Results (2107)
Search Parameters:
Keyword: ATECloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreInterpretable Rules Using Inductive Logic Programming Explaining Machine Learning Models: Case Study of Subclinical Mastitis Detection for Dairy Cows
With the development of Internet of Things technology and the widespread use of smart devices, artificial intelligence is now being applied as a decision-making tool in a variety of fields. To make machine learning models, including deep neural network models, more interpretable, various techniques have been proposed. In this paper, a method for explaining the…
Read MoreAn Interdisciplinary Approach to Fracture of Solids from the Standpoint of Condensed Matter Physics
Instead of approaches of solid mechanics or a formal description of experimental data an interdisciplinary approach is proposed to consider failure and deformation as thermodynamic processes. Mathematical modeling of the processes is carried out using rheological models of the material. One fracture criterion is used, that formally corresponds to the achievement of a threshold concentration…
Read MoreForensic Analysis of “WhatsApp” Artifacts in Android without Root
WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve…
Read MoreA Unified Visual Saliency Model for Automatic Image Description Generation for General and Medical Images
An enduring vision of Artificial Intelligence is to build robots that can recognize and learn the visual world and who can speak about it in natural language. Automatic image description generation is a demanding problem in Computer Vision and Natural Language Processing. The applications of image description generation systems are in biomedicine, military, commerce, digital…
Read MoreA Study on Novel Hand Hygiene Evaluation System using pix2pix
The novel coronavirus infection (COVID-19), which appeared at the end of 2019 has developed into a global pandemic with numerous deaths, and has also become a serious social concern. The most important and basic measure for preventing infection is hand hygiene. In this study, by photographing palm images of nursing students after hand-washing, using fluorescent…
Read MoreOnline Support for Tertiary Mathematics Students in a Blended Learning Environment
The context for the study was a naturally occurring quasi-experiment in the core mathematics program in a large Australian university. Delivery of teaching was changed in a sequence of two initial core mathematics subjects taken by engineering and science students. The change replaced one of two face-to-face tutorial classes per week by an online tutorial.…
Read MoreOn the Construction of Symmetries and Retaining Lifted Representations in Dynamic Probabilistic Relational Models
Our world is characterised by uncertainty and complex, relational structures that carry temporal information, yielding large dynamic probabilistic relational models at the centre of many applications. We consider an example from logistics in which the transportation of cargoes using vessels (objects) driven by the amount of supply and the potential to generate revenue (relational) changes…
Read MoreStability Analysis of a DC Microgrid with Constant Power Load
DC Microgrids (DCMGs) aggregate and integrate various distribution generation (DG) units through the use of power electronic converters (PECs) that are present on both the source side and the load side of the DCMGs. Tightly regulated PECs at the load side behave as constant power loads (CPLs) and may promote instability in the entire DCMG.…
Read MoreIT Project Management Models in an Era of Digital Transformation: A Study by Practice
In 1998 we were talking about an NTIC era, and since the years 2010, we are tracing the beginning of a new era of technological development, called the era of digital transformation. During this new era companies have started to run towards the digitalization of their processes, which represent a large part of the market,…
Read MoreEfficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage
Using Proofs of Retrievability (PORs), a file owner is able to check that a cloud server correctly stores her files. Using Proofs of Retrievability and Reliability (PORRs), she can even verify at the same time that the cloud server correctly stores both her original files and their replicas. In 2020, a new PORR combined with…
Read MorePower Management and Control of a Grid-Connected PV/Battery Hybrid Renewable Energy System
This paper presents novel Energy Management Strategies (EMSs), and the control of a Grid-Connected Hybrid Renewable Energy System (GCHRES). The GCHRES describes a Photovoltaic Generator (PVG) and a Battery-Based Storage System. Both are tied to the Common Coupling Point (CCP) through a reversible three-phase inverter. The CCP combines the Utility Grid (UG) and an AC…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreEstimation of Non-homogeneous Thermal Conductivity using Fourier Heat Equation Considering Uncertainty and Error Propagation
The present work develops an estimator for thermal conductivity using a simple exper- iment implemented in a simulated solid metallic bar. The bar is sectioned in a finite number of segments, lately called nodes, and a discretization of the Fourier heat equation is applied in each node to generate a timed-spaced model of the temperature…
Read MoreA Novel Algorithm Design for Locating Fault Distances on HV Transmission Lines
The transmission network has been considered among the globe’s prevalent complex systems, comprised of hundreds of electrical transmission lines and other equipment used to transmit electrical energy from one location to another. Over a decade, power engineers have worked tirelessly to ensure that the transmission network operates reliably, transmitting electrical energy from the power station…
Read MoreThermoelectric Generators (TEGs) and Thermoelectric Coolers (TECs) Modeling and Optimal Operation Points Investigation
Sustainable energy is gradually becoming the norm today due to greenhouse warming effects; as a result, the quests for different renewable energy sources such as photovoltaic cells as well as energy efficient electrical appliances are becoming popular. Therefore, this article explores the alternative energy case for thermoelectricity with focus on the steady-state mathematics, mixed modelings…
Read MoreEthical Implications and Challenges in using Social Media: A Comprehensive Study
The technological revolution penetrates every aspect of our dailylives; it changed our lives in different fields such as communication, decision-making, information access and work environment. These changes have benefits, but they also have costs. These costs include many ethical and social problems that need more investigation. The human element is the most affected part of…
Read MorePhysics behind the Concept of a Sodium-Potassium-Cesium-Cooled Martian Nuclear Reactor
The main goal of the work is to determine the basic conceptual solutions of a nuclear reactor operating on the surface of another planet. The problem was solved using the example of the Martian nuclear power plant. The article uses calculation and optimization research methods and corresponding program codes (well-known and author’s). The results of…
Read MoreValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreSpatio-Temporal Analysis of Drought over the Guinean-Sudano Ecological Zone, Northern Nigeria
Drought has become more common and severe in recent decades due to increased global changes in climatic conditions and anthropogenic activities thereby analyzing drought at both regional and local levels is crucial. And so, this study aims at assessing drought risk in Northern Nigeria using NDVI and SPI. Data used included satellite images (Landsat OLI-TIRS,…
Read MoreVideo Risk Detection and Localization using Bidirectional LSTM Autoencoder and Faster R-CNN
This work proposes a new unsupervised learning approach to detect and locate the risks “abnormal event” in video scenes using Faster R-CNN and Bidirectional LSTM autoencoder. The approach proposed in this work is carried out in two steps: In the first step, we used a bidirectional LSTM autoencoder to detect the frames containing risks. In…
Read MoreAnalysis of Reading Time and the Number of Characters within One Gazing Point
Concomitant with the ubiquity of lightweight electronic terminals, such as smartphones and tablets, e-books have increased in popularity. However, studies have shown that their display method and information-presentation efficiency need improvement. We investigated visual information processing during reading to develop a more efficient display method that presents information in an easier to see fashion than…
Read MoreStudy and Implementation of LEDs Drivers with Dimming Capability
Nowadays, LED lights take an important place in our daily lives and they have known a great growth in indoor as well as in outdoor lighting applications. LED (Light Emitting Diode) light sources including their own drivers have excluded many systems fitted with both inefficient light sources. In this paper we present, a LED driver…
Read More
