Results (1736)
Search Parameters:
Keyword: SinFault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor
This paper focuses on studying the problem of fault tolerant control (FTC), including a detailed fault detection and diagnosis (FDD) module using observer banks which consists of output and unknown input observers applied to a continuous stirred tank reactor (CSTR). The main objective of this paper is to use a FDD module here proposed to…
Read MoreSingular Integral Equations in Electromagnetic Waves Reflection Modeling
The processes of reflection of three-dimensional electromagnetic waves by locally irregular media interfaces are investigated. The problem under study is mathematically reduced to the solution of a boundary value problem for the Maxwell equations in an infinite space with an irregular boundary. In order to develop a numerical algorithm, the potential theory and a special…
Read MoreOptimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations
A new architecture of multi-standard transmitter that combines single and double frequency conversion is presented. The transmitter is able to generate waveforms of different cellular standards (GSM, UMTS, Wimax), LAN standards (Bluetooth, Zigbee, IEEE802.11 b/g) and Radio navigation standards (GPS, Galileo) as well. Depending on the selected standard and frequency, the transmitter routes the intermediate…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreLow Probability of Interception Beampattern Using Frequency Diverse Array Antenna
Frequency diverse array (FDA) antenna employs a small frequency increment, as compared with the carrier frequency, across antenna array elements. The use of a frequency increment generates an array factor that is dependent on angle, time, and the range and this yields a range and angle dependent beampattern. In this paper, a transmit array beamforming…
Read MoreDetection of Vandalism in Wikipedia using Metadata Features – Implementation in Simple English and Albanian sections
In this paper, we evaluate a list of classifiers in order to use them in the detection of vandalism by focusing on metadata features. Our work is focused on two low resource data sets (Simple English and Albanian) from Wikipedia. The aim of this research is to prove that this form of vandalism detection applied…
Read MoreProposal of a congestion control technique in LAN networks using an econometric model ARIMA
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read MoreUsing Naming Patterns for Identifying Architectural Technical Debt
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read MoreHow Effective is Using Lip Movement for Japanese Utterance Training
Lip movements have long been the subject of research. There are many methods of lip movement recognition, such as the calculation of the amount of movement compared to a matching face pattern. In a previous study, we investigated utterance recognition based on the power spectrum by focusing on lip movements, which is one aspect of…
Read MoreMIMO Performance and Decoupling Network: Analysis of Uniform Rectangular array Using Correlated-Based Stochastic Models
We explore the dependency of MIMO performance on azimuthal spread (AS) and elevation spread (ES) using correlated-based stochastic models (CBSMs). We represent the transmitter as uniform rectangular array (URA), and derive an analytical function for spatial correlation, in terms of maximum power when phase gradient of the incident wave follows a Student’s t-distribution. We model…
Read MoreOptimized Multi-focus Image Fusion Using Genetic Algorithm
Optical imaging systems or cameras have a convex lens with limited depth of field. So, multi-focus images are obtained when such systems are used to capture an image of a particular scene. These images are fused to get all-in-focus image. This paper proposes a new simpler method of multi-focus image fusion. Instead of decomposing input…
Read MoreFenceBook a Geofencing based Advertisements Application Using Android
Geo-fencing (geofencing) is a great feature in a software program that uses Global Positioning System (GPS) or radio frequency identification (RFID) to define the geographical boundaries feature. Actually geofence is a virtual barrier. Geofencing is an innovative technology, an online marketplace for proactive contextual services that allows users to easily find interesting services, can easily…
Read MoreRepresentation of Clinical Information in Outpatient Oncology for Prognosis Using Regression
The determination of length of survival, or prognosis, is often viewed through statistical hazard models or with respect to a future reference time point in a classification approach (e.g., survival after 2 or 5 years). In this research, regression was used to determine a patient’s prognosis. Also, multiple behavioral representations of clinical data, including difference…
Read MoreARM based Bidirectional Visitor Counter and Automatic Room Light Controller using PIR sensors
With the advancement of technology intelligent devices are fast approaching the realm of necessity from the status of luxury. With limited energy resources, it is the need of time to revolutionize the traditional methods of counting visitors inside hotels, recreational places, meeting rooms and cinemas to control the electrical appliances. Moreover, the improved living standards…
Read More10 Gbps Full Duplex Cost Effective Architecture GPON Network with Single Fiber
In this paper, a full duplex Gigabit Passive Optical Network (GPON) architecture supporting 10Gbps data transmission through single fiber cable network is proposed and demonstrated. A Non Return to Zero Differential Phase Shift Keying (NRZ-DPSK) is utilized for downstream and re-modulate the downstream signal using intensity modulator (on-off keying OOK) in Return to Zero (RZ)…
Read MoreTemperature Trend Detection in Upper Indus Basin by Using Mann-Kendall Test
Global warming and Climate change are commonly acknowledged as the most noteworthy environmental quandary the world is undergoing today. Contemporary studies have revealed that the Earth’s surface air temperature has augmented by 0.6°C – 0.8°C in the course of the 20th century, together with alterations in the hydrological cycle. This study focuses on detecting trends in…
Read MoreAn Efficient Approach of Load Shifting by Using SCADA
The consumption of electric power has increased significantly in the past few years, and its demand is still increasing every day. In this regard, its proper distribution is a significant challenge. This paper includes a method not only to improve the existing power distribution by using SCADA but also to reduce the human errors from…
Read MoreHybrid Feature Selection for Anomaly Detection in IoT Network Intrusion Detection Systems
The rapid growth of Internet of things (IoT) devices have heightened the need for effective Intrusion Detection System (IDS) to combat evolving cyber threats. The IoT networks has the security challenges due to the heterogeneous and high-dimensional nature of network traffic data, redundant features, and class imbalance which hinder detection accuracy and efficiency. Effective IDS…
Read MoreGC4miRNA - a Pipeline for Examining Impact of GC Content in miRNA Seed Sequences on Expression in Tumor Samples
MicroRNAs (miRNAs) are small RNA molecules that play a crucial role in regulating gene expression by binding to and degrading targeted mRNAs. miRNAs targeting a specific mRNA have a region known as the “seed sequence”, which typically has a high affinity for its complementary sequence in the targeted mRNA. Single Nucleotide Polymorphisms (SNPs) are mutations…
Read MoreInvestigating the Influence Biomass Additive on the Thermal Performance of a Fired-Clay for Producing the Inner Liner of a Biomass Cook-Stove
This study investigated the influence of a biomass additive on the thermal performance of the inner liner of fired-clay cook-stoves. Fired-clay cook-stoves are essential cooking devices, particularly in areas with limited access to modern energy resources. The study aimed to enhance the thermal efficiency of the cook-stoves by incorporating rice husk into the inner liner…
Read MoreMulti Attribute Stratified Sampling: An Automated Framework for Privacy-Preserving Healthcare Data Publishing with Multiple Sensitive Attributes
The accumulation and analysis of large-scale patient data have led to breakthrough discoveries in potential flags for diseases based on pattern recognition, highlight medication efficacy, and local population health trends that would be impossible with traditional paper-based records. However, these benefits come with unique challenges posed by the application of data sharing for research and…
Read MoreDetection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase
Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…
Read MoreDesign and Electronic Interfacing of FR4 and Polyimide PCB-based Electromagnetic Resonating Micro-mirrors
This paper presents the design and fabrication of an electromagnetically actuated PCB-based resonating scanning micro-mirror for LiDAR applications, with optimization targeted towards low-cost fabrication and a high scanning angle. Traditional silicon MEMS-based micro-mirrors, while offering high precision and compatibility with CMOS processing, are limited by fragility at low scanning frequencies and costly fabrication processes. To…
Read MoreA Multi-class Acoustic Dataset and Interactive Tool for Analyzing Drone Signatures in Real-World Environments
The rapid proliferation of drones across various industries has introduced significant challenges related to privacy, security, and noise pollution. Current drone detection systems, primarily based on visual and radar technologies, face limitations under certain conditions, highlighting the need for effective acoustic-based detection methods. This paper presents a unique and comprehensive dataset of drone acoustic signatures,…
Read MorePerfVis+: From Timestamps to Insight through Integration of Visual and Statistical Analysis
Complex networked systems provide a cornucopia of network statistics, many of which relate to the temporal behaviour of subsystems, devices, or even individual protocol layers. Different and flexible visualizations can play a crucial role in discovering and making patterns, relations, and trends tangible. We developed PerfVis, a tool that visualizes timestamp data to aid in…
Read More
