Results (486)
Search Parameters:
Keyword: ImplementStudy and Implementation of Various Image De-Noising Methods for Traffic Sign Board Recognition
The problem of recognizing traffic sign boards in a correct fashion is one of the major challenges since there is an alarming rate of increase in the number of road accidents happening because of incorrect interpretation of traffic sign boards in bad weather conditions. In this paper, a comparative analysis of various noise removal techniques…
Read MoreUsing Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign
eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…
Read MoreThe Role of Information Technology Human Capability in the Implementation of Information Technology Governance (ITG): A Systematic Literature Review on Malaysian Organizations
This study reviewed articles on information technology governance (ITG) in the Malaysian context and categorized the issues found in ITG implementation according to organizational-related and human-related issues. It further analysed the impact and role of information technology (IT) human capability in ITG implementation in developing countries like Malaysia, which is still in the infancy stage…
Read MoreDevelopment & Implementation of Smart Vehicle Over Speeding Detector using IoT
Nowadays over speeding is one of the most common traffic violations. Generally, over speeding is the result of restless and bad behavior of drivers. As the accident rates are increasing it is important to develop and implement a system which can automatically detect and report over speeding to the traffic control authorities as early as…
Read MoreFuzzy Logic Implementation for Enhanced WCDMA Network Using Selected KPIs
The paper focused on the implementation of fuzzy logic technology for improved Wideband Code Division Multiple Access (WCDMA) network using selected Key Performance Indicators (KPIs). Empirical and analytical methods were principally deployed for the study analyses. Empirical analyses were conducted on two designated networks which are MTN and AIRTEL observed with high network traffic to…
Read MoreImplementation of a Robot Contest for Distance Education
Robot contests are suitable for bachelor courses to gather hands-on experience in engineering diciplines such as mechanics, electronics and embedded software. After summarizing a concept of a robot contest for distance education (robot sumo) as presented in earlier publications this paper describes the implementation and first results of this concept. The contest is seperated into…
Read MoreFPGA Implementation of Ultra-High Speed and Configurable Architecture of Direct/Inverse Discrete Wavelet Packet Transform Using Shared Parallel FIR Filters
This work presents new pipeline-parallel, generic and configurable parallel hardware architectures for the Direct/Inverse Wavelet Packet Transform (DWPT/IDWPT) independent of any specific family of wavelets, implemented in FPGA technology using a parallel architecture of direct FIR filter. We propose in the following paper, new P-parallel structures for the DWPT and IDWPT transforms based on the…
Read MoreThe experience of implementation with Agile Business Process Management
This paper is an extension of work originally presented at the Convention of Central America and Panama XXX VII- The Institute of Electrical and Electronic Engineers -2017. We have extended our previous work by presenting the initial results of how social technologies in particular wikis has the potential for Information Technology support of a cooperative…
Read MoreAn FPGA Implementation of Resource-Optimized Dynamic Digital Beamformer for a Portable Ultrasound Imaging System
This paper presents a resource-friendly dynamic digital beamformer for a portable ultrasound imaging system based on a single field-programmable gate array (FPGA). The core of the ultrasound imaging system is a 128- channel receive beamformer with fully dynamic focusing embedded in a single FPGA chip, which operates at a frequency of 40 MHz. The Rx…
Read MoreDesign and Implementation of Closed-loop PI Control Strategies in Real-time MATLAB Simulation Environment for Nonlinear and Linear ARMAX Models of HVAC Centrifugal Chiller Control Systems
The objective of this paper is to investigate three different approaches of modeling, design and discrete-time implementation of PI closed-loop control strategies in SIMULINK simulation environment, applied to a centrifugal chiller system. Centrifugal chillers are widely used in large building HVAC systems. The system consists of an evaporator, a condenser, a centrifugal compressor and an…
Read MoreSimulation and FPGA Implementation of a Ring Oscillator Sensor for Complex System Design
This paper, presents the design of a temperature sensor based on RO (Ring Oscillator) in order to make a thermal study for the detection and localization of thermal peaks in a complex system. In this work, a simulation and FPGA implementation of a fully digital temperature sensor features a number of exact inverters that can…
Read MoreMedium Voltage Microgrid Test Setup and Procedures Implemented on a Real Pilot Project
This paper presents various concepts related to the application of a microgrid pilot project in a residential condominium at Fortaleza / CE – Brazil, such as battery energy system, renewable and distributed generation, islanding recloser and all different units using interface based on power electronics. This papers main objective is to create information about microgrid…
Read MoreSmart Grid Operational functions and Control Challenges by Implementing SSSC Tailored to Optimize performance in between Qatar and KSA on the GCC Electrical-power grid
This research work is novel technique to control and optimize SSSC (Subsynchronous Series Controller) functions with degree of precision in between Qatar and Kingdom of Saudi Arabia. The SSSC model developed and simulated in order to identify and determine its control and functioning parameters by introducing new tuning parameters based on that the SSSC can…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MoreHomemade array of surface coils implementation for small animal magnetic resonance imaging
Small animal modeling is an exciting research field where human pathogenic frameworks can be replicated in a controlled environment. Accurate Imaging is in high demand when modeling abnormalities and, magnetic resonance imaging plays a vital role due to its demonstrated lowest intrusion when compared with other imaging methods. However, the required high-resolution yields low-quality images…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreSimulation and Implementation of Sensorless Control in Multi-Motors Electric Drives with High Dynamics
In this article we’ll tackle the control of multi-motors electric drives with high dynamic, with rapid changes in torque and speed, with rigid or flexible coupling of motors, where the control strategy is FOC (Field Oriented Control) for each drives and the distributed control in local network using the CANopen protocol. In the surface mining…
Read MoreDetection of Vandalism in Wikipedia using Metadata Features – Implementation in Simple English and Albanian sections
In this paper, we evaluate a list of classifiers in order to use them in the detection of vandalism by focusing on metadata features. Our work is focused on two low resource data sets (Simple English and Albanian) from Wikipedia. The aim of this research is to prove that this form of vandalism detection applied…
Read MoreImplementation Of Carlson Survey Software2009 In Survey Works And Comparison With CDS Software
The automation surveying is one of the most influential changes to surveying concept and profession has had to go through, this has taken effect in two major courses, hardware (instrumentation used in data collection and presentation), and the software (the applications used in data processing and manipulation). Automation is majorly computer based and just like…
Read MoreReal Time Implementation of an Improved Hybrid Fuzzy Sliding Mode Observer Estimator
This paper extends some of our research results disseminated in the most recent awarded international conference paper concerning the implementation in real time of a sliding mode observer state estimator. For the same case study developed in the conference paper, more precisely a DC servomotor angular speed control system, we extend the proposed concept of…
Read MoreImplementation a Secure Electronic Medical Records Exchange System Based on S/MIME
The exchange of electronic medical records can reduce the preservation and the use of papers of medical records for management issues. The sharing of electronic medical records has been effective in Taiwan. Now days, enterprises are sharing their electronic medical records through the Exchange Center of EMR under the Virtual Private Network but slightly less…
Read MoreCross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs
To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…
Read MoreRobust µController Implementations for a Linear Pneumatic Actuator Interaction
Over the years, pneumatic systems have recorded a remarkable performance in automated applications, based on their cost to efficiency ratio and ease of energy transmission. Therefore, their drawback of not being totally controllable devices in terms of position accuracy, still represents a challenge task for engineers. In this paper, a traditional three term controller (PID)…
Read MoreA Multi-class Acoustic Dataset and Interactive Tool for Analyzing Drone Signatures in Real-World Environments
The rapid proliferation of drones across various industries has introduced significant challenges related to privacy, security, and noise pollution. Current drone detection systems, primarily based on visual and radar technologies, face limitations under certain conditions, highlighting the need for effective acoustic-based detection methods. This paper presents a unique and comprehensive dataset of drone acoustic signatures,…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read More
