Results (1507)
Search Parameters:
Keyword: CatIoT and Business Intelligence Based Model Design for Liquefied Petroleum Gas (LPG) Distribution Monitoring
Gas leakage caused by various causes poses significant risks to public safety. To address this problem, an intelligent model is proposed for the accurate monitoring of Liquefied Petroleum Gas (LPG) distribution based on the integration of Internet of Things (IoT) and Business Intelli- gence (BI) technologies. Through the use of sensors and actuators, it seeks…
Read MoreOn Mining Most Popular Packages
In this paper, we will discuss two algorithms to solve the so-called package design problem, by which a set of queries (referred to as a query log) is represented by a collection of bit strings with each indicating the favourite activities or items of customers. For such a query log, we are required to design…
Read MoreIntegrating Speech and Gesture for Generating Reliable Robotic Task Configuration
This paper presents a system that combines speech and pointing gestures along with four distinct hand gestures to precisely identify both the object of interest and parameters for robotic tasks. We utilized skeleton landmarks to detect pointing gestures and determine their direction, while a pre-trained model, trained on 21 hand landmarks from 2D images, was…
Read MoreGPT-Enhanced Hierarchical Deep Learning Model for Automated ICD Coding
In healthcare, accurate communication is critical, and medical coding, especially coding using the ICD (International Classification of Diseases) standards, plays a vital role in achieving this accuracy. Traditionally, ICD coding has been a time-consuming manual process performed by trained professionals, involving the assignment of codes to patient records, such as doctor’s notes. In this paper,…
Read MoreHybrid Optical Scanning Holography for Automatic Three-Dimensional Reconstruction of Brain Tumors from MRI using Active Contours
This paper presents a method for automatic 3D segmentation of brain tumors in MRI using optical scanning holography. Automatic segmentation of tumors from 2D slices (coronal, sagittal and axial) enables efficient 3D reconstruction of the region of interest, eliminating the human errors of manual methods. The method uses enhanced optical scanning holography with a cylindrical…
Read MoreAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreLeveraging Machine Learning for a Comprehensive Assessment of PFAS Nephrotoxicity
Polyfluoroalkyl substances (PFAS) are persistent chemicals that accumulate in the body and environment. Although recent studies have indicated that PFAS may disrupt kidney function, the underlying mechanisms and overall effects on the organ remain unclear. Therefore, this study aims to elucidate the impact of PFAS on kidney health using machine learning techniques. Utilizing a dataset…
Read MoreSolar Photovoltaic Power Output Forecasting using Deep Learning Models: A Case Study of Zagtouli PV Power Plant
Forecasting solar PV power output holds significant importance in the realm of energy management, particularly due to the intermittent nature of solar irradiation. Currently, most forecasting studies employ statistical methods. However, deep learning models have the potential for better forecasting. This study utilises Long Short-Term Memory (LSTM), Gate Recurrent Unit (GRU) and hybrid LSTM-GRU deep…
Read MoreVisualization of the Effect of Additional Fertilization on Paddy Rice by Time-Series Analysis of Vegetation Indices using UAV and Minimizing the Number of Monitoring Days for its Workload Reduction
This research is an extension of the research (ISEEIE 2023), which dealt with Time-Series Clustering (TSC) of Vegetation Index (VI) for paddy rice. The novelty of this research is “Visualization of growth changes before and after additional fertilization,” “Analyzing the appropriate amount of additional fertilizer,” and “Optimization of monitoring period to minimize the number of…
Read MoreEvaluation of Various Deep Learning Models for Short-Term Solar Forecasting in the Arctic using a Distributed Sensor Network
The solar photovoltaic (PV) power generation industry has experienced substantial, ongoing growth over the past decades as a clean, cost-effective energy source. As electric grids use ever-larger proportions of solar PV, the technology’s inherent variability—primarily due to clouds—poses a challenge to maintaining grid stability. This is especially true for geographically dense, electrically isolated grids common…
Read MoreButon Rock Asphalt Paving Block Innovation using Waste Engine Oil and Recycled Concrete Aggregate
Road surface coating using concrete paving block cement has been used for a long time. As an aggregate binding agent, asphalt can be made into paving blocks. Utilizing waste in the recycling process is an activity to control the sustainability of natural resources. Waste Engine Oil and Recycled Concrete Aggregate can be used as road…
Read MoreOptimal Engagement of Residential Battery Storage to Alleviate Grid Upgrades Caused by EVs and Solar Systems
The integration of distributed energy resources has ushered in a host of complex challenges, significantly impacting power quality in distribution networks. This work studies these challenges, exploring issues such as voltage fluctuations and escalating power losses caused by the integration of solar systems and electric vehicle (EV) chargers. We present a robust methodology focused on…
Read MoreA Novel Metric for Evaluating the Stability of XAI Explanations
Automated systems are increasingly exerting influence on our lives, evident in scenarios like AI-driven candidate screening for jobs or loan applications. These scenarios often rely on eXplainable Artificial Intelligence (XAI) algorithms to meet legal requirements and provide understandable insights into critical processes. However, a significant challenge arises when some XAI methods lack determinism, resulting in…
Read MoreSmart Agent-Based Direct Load Control of Air Conditioner Populations in Demand Side Management
The integration of fluctuating renewable resources such as wind and solar into existing power systems poses challenges to grid reliability and the seamless incorporation of these resources. To address the inherent variability in renewable generation, direct load control emerges as a promising method for demand-side management. Thermostatically controlled appliances, like air conditioners, hold a significant…
Read MoreBridging Culture and Care: A Mobile App for Diabetes Self-Care Honoring Native American Cultural Practices
Diabetes presents a significant public health issue for Native Americans, exacerbated by cultural nuances often ignored by conventional healthcare. To address this, we introduce a mobile app designed with the cultural context of Native American populations in mind. The app’s development followed participatory design principles, with direct input from Native American stakeholders through focus groups…
Read MoreDevelopment and Usability Evaluation of Mobile Augmented Reality Contents for Railway Vehicle Maintenance Training: Air Compressor Case
The air compressor of a railroad vehicle is an important equipment that produces compressed air used in braking systems. New visual interaction techniques were proposed and evaluated to develop effective augmented reality content for maintenance support and training of this device. To this end, modeling techniques capable of fast animation, storyboard production to support light…
Read MoreTracing the Evolution of Machine Translation: A Journey through the Myanmar (Burmese)-Wa (sub-group of the Austro-Asiatic language) Corpus
Machine Translation (MT) has come a long way toward reducing linguistic gaps. However, its progress in efficiently handling low-resource languages—such as the Wa language in the Myanmar-Wa corpus—has not received enough attention. This study begins with a thorough investigation of the historical development of MT systems, painstakingly following their development against the complex background of…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreEnhancing Compressive Strength of Pervious Concrete for Use as Pavement Layer in Urban Roads Aper
South African Drainage and Stormwater Systems in urban roads has been of great concern, more so with recent flash floods in Gauteng and KwaZulu Natal Province in South Africa. Pervious concrete can be used to mitigate these challenges for urban roads. Pervious concrete is a concrete that contains no fines or only a small amount…
Read MoreAnalysis of Emotions and Movements of Asian and European Facial Expressions
The aim of this study is to develop an advanced framework that not only recognize the dominant facial emotion, but also contains modules for gesture recognition and text-to-speech recognition. Each module is meticulously designed and integrated into unified system. The implemented models have been revised, with the results presented through graphical representations, providing prevalent emotions…
Read MoreStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreImproved Candidate-Career Matching Using Comparative Semantic Resume Analysis
A resume is a prevalent and generally employed method for individuals to showcase their proficiency and qualifications. It is typically composed using diverse customized, personalized methods in multiple inconsistent formats (such as pdf, txt, doc, etc.). Screening candidates based on the alignment of their resume with a set of job requirements is typically a labori-…
Read MoreA Smart Farming Management System based on IoT Technologies for Sustainable Agriculture
Advances in Internet of Things (IoT) and wireless technologies are revolutionizing various sectors, including environment, education, healthcare, industry, etc. In the same dynamic, as the world population constantly evolves, solutions based on such technologies need to be proposed to improve the agricultural sector. Senegalese agriculture, primarily rain-fed and based on both cash crops and subsistence…
Read MoreDual Mode Control of an Inverted Pendulum: Design, Analysis and Experimental Evaluation
We present an inverted pendulum design using readily available V-slot rail components and 3D printing to construct custom parts. To enable the examination of different pendulum characteristics, we constructed three pendulum poles of different lengths. We implemented a brake mechanism to modify sliding friction resistance and built a paddle that can be attached to the…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read More
