Results (486)
Search Parameters:
Keyword: ImplementDesigning a Smart Car Parking System (PoC) Prototype Utilizing CCTV Nodes: A vision of an IoT parking system via UCD process
Using smart parking systems has become very important, and particularly so for metropolitan areas, because of the benefits for drivers in many aspects, such as time, frustration, stress, and anger, in addition to the increased consumption of fuel while searching for a vacant parking space. This paper proposes a review of recent advances in sensing…
Read MoreAdapting Model Predictive Control for a PV Station and Evaluating two different MPPT Algorithms P&O and FLC
In this paper first discussion approach will stress out the integration of model predictive control in maximum power point tracking MPPT and as progressing a second approach identified as fuzzy logic controller FLC and perturb & Observe P&O algorithms are analyzed. All are interrelated to MPPT model for a photovoltaic module, PVM, to search for…
Read MoreA Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method
One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…
Read MoreLow-cost Hybrid Wheelchair Controller for Quadriplegias and Paralysis Patients
Wheelchair controller design is very important for handicapped users such as quadriplegia, amputee, paralyzed and elderly. The safe use, easiness, and comfort are an important factor that can directly affect the user’s social efficiency and quality of life. In this paper, the design, implementation, and test of a new low-cost hybrid wheelchair controller for quadriplegics…
Read MoreHuman Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots
In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of…
Read MoreOptimisation of Software-Defined Networks Performance Using a Hybrid Intelligent System
This paper proposes a novel intelligent technique that has been designed to optimise the performance of Software Defined Networks (SDN). The proposed hybrid intelligent system has employed integration of intelligence-based optimisation approaches with the artificial neural network. These heuristic optimisation methods include Genetic Algorithms (GA) and Particle Swarm Optimisation (PSO). These methods were utilised separately…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreA delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances
In this paper, a delay-dependent controller based on the sliding mode concept is proposed to stabilize a networked robotic system in a decentralized synchronization scheme. In addition to being affected by communication time-delays between agents, and seen that external disturbances obviously affect any physical and dynamic system, an unsettling action resulting from measurement errors affects…
Read MoreSelf-Organizing Map based Feature Learning in Bio-Signal Processing
Feature extraction is playing a significant role in bio-signal processing. Feature identification and selection has two approaches. The standard method is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The…
Read MoreDesign, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators
Nowadays, compliant micro-motion stages offer high positioning accuracy and repeatability. When assembled with conventional stages, the resulting dual-range positioning systems allow for nanometer scale accuracy within a centimeter scale working area. However, such systems invoke a high cost and large footprint. This paper presents a low-cost, compact compliant XY micro-motion stage where dual-range manipulation has…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MoreImage Segmentation Using Fuzzy Inference System on YCbCr Color Model
This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…
Read MoreIndoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors
This paper presents the development and design of a methodology based on fuzzy logic to control an indoor mobile robot for a complete navigation in an unknown environment. The methodology incorporates two basic behaviors, namely: reaching the goal and avoiding obstacles. The obstacle avoidance behavior is treated using wall-following scheme based on an Interval Type-2…
Read MoreEnabling Toy Vehicles Interaction With Visible Light Communication (VLC)
An effective communication among the road users is crucial for safety precautions. Nowadays, a light emitting diode (LED) are commonly installed on a motor vehicle as the lighting system. The LED lights are more reliable and flexible in terms of the design and power adjustments. To further utilize the LED applications in a vehicular system,…
Read MorePulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC)
This paper describes the design of a pulse generator to excite PZT and PVDF ultrasonic transducer arrays, based on the Programmable System-on-Chip (PSoC) module. In this module, using programmable logic different pulses were implemented; these pulses are required in ultrasonic applications for multiple channels to excite PZT and PVDF transducer arrays. To excite multiple elements,…
Read MoreDesign of Petri Net Supervisor with 1-monitor place for a Class of Behavioral Constraints
This paper studies the design of supervisory controllers with a minimum number of monitor places for Manufacturing System modeled as safe Petri Nets. The proposed approach considers a class of safety specifications known as Behavioral Constraints with a restricted syntax. The set of Behavioral Constraints are represented as predicate logic formulas in normal conjunctive form.…
Read MoreKinect-Based Moving Human Tracking System with Obstacle Avoidance
This paper is an extension of work originally presented and published in IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). This work presents a design and implementation of a moving human tracking system with obstacle avoidance. The system scans the environment by using Kinect, a 3D sensor, and tracks the center of mass of a…
Read MoreOptimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters
This paper presents the synthesis of a dynamic space vector modulation for power matrix converters so that it is possible to implement a universal modulator that provides a control algorithm dynamically optimized according to the requirements for the matrix converter.
Read MoreADOxx Modelling Method Conceptualization Environment
The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…
Read MoreMethodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…
Read MoreAviation Navigation with Use of Polarimetric Technologies
The article deals with the problem of increasing the accuracy of determination of aircraft’s navigation flight parameters. Increasing the accuracy and sensitivity of navigation parameters determination will improve the efficiency of air conveyance by optimizing the flight trajectories and reducing the flight time and simultaneously will ensure the sufficient level of air conveyance safety. The…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreProposal of a congestion control technique in LAN networks using an econometric model ARIMA
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read MoreUsing Naming Patterns for Identifying Architectural Technical Debt
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read MoreWireless Android Based Home Automation System
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…
Read More
