Results (552)
Search Parameters:
Keyword: ISIPixel-Based Unsupervised Classification Approach for Information Detection on Optical Markup Recognition Sheet
This paper proposed an Optical Markup Recognition (OMR) system to be used to detect shaded options of students after MCQ-type examinations. The designed system employed the pixel-based unsupervised classification approach with image pre-processing strategies and compared its efficiencies, in terms of speed and accuracy, with object-based supervised or unsupervised classification OMR systems. Speed and accuracy…
Read MoreCompact wireless control network protocol with fast path switching
Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER), such as wireless control networks, often adopt time division multiple access (TDMA). However, it is difficult to add or adjust functions in protocol stacks that use TDMA…
Read MoreA Category Based Threat Evaluation Model Using Platform Kinematics Data
Command and control (C2) systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to…
Read MoreContent Reordering Based on Mouse-tracking for Web Applications
Rising usage of web applications in every aspect of life has created intense need of enhancement of user experience and formation of intelligent web applications. This research work was conducted with a view to do so. This paper focuses on the reorganization of web application content based on user’s specific interests while browsing any web…
Read MorePublic transportation network design: a geospatial data-driven method
The paper explores an issue of efficient public transportation network design as a part of the urban developing process. Having data about everyday residents travelling inside of an urban area, we can consider this data as people’s requirements for the public transport system. We propose a novel method for initial public transportation network design based…
Read MoreTowards Deployment Strategies for Deception Systems
Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…
Read MoreEfficiency of Photovoltaic Maximum Power Point Tracking Controller Based on a Fuzzy Logic
This paper examines the efficiency of a fuzzy logic control (FLC) based maximum power point tracking (MPPT) of a photovoltaic (PV) system under variable climate conditions and connected load requirements. The PV system including a PV module BP SX150S, buck-boost DC-DC converter, MPPT, and a resistive load is modeled and simulated using Matlab/Simulink package. In…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read MoreIoT: Their Conveniences, Security Challenges and Possible Solutions
The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…
Read MoreA novel algorithm for detecting human circadian rhythms using a thoracic temperature sensor
Circadian rhythms undergo high perturbations due to cancer progression and worsening of metabolic diseases. This paper proposes an original method for detecting such perturbations using a novel thoracic temperature sensor. Such an infrared sensor records the skin temperature every five minutes, although some data might be missing. In this pilot study, five control subjects were…
Read MoreAutonomous Micro-Air-Vehicle Control Based on Visual Sensing for Odor Source Localization
In this paper, we propose a novel control method for autonomous-odor-source localization using visual and odor sensing by micro air vehicles (MAVs). Our method is based on biomimetics, which enable highly autonomous localization. Our method does not need any instruction signals, including even global positioning system (GPS) signals. An experimenter simply blows a whistle, and…
Read MoreRotary Cutting of Electrical Steel Laminations – A Contrast to Traditional Stamping
Rotary cutting of electrical steel laminations is a novel, promising alternative in the processing of electrical steel strip with enormous economical and technical potentials. This paper is an extension of work originally presented on the 6th International Electric Drives Production Conference (E|DPC) in Nuremberg, Germany 2016. The scope of this paper includes a theoretical description…
Read MoreA Microwave Reflectometer Prototype for Detection of Body Through the Rubble of Collapsed Buildings
There is a growing interest in using radio frequency in imaging for problem solving in situational awareness, surveillance, search and rescue operations, and screening for security. This has been fetched from recent development in addition to innovative technologies in microwave radar imaging applications. Despite the fact that no new phenomenology is exposed in this field,…
Read MoreSpatial Modulation Technique For Filtered-OFDM Based Wireless Transmission
In this paper, a spatial modulation (SM) which provides no synchronization between the transmitting antennas and avoids inter-channel interference (ICI) at the receiver input while maintaining high spectral efficiency is applied to filtered-orthogonal frequency division multiplexing (F-OFDM) transmission. The SM technique maps a block of information bits into two information carrying units, namely, a symbol…
Read MoreStructural Optimization of Wavy FinFET for Leakage Reduction and Performance Enhancement
Wavy FinFET is a hybrid device that integrates FinFET and Ultrathin Body FET technologies on SOI platform to provide high density and drivability without causing area penalty. The problem associated with this device is higher leakage and lower threshold voltage. This problem can be solved by structural modification of the device. This work analyses the…
Read MoreEEG Mind Controlled Smart Prosthetic Arm – A Comprehensive Study
Recently, the field of prosthetics has seen many accomplishments especially with the integration of technological advancements. In this paper, different arm types (robotic, surgical, bionic, prosthetic and static) are analyzed in terms of resistance, usage, flexibility, cost and potential. Most of these techniques have some problems; they are extremely expensive, hard to install and maintain…
Read MoreElectromagnetic Field and Lumped Circuit Analysis of Planar Transformer at Medium Frequency for Converter Application
High frequency planar transformer is a new type of transformer that operates at high frequency. Its significance is proved through its miniaturised features, high power density and other performances. The design of planar transformer needs to consider several fundamental factors, including core material, dimension of layers and winding pattern. As the volume decreases, extra attentions…
Read MoreVideo-frame Quality Improvement before Shot boundary Detection by using Logarithm, Wavelet and Contoulet Transform
Video shot boundary detection is important step for the research in the content analysis and retrieval fields. In this paper, firstly we presented an efficient method for Video-frame quality improvement to suppress flash occurred within video frame using logarithm, wavelet and contourlet transform. In addition, wavelet and contourlet transform also performed denoising. Secondly, for shot…
Read MoreAssessment of the heat sinking effect of a human hand that holds a flexible phototherapy device for use in Kangaroo Mother Care
The heat transfer process from a 6.4 Watt blue light flexible phototherapy mattress to a human hand has been studied. The intended use of the mattress is the provision of neonatal jaundice phototherapy during Kangaroo Mother Care (KMC) or skin-to-skin care. The heat transfer process has been studied with temperature and heat flow sensors inside…
Read MoreGNSS Positioning in Non-line-of-Sight Context—a Survey for Technological Innovation
Reliable, available and accurate localization of people and vehicles is one crucial requirement for intelligent transportation systems (ITSs). This has led to a variety of technical approaches in recent years. Towards an exact positioning via Global Navigation Satellite Systems (GNSSs) the visibility of satellites is an important factor. In this paper, we review the literature…
Read MoreSystem Control Device Electronics Smart Home Using Neural Networks
The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system…
Read MoreAnalysis of Learning Development With Sugeno Fuzzy Logic And Clustering
In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreSpatiotemporal Traffic State Prediction Based on Discriminatively Pre-trained Deep Neural Networks
The availability of traffic data and computational advances now make it possible to build data-driven models that capture the evolution of the state of traffic along modeled stretches of road. These models are used for short-time prediction so that transportation facilities can be operated in an efficient way that guarantees a high level of service.…
Read MoreAugmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment
The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…
Read More
