Results (1734)
Search Parameters:
Keyword: SinComparative Study of J48 Decision Tree and CART Algorithm for Liver Cancer Symptom Analysis Using Data from Carnegie Mellon University
Liver cancer is a major contributor to cancer-related mortality both in the United States and worldwide. A range of liver diseases, such as chronic liver disease, liver cirrhosis, hepatitis, and liver cancer, play a role in this statistic. Hepatitis, in particular, is the main culprit behind liver cancer. As a consequence, it is decisive to…
Read MoreEEG Feature Extraction based on Fast Fourier Transform and Wavelet Analysis for Classification of Mental Stress Levels using Machine Learning
Mental stress assessment remains riddled with biases caused by subjective reports and individual differences across societal backgrounds. To objectively determine the presence or absence of mental stress, there is a need to move away from the traditional subjective methods of self-report questionnaires and interviews. Previously, it has been evidence that EEG Oscillations can discriminate mental…
Read MoreControl Program Generator for Vehicle Robot using Grammatical Evolution
A robot development has spread widely for various purposes. It is difficult to create a control program for an autonomous mobile robot manually. Therefore, an automatic design of the control program for an autonomous mobile robot is proposed in this research. The autonomous mobile robot is created with LEGO MINDSTORMS EV3, and the control program…
Read MoreResonance Coil Design for a Novel Battery Cell Balancing with using Near-Field Coupling
In this paper, we delve into the pressing necessity for proficient battery cell balancing, an imperative in the context of the escalating adoption of renewable energy and electric vehicles. While traditional methodologies, including the passive technique, offer a straightforward and cost-effective solution, they compromise on efficiency. The active technique, though superior in efficiency, is hindered…
Read MoreModeling Control Agents in Social Media Networks Using Reinforcement Learning
Designing efficient control strategies for opinion dynamics is a challenging task. Understanding how individuals change their opinions in social networks is essential to countering malicious actors and fake news and mitigating their effect on the network. In many applications such as marketing design, product launches, etc., corporations often post curated news or feeds on social…
Read MoreLocalization of Impulsive Sound Source in ShallowWaters using a Selective Modal Analysis Algorithm
Passive remote monitoring applications of underwater signal processing in a shallow water environment are an impactful area of research for environmental and marine-life monitoring. The majority of the sound source localization techniques require carefully placed synchronized hydrophone arrays, which can be complicated and hard to maintain. In this paper, we utilized the modal dispersions of…
Read MoreForecasting Bitcoin Prices: An LSTM Deep-Learning Approach Using On-Chain Data
Over the past decade, Bitcoin’s unprecedented performance has underscored its po-sition as the premier asset class. Starting from an insignificant value and reaching an astounding high of around 65,000 U.S dollars in 2021 – all without a central con-trolling authority – Bitcoin’s trajectory is undoubtedly a historical feat. Its intangible nature, initially a subject of…
Read MoreA Numerical Study on The Change in Safety Factor (FOS) According to Slope Angle Change for The Establishment of Photovoltaic Facilities Using SRM (Strength Reduction Method)
As the significance of new and renewable energy is highlighted, land-based solar power generation has seen remarkable progress. This study utilizes the Strength Reduction Method in DIANA, a numerical analysis software, to assess the stability concerning various variables, such as slope angle, water level, water depth, and changes in material properties, with a focus on…
Read MorePhotoluminescence Properties of Eu(III) Complexes with Two Different Phosphine Oxide Structures and Their Potential uses in Micro-LEDs, Security, and Sensing Devices: A Review
In the field of micro-LED displays, there is strong demand for red phosphors with high photoluminescence intensity, high color purity, and small particle size. Here, we focus on Eu(III) complexes because they produce sharp photoluminescence spectra with high color purity and can be dissolved in polymer, enabling a reduction in particle size to the molecular…
Read MoreTunable Resistorless Phase Shifter Realization with a Single VDGA
This paper describes the design of a phase shifter with electrically adjustable parameters employing only one voltage differencing gain amplifier (VDGA) and one floating capacitor. This circuit requires no external resistors, resulting in a resistorless design and a low component count. The proposed circuit implements a first-order all-pass filter response with electronic control of its…
Read MoreHistoChain: Improving Consortium Blockchain Scalability using Historical Blockchains
Blockchain technology has been successfully applied in many fields for immutable and secure data storage. However, for applications with on-chain big data, blockchain scalability remains to be a main concern. In this paper, we propose a novel scalable storage scheme, called HistoChain, for a consortium blockchain network to manage blockchain data. We use a current…
Read MoreForecasting the Weather behind Pa Sak Jolasid Dam using Quantum Machine Learning
This paper extends the idea of creating a Quantum Machine Learning classifier and applying it to real weather data from the weather station behind the Pa Sak Jonlasit Dam. A systematic study of classical features and optimizers with different iterations of parametrized circuits is presented. The study of the weather behind the dam is based…
Read MoreNavigation Aid Device for Visually Impaired using Depth Camera
People with visual impairment face daily struggle of navigating through unfamiliar places. This problem mainly caused by their lack of spatial awareness, i.e., the ability to estimate the distance between themselves and their surroundings. In order for visually impaired people to navigate independently, an effective navigation aid is required. The proposed navigation aid device utilizes…
Read MoreMeasurement System for Evaluation of Radar Algorithms using Replication of Vital Sign Micro Movement and Dynamic Clutter
In this paper we present a measurement system that is able to evaluate radar algorithms for vital signs sensing applications. For such medical applications, it is crucial to develop robust and reliable algorithms that are tested in a laboratory environment. The presented measurement system generates reproducible vital sign micro movement and dynamic clutter using loudspeakers…
Read MoreAchieving a High Isolation for the Triple-band MIMO Antenna in 5G/ Wi-Fi 6 Applications using Symmetric Parasitic Structure
Recently, the Multiple-input multiple-output (MIMO) antennas have been used a lot and attracted many researchers in advanced high-speed wireless communication systems. MIMO antennas are an essential part not only in access points but also in end-user devices. This technology allows a significant increase in channel capacity, but also lead to a challenge of minimize mutual…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreChallenges Facing Solar Panel Energy Deployment within Qatari Homes and Businesses
Despite many factors conducive to renewable energy investment in Qatar (e.g., the fact that the state is a major gas exporter whose long-term prosperity depends on economic diversification), there is very low uptake of solar panel adoption among home and business owners. Major challenges implicitly face the deployment of solar and other renewables in Qatar,…
Read MoreNorthern Leaf Blight and Gray Leaf Spot Detection using Optimized YOLOv3
Corn is one of the most important agricultural products in the world. However, climate change greatly threatens corn yield, further increasing already prevalent diseases. Northern corn leaf blight (NLB) and Gray Leaf Spot are two major corn diseases with lesion symptoms that look very similar to each other, and can lead to devastating loss if…
Read MoreDesign, Optimization and Simulation of a New Decoder for Reed Solomon and BCH Codes using the New Syndromes Block
In this paper, a new syndrome block for Reed Solomon RS and BCH codes used respectively in digital Video broadcasting DVB-S and DVB-S2 has been presented in order to reduce the number of iterations compared to the existed block, which can be found in the literature, the new method is based on a factorization of…
Read MoreThe Security of Information Systems and Image Processing Supported by the Quantum Computer: A review
The knowledge and understanding of the technology of quantum computers and their superiority over classical computers are still insufficient or uncertain for many communities of researchers, manufacturers, investors and the general public. For this reason, we try in this article to present and explain some of the basic concepts of quantum computers. We explain how…
Read MoreBangla Speech Emotion Detection using Machine Learning Ensemble Methods
Emotion is the most important component of being human, and very essential for everyday activities, such as the interaction between people, decision making, and learning. In order to adapt to the COVID-19 pandemic situation, most of the academic institutions relied on online video conferencing platforms to continue educational activities. Due to low bandwidth in many…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read More
