highly sought upon signal in the neurological and psychiatric domain. However, recent developments in this field have made EEG more than just a tool…
Read MoreMulti-Agent Data Recognition System Based on Received Signal in Antenna on Board Telecom System
Information data recognition during traditional operating step in telecommunication system, as their interpretation, presents an important active research field. In this context, we propose as a solution multi-agent data identification system starting with received signal parameters in antenna network connected on board telecom system. Due to the Information Identification Data (IID) response variability that differ…
Read MoreOffline Signature Recognition and Verification Using ORB Key Point Matching Techniques
An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreThe Application of Mobile Learning Technologies at Malaysian Universities Through Mind Mapping Apps for Augmenting Writing Performance
21st century learning focuses on the flow of information, media, and technology. In Malaysia, many university students face problems in English writing. Thus, students should be exposed to the technology training in innovative ways to produce students with a dynamic in this ever-changing world. Recently, the transformation and the evolution of mobile have created a…
Read MoreMonte Carlo Estimation of Dose in Heterogeneous Phantom Around 6MV Medical Linear Accelerator
In this work, we completed a validation of the Varian Clinac IX equipped with the High Definition Multi-Leaf Collimator (HD 120 MLC) instead of the removable jaws, using GATE Monte Carlo Platform version 8.2. We validated the multileaf collimator (MLC) geometry by simulating two dosimetric functions (Percentage Depth Dose (PDD) and Dose Profile (DP)), for…
Read MoreEnhancing Decision Making Capabilities in Humanitarian Logistics by Integrating Serious Gaming and Computer Modelling
The field of humanitarian logistics has in recent times gained an increasing attention from both academics and practitioners communities alike. Although various research groups have addressed theoretical and technical developments in humanitarian logistics using conventional research tools, applied research appears to be often dependent on practitioners’ inputs. This paper is an attempt to fill the…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreA Review on Autonomous Mobile Robot Path Planning Algorithms
The emerging trend of modern industry automation requires intelligence to be embedded into mobile robot for ensuring optimal or near-optimal solutions to execute certain task. This yield to a lot of improvement and suggestions in many areas related to mobile robot such as path planning. The purpose of this paper is to review the mobile…
Read MoreEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreAutomated Abaca Fiber Grade Classification Using Convolution Neural Network (CNN)
This paper presents a solution that automates Abaca fiber grading which would help the time-consuming baling of Abaca fiber produce. The study introduces an objective instrument paired with a system to automate the grade classification of Abaca fiber using Convolutional Neural Network (CNN). In this study, 140 sample images of abaca fibers were used, which…
Read MoreUniversity Students Result Analysis and Prediction System by Decision Tree Algorithm
The main assets of universities are students. The performance of students plays a vital role in producing excellent graduate students who will be the future viable leader and manpower in charge of a country’s financial and societal progress. The purpose of this research is to develop a “University Students Result Analysis and Prediction System” that…
Read MoreExperimental Studies of the Silicon Photomultiplier Readout Electronics Based on the Array Chip МН2ХА030
The experimental findings of the main units of readout electronics of silicon photomultipliers (SiPMs) based on array chip (AC) МН2ХА030: a charge-sensitive amplifier (CSA) with an adjustable conversion factor and a base line restorer (BLR) circuit and two types of voltage comparators are considered. The electrical circuits of the units, the measurement results of static…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreUsing Leader Election and Blockchain in E-Health
The development of electronic healthcare systems requires to adopt modern technologies and architectures. The use of Electronic Personal Health Record (E-PHR) should be supported by efficient storage such as cloud storage which enables more security, availability and accessibility of patients’ records. Actually, the increase of availability of E-PHR enhances parallel access, which improves the performance…
Read MoreEvaluation of Uncertainty Measurement Calculation for Vector Network Analyzer From 300 kHz to 8.5 GHz
Increasing the telecommunications products that allow Vector Network Analyzer is becoming more common tools to measure the S-Parameter. It will be an absolute number from the S-Parameter measurements produced in real and imaginary, other words it is also known as the product of the calculation. The calculation findings do not include the systematic and random…
Read MoreMobile Based for Basic English Learning Assessment with Augmented Reality
Nowadays Augmented Reality (AR) is very popular in teaching and learning, especially in leading student to observe learning material targets which supported by online learning resources using mobile device and wireless technology. Because English is a foreign language, most students have problems in learning English. Generally, their problems were related to low motivation, bad study…
Read MoreA Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques
Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…
Read MoreReview on Smart Electronic Nose Coupled with Artificial Intelligence for Air Quality Monitoring
With the advent of the Internet of Things Technologies (IOT), smart homes, and smart city applications, E-Nose was created. Almost of gas sensors consisting the electronic nose system suffer from cross sensitivity and lack of selectivity. Coupling smart gas sensors with artificial intelligence algorithms can thus empower conventional gas sensing technologies and increase accuracy in…
Read MoreOn the Use of Triple Graph Grammars for Model Composition
In the software engineering research, several works focus on advantages of multi-modeling, which facilitate modeling a system by separating of concerns. The Model Driven Engineering approach relies on model to design software artefacts during the software development lifecycle. Handling such models involves describing some model management operators like ‘ composition ‘. That is an operation…
Read MoreDeterminants of Students’ Actual use of the Learning Management System (LMS): An Empirical Analysis of a Research Model
This study built and tested a research model to determine the determinants that impact students’ actual use of the learning management system. A survey questionnaire was used to gather data from 148 university students who used LMS in their course of study. The structural equation model was used to analyze quantitative data. The study revealed…
Read MoreApproach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection
Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…
Read MoreA Simple Modelling Tool for Fast Combined Simulation of Interconnections, Inter-Symbol Interference and Equalization in High-Speed Serial Interfaces for Chip-to-Chip Communications
We describe an efficient system-level simulator that, starting from the architecture of a well-specified transmissive medium (a channel modelled as single-ended or coupled differential microstrips plus cables) and including the system-level characteristics of transmitter and receiver (voltage swing, impedance, etc.), computes the eye diagram and the bit-error rate that is obtained in high-speed serial interfaces.…
Read MoreDesign of Interactive Aids for Children’s Teeth Cleaning Habits
Dental plaque is considered a possible causative agent of major dental diseases. People must develop oral care skills at an early age with family support. This study aims to assist parents and to reduce children’s fear while cleaning their teeth. An interactive game challenges children’s brushing ability. Arduino modules and software platform was utilized to…
Read More
