Results (94)
Search Parameters:
Keyword: PTONorthern Leaf Blight and Gray Leaf Spot Detection using Optimized YOLOv3
Corn is one of the most important agricultural products in the world. However, climate change greatly threatens corn yield, further increasing already prevalent diseases. Northern corn leaf blight (NLB) and Gray Leaf Spot are two major corn diseases with lesion symptoms that look very similar to each other, and can lead to devastating loss if…
Read MoreNiO Quantum dots Doped Triple Cation Perovskite \(\mathrm{CsMAFAPbI_2Br_2}\) Heterojunction Photodetector with High Responsivity
Optoelectronic devices applications based on Organic–inorganic perovskites are promising and effective low-cost energy materials due to their exceptional physical properties which include high carrier mobility, high optical absorption coefficient, and long carrier diffusion length. In the presented work, a TiO2/NiO+5% Fe quantum dots (QDs)–doped CsMAFAPbI2Br2 perovskite heterojunction broadband photodetector was fabricated on FTO/glass substrate. The…
Read MoreEncompassing Chaos in Brain-inspired Neural Network Models for Substance Identification and Breast Cancer Detection
The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreComparative Analysis and Modern Applications of PoW, PoS, PPoS Blockchain Consensus Mechanisms and New Distributed Ledger Technologies
Central authorities have registered economic transactions based on trust since the dawn of time. With the advent of paper, methods for documenting transactions and records became more difficult and detailed. With the widespread use of computers in recent years, digital recording has made record keeping easier and since then every technical advancement has made data…
Read MoreDevelopment of Miniaturized Monolithic Isolated Gate Driver
Gate driver has been applied in many ways, exemplified by that, by using the DC-isolated and AC-pass characteristics of gate driver’s primary and secondary sides, the problem of floating endpoint in semiconductor power switch can be solved. However, the conventional design of isolated gate driver provides circuit voltage blocking by optically coupled components. Due to…
Read MoreEvaluation Studies of Motion Sickness Visually Induced by Stereoscopic Films
Humans have experienced motion sickness and possessed the knowledge of stereopsis since classical antiquity. Knowledge of stereopsis dates back to approximately 300 B.C., when Euclid first recognized the concept of depth perception in human vision. Further, the motion sickness is including a sensation of wooziness and nausea that has been documented since approximately 400 B.C.,…
Read MoreBlockchain-Based Decentralized Digital Self-Sovereign Identity Wallet for Secure Transaction
Blockchain (BC) as the widespread innovations in the 21st century has recognized itself to be immutable, tamper-resistant, decentralize and secure. This emerging technology is used as a functional technology for refining present technology and forming new applications for its robustness and disintermediation. Decentralized Digital Self-Sovereign Identity (DDSSI) is an identity mapped with individual identity information…
Read MoreFollow-up and Diagnose COVID-19 Using Deep Learning Technique
In recent days, the fast growth of populations leading to an increase in medically complicated cases, especially fast spread viral cases around the world. These phenomena increased demand on auto-diagnose systems to speed up the diagnosis process and reduce human contacts, especially for the COVID-19 pandemic using deep learning (DL). DL methods can successfully carry…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read MoreIron-doped Nickel Oxide Nanoparticles Synthesis and Analyzing Different Properties
This is a report describing the impact of calcination on the morphological and optical properties of nanoparticles Iron doped-nickel oxide. By synthetic precipitation, the technique makes use of it. Three samples have been calcined in different temperatures and were characterized by X-ray diffraction (XRD), Fourier transforms infrared spectroscopy (FTIR), UV spectroscopy, and scanning electron microscopy…
Read MoreDeep Deterministic Policy Gradients for Optimizing Simulated PoA Blockchain Networks Based on Healthcare Data Characteristics
Blockchain technology has proven to be the best solution for digital data storage today, which is decentralized and interconnected via cryptography. Many consensus algorithms can be options for implementation. One of them is the PoA consensus algorithm, which is proven to provide high performance and fault tolerance. Blockchain has been implemented in many sectors, including…
Read MoreModified Blockchain based Hardware Paradigm for Data Provenance in Academia
Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…
Read MoreAn Anonymity Preserving Framework for Associating Personally Identifying Information with a Digital Wallet
Growing adoption of cryptocurrencies by institutional investors coupled with recurring incidents of loss of access to digital wallets have resulted in emergence of custodial services for high net worth individuals and institutions. However, such services are not economically feasible for the wider community of crypto owners who are left with no recourse for recovery of…
Read MoreTime-to-Event Analysis for Recovery from Coronavirus Disease (COVID-19): A Case Study on Wuhan and Elsewhere in China from Jan 1 to Feb 11, 2020
COVID-19 is a viral disease that became a pandemic representing a very great challenge worldwide. The purpose of this article is to analyze COVID-19 patients’ data based on time- to-event analysis and identify the factors that affect the recovery time from COVID-19. The datasets that are used in this study are for cases that are…
Read MoreInvestigating the Optical Behavior of Single/Multi-Dimensional Photonic Crystal Structures for Photovoltaic Applications
The results investigated in this work are toward the optimization of the photonic crystal structures in 1D and 2D scale. One-dimensional distributed Bragg reflectors (DBRs) have demonstrated substantial potential in various optoelectronic applications, due to the observed tunable optical band-gap. Herein, the use of DBRs in light trapping solar cells was simulated and validated, representing…
Read MoreCognitive Cybernetics in the Foresight of Globalitarianism
This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…
Read MoreImproved System Based on ANFIS for Determining the Degree of Polymerization
Transformer health assessment techniques, based on applicable standards, such as the dissolved gas analysis (DGA), through laboratory testing or online monitoring are used to analyze the symptoms of a failure which develops in transformers from an early stage. The DGA from a sample of dielectric liquid taken from the main tank generates information on the…
Read MoreA Toolkit for the Automatic Analysis of Human Behavior in HCI Applications in the Wild
Nowadays, smartphones and laptops equipped with cameras have become an integral part of our daily lives. The pervasive use of cameras enables the collection of an enormous amount of data, which can be easily extracted through video images processing. This opens up the possibility of using technologies that until now had been restricted to laboratories,…
Read MoreQualitative Properties of a Cell Proliferating Model with Multi-phase Transition and Age Structure
In this paper we study a cell division cycle modeled by a system of partial differential equations with an age structure. This model translates the many regulatory mechanisms within the cell cycle where it introduces the notion of phases. The individual cell can be either in I phases where the transition between theses phases are…
Read MoreFeature Extractors Evaluation Based V-SLAM for Autonomous Vehicles
Visual Simultaneous Localization and Mapping known as V-SLAM, is an essential task for autonomous vehicles. It can be carried out using several sensors, in particular with on board cameras. To locate a vehicle, SLAM algorithms are based on two main tasks. The first task (front-end kernel) is intended to process images in order to provide…
Read MoreJohnson Noise and Optical Characteristics of Polymer Nanocomposites Based on Colloidal Quantum Dots and In-Situ Nanoparticles Formation
Electrical and optical properties of polymer nanocomposite thin films have been analyzed to study their reliability and competency as a component for optoelectronic devices such as LED and solar cells. Polymer nanocomposite encounters various challenges, such as the dispersion of nanoparticles in the matrix that hinders their efficiency for potential devices. In this paper, two…
Read MoreOffline Signature Recognition and Verification Using ORB Key Point Matching Techniques
An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…
Read MoreMonte Carlo Estimation of Dose in Heterogeneous Phantom Around 6MV Medical Linear Accelerator
In this work, we completed a validation of the Varian Clinac IX equipped with the High Definition Multi-Leaf Collimator (HD 120 MLC) instead of the removable jaws, using GATE Monte Carlo Platform version 8.2. We validated the multileaf collimator (MLC) geometry by simulating two dosimetric functions (Percentage Depth Dose (PDD) and Dose Profile (DP)), for…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read More
