Results (440)
Search Parameters:
Keyword: ProblemMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreNonlinear Model Predictive Control of Rover Robotics System
The paper presents two robust and efficient control algorithms based on (i) Optimal Control Allocation (OCA) and (ii) Nonlinear Model Predictive Control (NMPC). The robotics system consists of two rovers with mecanum wheels and mounted two 7-DOF arms carrying a common load. The overall system is an underdetermined one with non-holonomic constraints. The developed control…
Read MoreDesign of an Open Source Anthropomorphic Robotic Hand for Telepresence Robot
Most anthropomorphic robotic hands use a lot of actuators to imitate the number of joints and the movement of the human hand. As a result, the forearm of the robot hand has a large size for the installation of all actuators. This robot hand is designed to reduce the number of actuators, but also retain…
Read MoreMeta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers
The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…
Read MoreProcess Mining in Healthcare: A Systematic Literature Review and A Case Study
Process mining is an innovative technique through which inefficiencies in production systems can be eliminated. This technique has therefore become very important internationally in recent years and is also useful for pursuing the improvement of production systems by extrapolating process knowledge from event logs recorded by information systems. Process mining has easy application in production…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreDeveloping CubeSat and AI Framework for Crowd Management Case of Short-Term Large-Scale Events
Many consequences can be resulted in mismanagement of crowd, which might get people injured or even lose their lives. Thus, crowd management helps in controlling overcrowded areas during events, and allowing authorities to monitor, manage and reduce incidents. Space science and technology have made huge leap in crowd management, let alone when this technology integrated…
Read MoreAutomatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking
In recent years, people-counting problems have increased in popularity, especially in crowded indoor spaces, e.g., public transport. In peak hours, trains move significant numbers of passengers, producing delays and inconveniences for their users. Therefore, analysing how people use public transport is essential to solving this problem. The current analysis estimates how many people are inside…
Read MoreDEM models Calibration and Application to Simulate the Phosphate Ore Clogging
In different areas of industry (mining, food processing, pharmaceutical, manufacturing…), the problem of grain, aggregate and clusters flow arises during the handling activities especially loading and unloading. Thus, the study and control of the parameters that govern the flow of the granular medium and its interaction with its environment are key parameters to achieve the…
Read MoreAnalysis of Different Supervised Machine Learning Methods for Accelerometer-Based Alcohol Consumption Detection from Physical Activity
This paper builds on the realization that since mobile devices have become a common tool for researchers to collect, process, and analyze large quantities of data, we are now entering a generation where the creation of solutions to difficult real-world problems will mostly come in the form of mobile device apps. One such relevant real-life…
Read MoreMaintainability Improving Effects such as Insulation Deterioration Diagnosis in Solitary Wave Track Circuit
This paper is an extended version of the journal presented at ICECCME2021. In ICECCME2021, the authors presented that we have developed a solitary wave track circuit (SW-TC), and it is energy-saving compared to existing track circuits. Furthermore, we also explained that it can realize advanced train control at a low cost, equivalent to digital automatic…
Read MoreA Constrained Intelligent Nonlinear Control Method for Redundant Robotic Manipulators
Redundant robotic systems provide great challenges in solving kinematics and control problems, that are yet also open opportunities for exploring new, diverse and intelligent ideas and methods. In this paper, an advanced control method is proposed for position control problems of redundant robots with output constraints. The controller is structured with two control layers. In…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MoreAntenna System Design To Increase Power Transfer Efficiency with NFC Wireless Charging Technology
The NFC wireless charging feature is an extension of the NFC technology that can be implanted on wearables. The purpose of this paper is to show how to increase power transfer efficiency on both transmitter and receiver antenna systems. To demonstrate this problematic, firstly this paper gives an overview of how this NFC feature is…
Read MoreA New Technique to Accelerate the Learning Process in Agents based on Reinforcement Learning
The use of decentralized reinforcement learning (RL) in the context of multi-agent systems (MAS) poses some difficult problems. The speed of the learning process for example. Indeed, if the convergence of these algorithms has been widely studied and mathematically proven, they suffer from being very slow. In this context, we propose to use RL in…
Read MoreGeneralized Linear Model for Predicting the Credit Card Default Payment Risk
Predicting the credit card default is important to the bank and other lenders. The credit default risk directly affects the interest charged to the borrower and the business decision of the lenders. However, very little research about this problem used the Generalized Linear Model (GLM). In this paper, we apply the GLM to predict the…
Read MoreEncompassing Chaos in Brain-inspired Neural Network Models for Substance Identification and Breast Cancer Detection
The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial…
Read MoreHeuristic Analysis of Overall Performance Measurement Perception and Management in Automotive Industry
Overall Performance (OP) measurement is an essential instrument in sustainable manufacturing implementation and management. The effective use of key performance indicators (KPIs) can potentially contribute to identify the firm’s overall performance, provide the crucial gaps between desired results and current actions, and thus facilitate the implementation and execution of improvement strategies. This study attempts to…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreForensic Analysis of “WhatsApp” Artifacts in Android without Root
WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve…
Read MoreA Unified Visual Saliency Model for Automatic Image Description Generation for General and Medical Images
An enduring vision of Artificial Intelligence is to build robots that can recognize and learn the visual world and who can speak about it in natural language. Automatic image description generation is a demanding problem in Computer Vision and Natural Language Processing. The applications of image description generation systems are in biomedicine, military, commerce, digital…
Read MoreEthical Implications and Challenges in using Social Media: A Comprehensive Study
The technological revolution penetrates every aspect of our dailylives; it changed our lives in different fields such as communication, decision-making, information access and work environment. These changes have benefits, but they also have costs. These costs include many ethical and social problems that need more investigation. The human element is the most affected part of…
Read MorePhysics behind the Concept of a Sodium-Potassium-Cesium-Cooled Martian Nuclear Reactor
The main goal of the work is to determine the basic conceptual solutions of a nuclear reactor operating on the surface of another planet. The problem was solved using the example of the Martian nuclear power plant. The article uses calculation and optimization research methods and corresponding program codes (well-known and author’s). The results of…
Read More
