Results (2366)
Search Parameters:
Keyword: REAttacks classification and security mechanisms in Wireless Sensor Networks
This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations…
Read MoreEye Feature Extraction with Calibration Model using Viola-Jones and Neural Network Algorithms
This paper presents the setup of eye tracking calibration methodology and the preliminary test results of the training model from the eye tracking data. Eye tracking requires good accuracy from the calibration process of the human eyes feature extraction from facial region. Viola-Jones algorithm is applied for this purpose by using Haar Basic feature filters…
Read MoreThe Correlation of the Specific and Global Performance of Teachers in UNTELS Engineering Schools
This article presents an analysis on the existing correlation of the specific and global performance of teachers in UNTELS engineering schools, whose data collection was carried out during the development of the first academic semester of the year 2019, using the Survey technique; which presents indicators classified in two dimensions: “Specific Dimension of Teaching Performance”…
Read MoreData Dashboard for Decision Support Systems for Intrapreneurship in A Company
Nowadays, as the Information and Technology rapidly growing all across the world, Indonesia as one of many developed countries always tries to keep up relating to this trend. Regarding to this situation, the use of Information and Technology in various fields are greatly enhanced, and not to mention businesses. There are a lot of businesses…
Read MoreQuranic Reciter Recognition: A Machine Learning Approach
Recitation and listening of the Holy Quran with Tajweed is an essential activity as a Muslim and is a part of the faith. In this article, we use a machine learning approach for the Quran Reciter recognition. We use the database of Twelve Qari who recites the last Ten Surah of Quran. The twelve Qari…
Read MoreEvaluation of Classroom Furniture Design for Ecuadorian University Students: An Anthropometry-Based Approach
It is widely known that students’ exposure to poor postures due to inappropriate classroom furniture design may contribute to the increase of the prevalence of musculoskeletal disorders symptoms that if not identified on time could lead to severe health issues. In this context, due to the unavailability of scientific studies related to this topic in…
Read MoreSimulation and Reproduction of a Manipulator According to Classical Arm Representation and Trajectory Planning
The technical and vocational institutions are the key feeders for skilled human capital in the robotic revolution economy. It is essential to engage the students by creating new, affordable robotics at a fraction of the cost. This study presents the design and simulation of a six-axis robot manipulator specifically made for education and training. The…
Read MoreA New Wire Optimization Approach for Power Reduction in Advanced Technology Nodes
In advanced technologies nodes, starting from 28 nm to 7 nm and below, the power consumed of integrated circuits (ICs) becomes a big concern. Consequently, actual electronic design automation (EDA) tools are facing many challenges to have low power, reduced area and keep having required performance. To reach required success criteria, and because each picosecond…
Read MoreSpiral Curve for Revocable Touchless Fingerprint Template Securisation
Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…
Read MoreThe Potential of Ocean Current as Electrical Power Sources Alternatives in Karimunjawa Islands Indonesia
Electrical energy shortage and expensive basic electricity costs are one of the problems that are occurred in Karimunjawa Island, Indonesia. The purpose of this research is to identify the potential of ocean currents energy as one of the alternatives to reduce the problem related to energy needs and to predict the electrical energy that can…
Read MoreA Word Spotting Method for Arabic Manuscripts Based on Speeded Up Robust Features Technique
The diversity of manuscripts according to their contents, forms, organizations and presentations provides a data-rich structures. The aim is to disseminate this cultural heritage in the images format to the general public via digital libraries. However, handwriting is an obstacle to text recognition algorithms in images, especially cursive writing of Arabic calligraphy. Most current search…
Read MoreIntelligent Wireless System for PV Supervision Based on The Raspberry Pi
Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…
Read MoreThe Influence of Adhesive on Roof Tiles Product from Water Hyacinth Fiber Residues
Problem statement: In general, the water hyacinth is a biennial aquatic plant for many seasons with propagated quickly to become serious weeds in general water sources. The water hyacinth is caused carbon dioxide in the atmosphere as a greenhouse effect, which leads to climate change, the environmental concerns of the world today. The agricultural residue…
Read MoreMulti Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms
Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…
Read MoreCreating a Digital Twin: Simulation of a Business Model Design Tool
Digitization forces industry players to adapt to transforming market situations and buyer behavior. Technological advances, buyer power, and sharpened competitive intensity imply that businesses are confronted with the menace of commoditization. For companies to perform successfully in the market, outdated business models ought to be rethought and new business models should be created. Unique selling…
Read MoreThe Relationship of Coalition on Employee Spiritual Engagement: Interplay of Organisational Politics
The objective of the study was to establish the relationship between coalition and employee spiritual engagement. The research was quantitative, and data was administered and retrieved from employees at the selected private radio firms. Content validity was utilised to ascertain the validity of the instrument, and the reliability of the instrument was established using Cronbach’s…
Read MoreOptimization of Power Balance Transaction Based on Renewable Energy Sources Using Artificial Salmon Tracking Algorithm for Modeling the Interconnected Grid Development
Since environmental requirements penetrate engineering processes to keep global warming and to reduce pollutant emissions, the system operation should be designed based on environmentally approach friendly. Operationally, the system processes are supported by energy suppliers to meet continuously energy transaction while clean and green energies are also targeted to keep the environmental conditions. In other…
Read MoreA Proposal of TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point
The IEEE802.11n based Wireless Local Area Networks (WLANs) have been extensively deployed due to the flexible coverage, the easy installation, and the lower cost. To reduce the energy consumption while increasing the performance, the elastic WLAN system has been studied, such that it can dynamically change the network configuration according to traffic demands. As well,…
Read MoreQ2 YouTube: Quantitative and Qualitative Information Analysis based Influencer-aware YouTube Channel Ranking Scheme
With the development of big data, artificial intelligence and deep learning, various social information networks are becoming exponentially intelligent. Of all the various social networks, YouTube is so popular that it is called the YouTube era. Not only video viewers, but also actual video producers, influencer youtubers, are increasing, allowing individuals as well as operators…
Read MoreTransmission Line Restoration Using ERS Structure
In the past decades, various ideas have proposed for reconductoring of overhead lines to enhance power transmission capacity considering growing energy demand. Conventional method of reconductoring is use to take couple of weeks but availability of shutdown for a prolong period is a major constraint in line uprating. Emergency restoration structure (ERS) is effective to…
Read MoreModelling and Control of The PV Power System Dedicated to The Greenhouse for Reduced Energy Consumption
A control of the greenhouse when it is connected to the photovoltaic generator is described in this paper. The greenhouse is modulated by differential equations while the temperature and humidity are regulated using the fuzzy logic controller. The photovoltaic system can supply maximum power for a specified voltage and output current. In addition, the fuzzy…
Read MoreArtificial Bee Colony-Optimized LSTM for Bitcoin Price Prediction
In recent years, deep learning has been widely used for time series prediction. Deep learning model that is most often used for time series prediction is LSTM. LSTM is widely used because of its excellence in remembering very long sequences. However, doing training on models that use LSTM requires a long time. Trying from one…
Read MoreDetermination of Submerged Breakwater Location for Coastal Protection in Panjang Island Waters Jepara
Panjang Island is one of the islands which is categorized as a small island and is located in Jepara District, Jepara Regency, Central Java Province. The problem faced by Panjang Island is erosion, which increasingly erodes the shoreline and begins to damage buildings on the beach. A solution that is effective enough to overcome erosion…
Read MoreDirection of Arrival Using 2-D Matrix Pencil Method
In this research work, we proposed a technique to decrease the complexity of 2-D Matrix Pencil (MP) for the direction of arrival (DOA) evaluation by combining two perpendicular arrays: The first one is the uniform linear array (ULA) and the second one is a uniform circular array (UCA). This special structure for the 2D Matrix…
Read MoreA Modular Multipurpose, Parameter Centered Electronic Health Record Architecture
Health Information Technology is playing a key role in healthcare. Specifically, the use of electronic health records has been found to bring about most significant improvements in healthcare quality, mainly as relates to patient management, healthcare delivery and research support. Health record systems adoption has been promoted in many countries to support efficient, high quality…
Read More
