Results (1736)
Search Parameters:
Keyword: SinA Constrained Intelligent Nonlinear Control Method for Redundant Robotic Manipulators
Redundant robotic systems provide great challenges in solving kinematics and control problems, that are yet also open opportunities for exploring new, diverse and intelligent ideas and methods. In this paper, an advanced control method is proposed for position control problems of redundant robots with output constraints. The controller is structured with two control layers. In…
Read MoreNiO Quantum dots Doped Triple Cation Perovskite \(\mathrm{CsMAFAPbI_2Br_2}\) Heterojunction Photodetector with High Responsivity
Optoelectronic devices applications based on Organic–inorganic perovskites are promising and effective low-cost energy materials due to their exceptional physical properties which include high carrier mobility, high optical absorption coefficient, and long carrier diffusion length. In the presented work, a TiO2/NiO+5% Fe quantum dots (QDs)–doped CsMAFAPbI2Br2 perovskite heterojunction broadband photodetector was fabricated on FTO/glass substrate. The…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MorePhysical and Emission Properties of Blended Bio-Coal Briquettes Derived from Agro-Wastes in Nigeria
Nigeria has one of the highest deforestation rates in the world, due mainly to felling of trees for fuelwood and charcoal production. This challenge could be managed if agricultural waste briquettes are used to augment the fuelwood demand for cooking energy provisioning. Energy density of biomass fuels can be raised by blending with coal, but…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreA CMOS On-Chip High-Precision PVTL Detector
A novel PVTL (Process, Voltage, Temperature, Leakage) detection circuit consisting of four individual detectors is proposed in the investigation. Voltage Variation Detector is composed of a feedback control block comprising multi-stage delay cells using high Vth devices such that 0.5% of VDD variation can be detected. Temperature Detector based on a current to pulse converter…
Read MoreHigh Performance SqueezeNext: Real time deployment on Bluebox 2.0 by NXP
DNN implementation and deployment is quite a challenge within a resource constrained environment on real-time embedded platforms. To attain the goal of DNN tailor made architecture deployment on a real-time embedded platform with limited hardware resources (low computational and memory resources) in comparison to a CPU or GPU based system, High Performance SqueezeNext (HPS) architecture…
Read MoreGeneralized Linear Model for Predicting the Credit Card Default Payment Risk
Predicting the credit card default is important to the bank and other lenders. The credit default risk directly affects the interest charged to the borrower and the business decision of the lenders. However, very little research about this problem used the Generalized Linear Model (GLM). In this paper, we apply the GLM to predict the…
Read MoreEffectiveness of Gamified Instructional Media to Improve Critical and Creative Thinking Skills in Science Class
Gamified Instructional Media has recently been widely used in the education sector to improve students’ abilities. Using Gamified Instructional Media at the elementary school level becomes more interesting because it is in accordance with the way children learn K1-K6. The research aims to identify the gamified instructional using Genially to improve students’ critical and creative…
Read MoreTowards a Model-based and Variant-oriented Development of a System of Systems
The development of an aggregated system consisting of autonomously developed components is usually implemented as a self-contained unit. If such an aggregation is understood as a system of systems (SoS) that communicates via interfaces with its autonomous subsystems and components, the interfaces and communication exchange should play a central role in the architectural design. In…
Read MoreMethodology for Calculating Shock Loads on the Human Foot
The leading place among diseases of the musculoskeletal system is occupied by various feet deformations. Clinical movement analysis and posturological examination are required to objectively assess the distribution for load caused by the weight of human body on the feet and its locomotion effect. In normal conditions, the foot is exposed to elastic deformations. When…
Read MoreTowards a Framework for Organizational Transformation through Strategic Design Implementation
The aim of the research is to contribute to the emergent field of strategic design as an approach to creating transformational impacts in organizations. This is driven by international strategies to promote sustainable business environments which are innovative and adaptive to change. The literature identifies a gap in the knowledge in relation to how knowledge…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreAn Interdisciplinary Approach to Fracture of Solids from the Standpoint of Condensed Matter Physics
Instead of approaches of solid mechanics or a formal description of experimental data an interdisciplinary approach is proposed to consider failure and deformation as thermodynamic processes. Mathematical modeling of the processes is carried out using rheological models of the material. One fracture criterion is used, that formally corresponds to the achievement of a threshold concentration…
Read MoreA Unified Visual Saliency Model for Automatic Image Description Generation for General and Medical Images
An enduring vision of Artificial Intelligence is to build robots that can recognize and learn the visual world and who can speak about it in natural language. Automatic image description generation is a demanding problem in Computer Vision and Natural Language Processing. The applications of image description generation systems are in biomedicine, military, commerce, digital…
Read MoreOnline Support for Tertiary Mathematics Students in a Blended Learning Environment
The context for the study was a naturally occurring quasi-experiment in the core mathematics program in a large Australian university. Delivery of teaching was changed in a sequence of two initial core mathematics subjects taken by engineering and science students. The change replaced one of two face-to-face tutorial classes per week by an online tutorial.…
Read MoreOn the Construction of Symmetries and Retaining Lifted Representations in Dynamic Probabilistic Relational Models
Our world is characterised by uncertainty and complex, relational structures that carry temporal information, yielding large dynamic probabilistic relational models at the centre of many applications. We consider an example from logistics in which the transportation of cargoes using vessels (objects) driven by the amount of supply and the potential to generate revenue (relational) changes…
Read MoreStability Analysis of a DC Microgrid with Constant Power Load
DC Microgrids (DCMGs) aggregate and integrate various distribution generation (DG) units through the use of power electronic converters (PECs) that are present on both the source side and the load side of the DCMGs. Tightly regulated PECs at the load side behave as constant power loads (CPLs) and may promote instability in the entire DCMG.…
Read MoreIT Project Management Models in an Era of Digital Transformation: A Study by Practice
In 1998 we were talking about an NTIC era, and since the years 2010, we are tracing the beginning of a new era of technological development, called the era of digital transformation. During this new era companies have started to run towards the digitalization of their processes, which represent a large part of the market,…
Read MoreEfficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage
Using Proofs of Retrievability (PORs), a file owner is able to check that a cloud server correctly stores her files. Using Proofs of Retrievability and Reliability (PORRs), she can even verify at the same time that the cloud server correctly stores both her original files and their replicas. In 2020, a new PORR combined with…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreOptimization of the Sliding Mode Control (SMC) with the Particle Swarm Optimization (PSO) Algorithm for Photovoltaic Systems Based on MPPT
Photovoltaic systems are classified as non-linear systems. On the other hand, the characteristics of photovoltaic cells are non-linear. For this reason, researchers use several methods of maximum power monitoring (MPPT) to improve the performance of photovoltaic system. It is therefore necessary to use an adaptation stage between the photovoltaic generator (GPV) and the load to…
Read MoreA Novel Algorithm Design for Locating Fault Distances on HV Transmission Lines
The transmission network has been considered among the globe’s prevalent complex systems, comprised of hundreds of electrical transmission lines and other equipment used to transmit electrical energy from one location to another. Over a decade, power engineers have worked tirelessly to ensure that the transmission network operates reliably, transmitting electrical energy from the power station…
Read More
