Results (551)
Search Parameters:
Keyword: REMA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreFault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter
The paper describes the results of the system analysis of various options of electric inverter topologies for the use in the traction drive of an electrical helicopter. The paper explains the optimal choice, in terms of the design requirements and future operational conditions, and the type and topology of the electric inverter to supply the…
Read MoreAdaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems
In this paper, we propose an adaptive discrete-time fuzzy sliding mode control for a class of chaotic systems. For this aim, a discrete sliding mode controller and a fuzzy system are combined to achieve an adequate control. The Laypunov stability theorem is used to testify the asymptotic stability of the whole system and the consequence…
Read MoreL-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits
L-band SiGe HBT active differential equalizers with variable, positive or negative gain slopes have been designed and fabricated for frequency and temperature compensation of microwave and optical systems. The active equalizer employs dual-resonant RLC circuits in the series feedback path of the differential amplifier for positive gain slopes or in the load for negative gain…
Read MoreAn Overview of Traceability: Towards a general multi-domain model
Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…
Read MoreThe Model of Adaptive Learning Objects for virtual environments instanced by the competencies
This article presents the instantiation of the Model of Adaptation of Learning Objects (MALO) developed in previous works, using the competencies to be developed in a given educational context. MALO has been developed for virtual environments based on an extension of the LOM standard. The model specifies modularly and independently two categories of rules, of…
Read MoreEnergy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks
In this paper, we exploit an integration between Compressive sensing (CS) and the random mobility of sensors in distributed mobile sensor networks (MSNs). A small number of distributed mobile sensors are deployed randomly in a sensing area to observe a large number of positions. The distributed mobile sensors sparsely sample the sensing area for data…
Read MoreDevelopment and Validation of a Heat Pump System Model Using Artificial Neural Network
Modeling of direct expansion (DX) air conditioning and heat pump systems can be necessary in developing energy saving methods required to reduce energy consumption in buildings. The artificial neural networks (ANN) can be simple and reliable as compared to traditional methods. A properly trained artificial neural network can provide accurate results, while being relatively straightforward…
Read MoreOptimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters
This paper presents the synthesis of a dynamic space vector modulation for power matrix converters so that it is possible to implement a universal modulator that provides a control algorithm dynamically optimized according to the requirements for the matrix converter.
Read MorePaper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language
Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a rule based extraction method of Arabic text to solve some weaknesses founded on previous research works. Our approach is divided on preprocessing phase, on which we proceed to the tokenization of the text, and formatting it…
Read MoreChannel Inversion Schemes with Compensation Network for Two-Element Compact Array in Multi-User MIMO
In this paper, we investigate the performance of channel inversion schemes for interference cancellation with compensation network in multi-user MIMO broadcasting channel. To achieve good performance, mutual coupling between two-element compact arrays is characterized by the receiving mutual impedance method (RMIM) to formulate the compensation network-operating matrix. A prototype of two-element compensation network with an…
Read MoreAviation Navigation with Use of Polarimetric Technologies
The article deals with the problem of increasing the accuracy of determination of aircraft’s navigation flight parameters. Increasing the accuracy and sensitivity of navigation parameters determination will improve the efficiency of air conveyance by optimizing the flight trajectories and reducing the flight time and simultaneously will ensure the sufficient level of air conveyance safety. The…
Read MoreLow Probability of Interception Beampattern Using Frequency Diverse Array Antenna
Frequency diverse array (FDA) antenna employs a small frequency increment, as compared with the carrier frequency, across antenna array elements. The use of a frequency increment generates an array factor that is dependent on angle, time, and the range and this yields a range and angle dependent beampattern. In this paper, a transmit array beamforming…
Read MoreApplications of Case Based Organizational Memory Supported by the PAbMM Architecture
In the aim to manage and retrieve the organizational knowledge, in the last years numerous proposals of models and tools for knowledge management and knowledge representation have arisen. However, most of them store knowledge in a non-structured or semi-structured way, hindering the semantic and automatic processing of this knowledge. In this paper we present a…
Read MoreTransmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets
Frequency diverse array (FDA) employs a small frequency increment across its array elements to provide range, angle and time dependent beampattern. In most radar systems, FDA with linear frequency offsets have been employed. But, its transmit beampattern is coupled in range and angle dimensions, which may degrade the output signal-to-interference-plus-noise ratio performance. Note that nonlinear…
Read MoreA Clinical Review of Zika Virus (ZIKAV)
Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…
Read MoreEfficient Resource Management for Uplink Scheduling in IEEE 802.16e Standard
The IEEE 802.16e standard, known as mobile Worldwide Interoperability for Microwave Access (WiMAX) becomes the most demanding broadband wireless access (BWA) technology recently. Its main advantage is rapid delivery of services in remote areas due to the cost efficiency factor. The base station (BS) supports data rate up to 70 Mbps, mobile stations with 5–15…
Read MoreWireless Android Based Home Automation System
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…
Read MoreRecent Trends in ELM and MLELM: A review
Extreme Learning Machine (ELM) is a high effective learning algorithm for the single hidden layer feed forward neural networks. Compared with the existing neural network learning algorithm it solves the slow training speed and over-fitting problems. It has been used in different fields and applications such as biomedical engineering, computer vision, remote sensing, chemical process…
Read MoreA Novel Approach for Designing Mobile Native Apps
Mobile devices are differed from desktop based systems in terms of particular execution environment, constrained resources, and high mobility requirement. To overcome these shortcomings, various agile based methodologies are developed for native mobile applications such as Mobile-D, Scrum etc. These agile techniques are based on various phases and these phases begin from exploring, initializing and…
Read MoreA Web-Based Decision Support System for Evaluating Soil Suitability for Cassava Cultivation
Precision agriculture in recent times had assumed a different dimension in order to improve on the poor standard of agriculture. Similarly, the upsurge in technological advancement, most especially in the aspect of machine learning and artificial intelligence, is a promising trend towards a positive solution to this problem. Therefore, this research work presents a decision…
Read MoreSystem Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate
Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…
Read MoreARM based Bidirectional Visitor Counter and Automatic Room Light Controller using PIR sensors
With the advancement of technology intelligent devices are fast approaching the realm of necessity from the status of luxury. With limited energy resources, it is the need of time to revolutionize the traditional methods of counting visitors inside hotels, recreational places, meeting rooms and cinemas to control the electrical appliances. Moreover, the improved living standards…
Read MoreAn Application of ANN Model with Bayesian Regularization Learning Algorithm for Computing the Operating Frequency of C-Shaped Patch Antennas
In this paper, an application of artificial neural network (ANN) using bayesian regularization (BR) learning algorithm based on multilayer perceptron (MLP) model is presented for computing the operating frequency of C-shaped patch antennas (CPAs) in UHF band. Firstly, the operating frequencies of 144 CPAs having varied dimensions and electrical parameters were simulated by the XFDTD…
Read MoreAn Efficient Approach of Load Shifting by Using SCADA
The consumption of electric power has increased significantly in the past few years, and its demand is still increasing every day. In this regard, its proper distribution is a significant challenge. This paper includes a method not only to improve the existing power distribution by using SCADA but also to reduce the human errors from…
Read More
