Results (2107)
Search Parameters:
Keyword: ATEActive Simulation of Grounded Parallel-Type Immittance Functions Employing VDBAs and All Grounded Passive Components
This communication proposes a grounded immittance function simulator that, depending on the proper choice of the passive components, can simulate parallel-type impedances of the R-L, R-C, and L-C forms. Only two grounded passive components and two voltage differencing buffered amplifiers (VDBAs) are used to implement the suggested circuit. All three simulated equivalent elements, namely Req,…
Read MoreNorthern Leaf Blight and Gray Leaf Spot Detection using Optimized YOLOv3
Corn is one of the most important agricultural products in the world. However, climate change greatly threatens corn yield, further increasing already prevalent diseases. Northern corn leaf blight (NLB) and Gray Leaf Spot are two major corn diseases with lesion symptoms that look very similar to each other, and can lead to devastating loss if…
Read MoreMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read MoreDismantle Shilling Attacks in Recommendations Systems
Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…
Read MorePrototype to Identify the Capacity in Cybersecurity Management for a Public Organization
Public organizations are subjected to a complex security situation, which can be addressed by permanently strengthening and evaluating their cybersecurity capabilities. The objective of this research is to develop a model to identify the cybersecurity management capacity of public organizations. The deductive method was applied for the review and analysis of criteria, factors and variables…
Read MoreConception and Simulation of an Electronic Nose Prototype for Olfactory Acquisition
The “Electronic Nose” approach, which is exclusive to gas measurement systems, uses gas sensors as odor detectors. Design faults exist in the existing electronic nose (e-nose) chamber, such as its large volume, difficult construction, etc. In order to obtain measurements in a satisfactory state, we want to create a gas chamber that can provide favorable…
Read MoreDesign, Optimization and Simulation of a New Decoder for Reed Solomon and BCH Codes using the New Syndromes Block
In this paper, a new syndrome block for Reed Solomon RS and BCH codes used respectively in digital Video broadcasting DVB-S and DVB-S2 has been presented in order to reduce the number of iterations compared to the existed block, which can be found in the literature, the new method is based on a factorization of…
Read MoreAn Ensemble of Voting- based Deep Learning Models with Regularization Functions for Sleep Stage Classification
Sleep stage performs a vital role in people’s daily lives in the detection of sleep-related diseases. Conventional automated sleep stage classifier models are not efficient due to the complexity linked to the design of mathematical models and extraction of hand-engineering features. Further, quick oscillations amongst sleep stages frequently lead to indistinct feature extraction, which might…
Read MoreOn the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor
In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreNonlinear Model Predictive Control of Rover Robotics System
The paper presents two robust and efficient control algorithms based on (i) Optimal Control Allocation (OCA) and (ii) Nonlinear Model Predictive Control (NMPC). The robotics system consists of two rovers with mecanum wheels and mounted two 7-DOF arms carrying a common load. The overall system is an underdetermined one with non-holonomic constraints. The developed control…
Read MoreAnalysis and Trend Estimation of Rainfall and Seasonality Index for Marathwada Region
Droughts are undesirable and highly unwanted form of disasters. It is essential to analyse the cause of such extreme events and act accordingly to pave the way for a sustainable future. The present research work conducts a seasonality and trend analysis of rainfall over the eight districts of Marathwada region. The study is carried out…
Read MoreDesign of an Open Source Anthropomorphic Robotic Hand for Telepresence Robot
Most anthropomorphic robotic hands use a lot of actuators to imitate the number of joints and the movement of the human hand. As a result, the forearm of the robot hand has a large size for the installation of all actuators. This robot hand is designed to reduce the number of actuators, but also retain…
Read MoreMeta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers
The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…
Read MoreTechnical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems
In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…
Read MoreMobility Intelligence: Machine Learning Methods for Received Signal Strength Indicator-based Passive Outdoor Localization
Knowledge of pedestrian and vehicle movement patterns can provide valuable insights for city planning. Such knowledge can be acquired via passive outdoor localization of WiFi-enabled devices using measurements of Received Signal Strength Indicator (RSSI) from WiFi probe requests. In this paper, which is an extension of the work initially presented in WiMob 2021, we continue…
Read MoreOptimizing Sensors Locations for Tsunami Warning System
To reduce the time necessary for determination of tsunami source parameters it is proposed to optimize the location of sensors system and to use only a part of the measured wave profile. Based on computation, it is possible to balance the number of sensors in use and the time period after the earthquake needed to…
Read MoreInterference-Aware Nodes Deployment of a LoRa-Based Architecture for Smart Agriculture in the Southern Region of Senegal
In Senegal, agriculture has always been seen as the foundation on which the socioeconomic development of the country rests. However, in the rural world, agriculture remains traditional at a time when the challenges of food self-sufficiency to accompany emergence are launched. In the southern part of Senegal commonly called Casamance, the abundance of rain makes…
Read MoreConsideration of Ambiguity in the Analysis Phase of Data Warehouses
We are interested in taking into account ambiguity in the analysis phase of data warehouses, using fuzzy logic. We want to offer decision makers the possibility of using natural language in this phase. We created in a previous work the Baccalaureate fuzzy data warehouse which we were able to query with seven natural language terms…
Read MoreDesign and Analysis of a Virtual Synchronous Generator Control Scheme to Augment FRT Capability of PMSG-Based Wind Turbine
Massive integration of inverter dominated renewable energy systems (RESs), i.e., wind turbines (WTs), reduces the reliance on conventional alternator-based power stations. The system inertia and damping aspects of the power system were significantly decreased by this extensive integration of inverter-based WT system, which impacts on the fault ride-through (FRT) competence and thus precipitates the frequency…
Read MoreOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read MoreEmerging Trends in Green Best Practices and the Impact on Government Policy
While it is commonly accepted that climate change needs to be addressed to protect both human and environmental health, it is not widely understood what steps need to be taken to accomplish this daunting task. Additionally, there is currently no formal definition of what constitutes a ‘green’ company or ‘green’ best practice, despite the rising…
Read MoreEstimating Subjective Appetite based on Cerebral Blood Flow
This study aims to develop and validate a biological food preference task that simultaneously evaluates biological responses to visual stimuli of various food states and subjective evaluations of foods and to examine how these biological responses are related to food preference behavior. We recruited seventeen healthy male and female subjects to observe changes in cerebral…
Read MoreBirds Images Prediction with Watson Visual Recognition Services from IBM-Cloud and Conventional Neural Network
Bird watchers and people obsessed with raising and taming birds make a kind of motivation about our subject. It consists of the creation of an Android application called ”Birds Images Predictor” which helps users to recognize nearly 210 endemic bird species in the world. The proposed solution compares the performance of the python script, which…
Read MoreA Structuration View of the South African National Health Insurance Readiness
The South African government has embarked on the implementation of the National Health Insurance (NHI), to increase access to healthcare and improve service delivery. However, the project has being encountering various challenges, which are not empirically known. The aim of the study is to identify the factors that influence the implementation of the NHI from…
Read More
