Results (380)
Search Parameters:
Keyword: NeedDesign of Bio-Inspired Robot Hand Using Multiple Types of Actuators
Many prosthetic hands are focused on appearance and grip strength, however, gestures are also one of the performances that users need for communicating with others as body language to express their feeling and intention. For this paper, the initial prototype of the gesturing robotics hand is presented by using multiple types of actuators concept to…
Read MoreEEG Feature Extraction based on Fast Fourier Transform and Wavelet Analysis for Classification of Mental Stress Levels using Machine Learning
Mental stress assessment remains riddled with biases caused by subjective reports and individual differences across societal backgrounds. To objectively determine the presence or absence of mental stress, there is a need to move away from the traditional subjective methods of self-report questionnaires and interviews. Previously, it has been evidence that EEG Oscillations can discriminate mental…
Read MoreInfrastructure-as-a-Service Ontology for Consumer-Centric Assessment
In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…
Read MoreSocial Media Text Summarization: A Survey Towards a Transformer-based System Design
Daily life is characterized by a great explosion of abundance of information available on the internet and social media. Smart technology has radically changed our lives, giving a leading role to social media for communication, advertising, information and exchange of opinions. Managing this huge amount of data by humans is an almost impossible task. Adequacy…
Read MoreDesign and Prototyping of a 3DOF Worm-drive Robot Arm
Many designs for robot arms exist. Here we present an affordable revolute arm, capable of executing simple pick-and-place tasks. The arm employs a double parallelogram structure, which ensures its endpoint angle in the plane of the upper arm remains fixed without the need for additional actuation. Its limbs are fabricated from circular tubes made from…
Read MoreCondition Assessment of Medium Voltage Assets: A Review
Condition assessment of medium voltage assets is essential to ensure reliability and cost-effective operation of power distribution networks. This article presents a literature review of condition assessment of medium voltage assets related to a distribution system in a non-interconnected zone in Colombia, namely, power transformers, photovoltaic systems, switchgear, lines and cables, and instrument transformers. Advanced…
Read MoreDetailed Study of a Proposal for a Computer Based Tutoring Strategy
In this article, we propose a new tutoring strategy to combat school dropout in Morocco. This strategy is based on a collaborative approach involving educational administration and teachers at the national level to ensure equity and equal opportunities for all Moroccan students, on the one hand, and the quality of the training, on the other.…
Read MoreProportional Derivative and Proportional Integral Derivative Controllers for Frequency Support of a Wind Turbine Generator in a Diesel Generation Mix
The levelized cost of electricity production is highly dependent on the cost of fuel oil on the world market. In order to reduce the dependency on the fuel oil, many countries are adopting an energy transition towards distributed generation. Distributed generation can be described as various means of generating electricity at or near where it…
Read MoreInvestigating the Impression Effects of a Teacher-Type Robot Equipped a Perplexion Estimation Method on College Students
In recent years, the adoption of ICT education has increased in educational settings. Research and development of educational support robots have garnered considerable interest as a promising approach to inspire and engage students. Conventional robots provide learning support through button operations by the learners. However, the frequent need for button operation to request support may…
Read MoreDoubling the Number of Connected Devices in Narrow-band Internet of Things while Maintaining System Performance: An STC-based Approach
Narrow-band Internet of Things (NB-IoT) is a low-power wide-area network (LPWAN) method that was first launched by the 3rd generation partnership project (3GPP) Rel-13 with the purpose of enabling low-cost, low-power, and wide-area cellular connections for the Internet of Things (IoT). As the demand for over-the-air services grows and with the number of linked wireless…
Read MoreImproving License Plate Identification in Morocco: Intelligent Region Segmentation Approach, Multi-Font and Multi-Condition Training
The exponential growth in the number of automobiles over the past few decades has created a pressing need for a robust license plate identification system that can perform effectively under various conditions. In Morocco, as in other regions, local authorities, public organizations, and private companies require a reliable License Plate Recognition (LPR) system that takes…
Read MoreAccuracy Improvement-Based Wireless Sensor Estimation Technique with Machine Learning Algorithms for Volume Estimation on the Sealed Box
Currently, the quality and quantity of product must be inspected before transporting. Currently the popular unsealing box product inspecting is performed by weighing the box where the errors occur according to the tolerance of the weighting machine and tolerance weight of the product. On the other hand, the quantity of product can be inspected automatically…
Read MoreNavigation Aid Device for Visually Impaired using Depth Camera
People with visual impairment face daily struggle of navigating through unfamiliar places. This problem mainly caused by their lack of spatial awareness, i.e., the ability to estimate the distance between themselves and their surroundings. In order for visually impaired people to navigate independently, an effective navigation aid is required. The proposed navigation aid device utilizes…
Read MoreIndoor Positioning: Comparing Different Techniques and Dealing with a user Authentication use Case
Indoor positioning is a complex issue with many, heterogeneous application cases, each one presenting different requirements and environments. In such a complex ecosystem, an agile taxonomy is needed to be able to select a proper solution for a given scenario, as well as practical recommendations for the most used solutions. Besides providing these tools, we…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreDevelopment of an Intelligent Road Anomaly Detection System for Autonomous Vehicles
Globally, road transportation has become one of the most reliable means of moving goods and services from one place to the other. It has contributed immensely to the standard of living and modern civilization. However, this means of transportation is characterised by some issues which are poised to be harmful to the human population if…
Read MoreMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read MoreDismantle Shilling Attacks in Recommendations Systems
Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreOptimizing Sensors Locations for Tsunami Warning System
To reduce the time necessary for determination of tsunami source parameters it is proposed to optimize the location of sensors system and to use only a part of the measured wave profile. Based on computation, it is possible to balance the number of sensors in use and the time period after the earthquake needed to…
Read MoreEmerging Trends in Green Best Practices and the Impact on Government Policy
While it is commonly accepted that climate change needs to be addressed to protect both human and environmental health, it is not widely understood what steps need to be taken to accomplish this daunting task. Additionally, there is currently no formal definition of what constitutes a ‘green’ company or ‘green’ best practice, despite the rising…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read MoreDesign of an Off-Grid Hybrid Energy System for Electrification of a Remote Region: a Case Study of Upper Blink Water Community, South Africa
Electrifying or connecting remote and isolated communities to the national grid is very difficult and expensive. This challenge is due to the geographic locations of these isolated communities and terrain that needs navigation when installing transmission lines to transmit power to the communities. This article presents a case study of the design of a hybrid…
Read More
