Results (1602)
Search Parameters:
Keyword: AppPower Converters and EMS for Fuel Cells CCHP Applications: A Structural and Extended Review
Fuel Cells (FCs) and Combined Cooling, Heating and Power (CCHP) systems are becoming very popular due to their environmental friendliness and immense applications. This extended review paper commenced by introducing the rampant South Africa’s electricity crisis as the basis for the study, followed by some structural analyses of up to forty-four miscellaneous power electronics converters…
Read MoreDetection and Counting of Fruit Trees from RGB UAV Images by Convolutional Neural Networks Approach
The use of Unmanned Aerial Vehicle (UAV) can contribute to find solutions and add value to several agricultural problems, favoring thus productivity, better quality control processes and flexible farm management. In addition, the strategies that allow the acquisition and analysis of data from agricultural environments can help optimize current practices such as crop counting. The…
Read MoreApplication-Programming Interface (API) for Song Recognition Systems
The main contribution of this paper is the framework of Application Programming Interface (API) to be integrated on a smartphone app. The integration with algorithm that generates fingerprints from the method ST-PSD with several parameter configurations (Windows size, threshold, and sub-score linear combination coefficient). An approach capable of recognizing an audio piece of music with…
Read MoreAdvanced Multiple Linear Regression Based Dark Channel Prior Applied on Dehazing Image and Generating Synthetic Haze
Haze removal is an extremely challenging task, and object detection in the hazy environment has recently gained much attention due to the popularity of autonomous driving and traffic surveillance. In this work, the authors propose a multiple linear regression haze removal model based on a widely adopted dehazing algorithm named Dark Channel Prior. Training this…
Read MoreDevelopment of an EEG Controlled Wheelchair Using Color Stimuli: A Machine Learning Based Approach
Brain-computer interface (BCI) has extensively been used for rehabilitation purposes. Being in the research phase, the brainwave based wheelchair controlled systems suffer from several limitations, e.g., lack of focus on mental activity, complexity in neural behavior in different conditions, and lower accuracy. Being sensitive to the color stimuli, the EEG signal changes promises a better…
Read MoreIndonesian Music Emotion Recognition Based on Audio with Deep Learning Approach
Music Emotion Recognition (MER) is a study to recognize emotion in a music or song. MER is still challenging in the music world since recognizing emotion in music is affected by several features; audio is one of them. This paper uses a deep learning approach for MER, specifically Convolutional Neural Network (CNN) and Convolutional Recurrent…
Read MoreAn Improved Approach for QoS Based Web Services Selection Using Clustering
With the rising number of web services created to build complex business processes, selecting the appropriate web service from a large number of web services respond to the same client request with the same functionality are developed independently but with different quality of service (QoS) attributes. From this point, there are many approaches to web…
Read MoreApplication of Piecewise Linear Approximation of the UAV Trajectory for Adaptive Routing in FANET
A significant problem of routing protocols in the Flying Ad Hoc Networks (FANET) is a significant overhead cost due to the high mobility of networking nodes. The problem is caused by a need to send information messages about locations of unmanned aerial vehicles (UAVs). In order to reduce the amount of service information, the following…
Read MoreA Model for the Application of Automatic Speech Recognition for Generating Lesson Summaries
Automatic Speech Recognition (ASR) technology has the potential to improve the learning experience of students in the classroom. This article addresses some of the key theoretical areas identified in the pursuit of implementing a speech recognition system, capable of lesson summary generation in the educational setting. The article discusses: some of the applica- tions of…
Read MoreA Novel Approach for Evaluating Eddy Current Loss in Wind Turbine Generator Step-Up Transformers
South Africa is aiming to achieve a generation capacity of about 11.4GW through wind energy systems, which will contribute nearly 15.1% of the country’s energy mix by 2030. Wind energy is one of the principal renewable energy determinations by the South African government, owing to affluent heavy winds in vast and remote coastal areas. In…
Read MoreDesign Approach of an Electric Single-Seat Vehicle with ABS and TCS for Autonomous Driving Based on Q-Learning Algorithm
Compared to other types of autonomous vehicles, the single-seat is the simplest when designing, since its compact design makes it an option that can simplify different mechanical aspects and enhance those of greater importance such as the steering and the braking system. Likewise, the electronic and electrical design may be a great improvement on the…
Read MoreApplication of Polynomial Regression Analysis in Evaluating the Techno-Economic Performance of DSPV Transformers
To this extent, the delineation of techno-economic evaluations for transformers becomes more intricate through a lens of Distributed Solar Photovoltaic (DSPV) market in South Africa. Essentially, the transformer price and loss evaluation techniques should be tailored for calculating the Total Ownership Cost (TOC) of transformers facilitating decentralized energy systems. In South Africa, the traditional coal…
Read MoreSEA WAF: The Prevention of SQL Injection Attacks on Web Applications
The security of website application has become important in the last decades. According to the Open Web Application Security Project (OWASP), the SQL Injection is classified as one of the major vulnerabilities found in web application security. This research is focused on improving website security in dealing with SQL Injection attacks by stopping, monitoring, and…
Read MoreA Grounded Theory Approach to Digital Transformation in the Postal Sector in Southern Africa
This paper describes a qualitative research design adopted in this study guided by deployment of a Grounded Theory (GT) methodology which was deployed to synthesize literature on technology adoption and digital transformation with an objective of developing theory. The philosophical worldview adopted was interpretivism/constructivist of a qualitative grounded theory inductive (theory building) approach where secondary…
Read MoreImproved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach
Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…
Read MoreApplication of a Reusability Approach in Simulation of Heritage Buildings Performance, Taif- Saudi Arabia
The main purpose of this paper is to present a reusability approach that helps the designer to assess the best practice to restore a heritage building. Based on the literature review, the reusability process and attributes was used as a method to restore the heritage building. Considering these approaches helps the designer to achieve useful…
Read MoreDesigning and Applying a Moral Turing Test
This study attempts to develop theoretical criteria for verifying the morality of the actions of artificial intelligent agents, using the Turing test as an archetype and inspiration. This study develops ethical criteria established based on Kohlberg’s moral development theory that might help determine the types of moral acts committed by artificial intelligent agents. Subsequently, it…
Read MoreFuzzy Analytical Hierarchy Process and Fuzzy Comprehensive Evaluation Method Applied to Assess and Improve Human and Organizational Factors Maturity in Mining Industry
The literature shows a growing interest in taking into account human and organizational factors (HOFs) to achieve safe and successful human performance by reducing the risk of errors. In this sense, the concept of maturity models aims to help companies in the integration of these factors by assessing the current level of maturity and define…
Read MoreCurved Pyramidal Metamaterial Absorber: From Theory to an Ultra-Broadband Application in the [0.3 – 30] GHz Frequency Band
For its importance nowadays in a wide range of applications such as the anechoic chamber, we introduce a microwave ultra-broadband polarization-independent metamaterial absorber (MA) in the Ultra High Frequency (UHF)/ Super High Frequency (SHF) frequency bands. Through this work, we improved the Relative Absorptive Bandwidth (RAB) of the conventional pyramidal absorber (CPA) by modifying its…
Read MoreA Novel Approach to Design a Process Design Kit Digital for CMOS 180nm Technology
In this paper, a novel approach to design a Process Design Kit Digital for CMOS 180nm process is presented. This work proposes a detailed flow to design a PDK Digital using Ocean language, which is a vital element in the semi-custom design and applied in education purposes in universities in Vietnam. The PDK digital includes…
Read MoreArtificial Neural Network Approach using Mobile Agent for Localization in Wireless Sensor Networks
Wireless sensor networks (WSNs) are having large demands in enormous applications for the decade. The main issue in WSNs is estimating the exact location of unknown nodes. All applications are dependent on the location information of unknown nodes in WSNs. Location information of mobile anchor node is used to estimate the location of unknown nodes.…
Read MoreDesign of Platform to Support Workflow Continuity in Multi-Device Applications
Nowadays, the Internet has become an indispensable tool for the realization and continuity of activity at a different time, place, and technological context (e.g., mobile, pc, tablet), so that interaction techniques through the use of multi-device support have become of great interest. From this perspective, continuity in interactions is an essential concept in the face…
Read MoreProcrustes Dynamic Time Wrapping Analysis for Automated Surgical Skill Evaluation
Classic surgical skill evaluation is performed by an expert surgeon examining an apprentice in a hospital operating room. This method suffers from being subjective and expensive. As surgery becomes more complex and specialized, there is an increase need for an automated surgical skill evaluation system that is more objective and determines more exactly the skills…
Read MoreGene Selection for Cancer Classification: A New Hybrid Filter-C5.0 Approach for Breast Cancer Risk Prediction
Despite the significant progress made in data mining technologies in recent years, breast cancer risk prediction and diagnosis at an early stage using DNA microarray technology still a real challenging task. This challenge comes especially from the high-dimensionality in gene expression data, i.e., an enormous number of genes versus a few tens of subjects (samples).…
Read MoreMobile Application Design for Student Learning
The research objectives were to identify, analyze needs, as well as designing a mobile application for student online learning at PT. Ruang Raya Indonesia, particularly in the process of working on tasks assigned by the teacher. The methods used in this research are data collection method using Slovin theory, systems analysis by focusing on the…
Read More
