Results (1523)
Search Parameters:
Keyword: SPDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreEnhanced Collaborative Constellation for Visible Light Communication System
Visible light communication (VLC) that simultaneously gives illumination and information transmission abilities, is recognized as a hopeful competitor for prospective wireless net- works. Furthermore, a channel adaptive collaborative constellation (CASCC) with the capacity of adapting according to the channel condition to enhance the bit error rate (BER) while concurrently improving the versatility of the receiver…
Read MoreEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreMachine Learning Model to Identify the Optimum Database Query Execution Platform on GPU Assisted Database
With the current amount of data nowadays, the need for processing power has vastly grown. By relying on CPU processing power, current processing power is depending on the frequency and parallelism of the current CPU device. This means this method will lead to increased power consumption. Current research has shown that by utilize the power…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreAnalysis and Improvement of an Innovative Solution Through Risk Reduction: Application to Home Care for the Elderly
The increase in the number of elderly people requires multiple efforts to maintain their well-being and health. A wide variety of products and services have been created to enable seniors to live at home for as long as possible. The market success of these solutions depends on acceptance by the different stakeholders. Older people are…
Read MorePerformance Analysis of Joint Precoding and Equalization Design with Shared Redundancy for Imperfect CSI MIMO Systems
Analytical researches on a potential performance of multipath multiple-input multiple-output (MIMO) systems inspire the development of new technologies that decompose a MIMO channel into independent sub-channels on the condition of constrained transmit power. Moreover, in current studies of inter-symbol interference (ISI) MIMO systems, there is an assumption that channel state information (CSI) at receivers and/or…
Read MoreImprovement of Desirable Thermophysical Properties of Soybean Oil for Metal Cutting Applications as a Cutting Fluid
Vegetable oils are often proved to be promising for industrial lubrication applications among which soybean oil found to be better due to its attractive and desirable thermo physical properties for machining compared to other vegetable oils. However, already it was established that influenced desirable thermophysical properties necessary for a vegetable oil through which better machining…
Read MoreAlternative Real-time Image-Based Smoke Detection Algorithm
Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MorePerformance Effects of Algorithmic Elements in Selected MANETs Routing Protocols
Over time, several routing protocols have been suggested for use in Mobile Ad Hoc Networks (MANETs). Because of availability of so many MANETs routing protocols, network engineers and administrators face difficulties in identifying an appropriate routing protocol for a particular scenario. This challenge results from the unavailability of adequate technical analytic studies designed to examine…
Read MoreUsing Leader Election and Blockchain in E-Health
The development of electronic healthcare systems requires to adopt modern technologies and architectures. The use of Electronic Personal Health Record (E-PHR) should be supported by efficient storage such as cloud storage which enables more security, availability and accessibility of patients’ records. Actually, the increase of availability of E-PHR enhances parallel access, which improves the performance…
Read MoreCentralized System of Universities Learning Materials
This article considers the creation of a program / website as an example of a centralized system for all universities in order to more easily familiarize an applicant and / or student with the internal politics and capabilities of the university. Existing problems in the training system are examined, why distance learning is relevant, what…
Read MoreA Novel Hybrid Method for Segmentation and Analysis of Brain MRI for Tumor Diagnosis
It is difficult to accurately segment brain MRI in the complex structures of brain tumors, blurred borders, and external variables such as noise. Much research in developing as well as developed countries show that the number of individuals suffering tumor of the brain has died as a result of the inaccurate diagnosis. The proposed article,…
Read MoreEvaluation of Uncertainty Measurement Calculation for Vector Network Analyzer From 300 kHz to 8.5 GHz
Increasing the telecommunications products that allow Vector Network Analyzer is becoming more common tools to measure the S-Parameter. It will be an absolute number from the S-Parameter measurements produced in real and imaginary, other words it is also known as the product of the calculation. The calculation findings do not include the systematic and random…
Read MoreLow Carbon Sustainable Building Material: Maximizing Slag Potentials for Improved Lime Mortar Mechanical Properties
Prior to the 19th century discovery of Portland Cement (PC), Lime Based Mortar remained popular due to its flexibility, permeability and more importantly, associated low carbon emissions. However, lime’s characteristic delayed setting/hardening time, low mechanical strength, poor internal cohesion and some volumetric changes have overshadowed significance of its outstanding features particularly, flexibility, and consequently put…
Read MoreMobile Based for Basic English Learning Assessment with Augmented Reality
Nowadays Augmented Reality (AR) is very popular in teaching and learning, especially in leading student to observe learning material targets which supported by online learning resources using mobile device and wireless technology. Because English is a foreign language, most students have problems in learning English. Generally, their problems were related to low motivation, bad study…
Read MoreAnalysis of the Blockchain for Adoption in Electronic Commerce Management in Ecuador
The document describes the advancement of technology in commercial negotiations and functionality for various electronic transactions in Ecuador, with the aim of analyzing the blockchain and its adoption in managing e-commerce. The quantitative approach with a deductive and descriptive method has been used to identify the benefits in transactional activities and data security, both customers…
Read MoreTowards Enterprise Technical Architecture for the Implementation of the South African NHI
This paper provides an insight about the significance of the enterprise technical architecture (ETA) in enabling and supporting the implementation of the South African National Health Insurance (NHI). Design: Existing documentations from both academic and government domains were gathered, and analyzed using the hermeneutics technique, from the perspective of interpretivist approach. Based on the analysis,…
Read MoreComparison of the RC-Triggered MOSFET-Based ESD Clamp Circuits for an Ultra-low Power Sensor System
This paper uses the RC-triggered MOSFET-based electrostatic discharge (ESD) power clamp to conduct ESD from ESD events and not affect the ultra-low power sensor system. Then using the stacked device include stacked MOSFET or stacked BJT to reduce the leakage current which increases with temperature. Moreover, we compare gate-driven method and two-level–driven with both gate-driven…
Read MoreEvaluation of Mini-Hydro Power for Off Grid Electrification in Rural/Isolated Areas in Africa
Rural electrification and sustainable energy services to the less privileged is à major challenge faced in Nigeria. Off-grid power generation via small hydropower plant would mitigate this challenge. This Paper discusses the awareness and assessment of small hydro power for off-grid electrification in rural/isolated areas in Nigeria. In this research, the method of onsite data…
Read MoreNeural Network-based Efficient Measurement Method on Upside Down Orientation of a Digital Document
As many digital documents are required in various environments, paper documents are digitized by scanner, fax, digital camera and specific software. In the case of a scanned document, we need to check whether the document is right sided or upside down because the orientation of the scanned document is determined by the orientation in which…
Read MoreROS Based Multimode Control of Wheeled Robot
This research work mainly presents the design and development of a small-scaled wheeled robot, which can be controlled using multiple controlling interfaces using some new technological trends. Raspberry Pi 3 as the main controller, Python as the programming language integrated with the Robot Operating System (ROS) and Virtual Network Computing (VNC) for screen sharing are…
Read MoreClassification of Timber Load on Trucks
All trucks heading into the paper mill MONDI, Slovakia, have to pass an automatic security check. It controls if storage of its wood load meets all standards of safety. Each truck is scanned by a group of 2D scanners. After that the inspection of timber load is done by a software with use of the…
Read MoreA Resolution-Reconfigurable Asynchronous SAR ADC with Segmented and Non-Binary Weighted Capacitance DACs
With the addition of thing of internet applications to 5G smartphones, mobile standby time and ultra-low-power sensing systems have become increasingly important. Nowadays, such sensing systems typically reduce power consumption to microwatts. This paper presents segmented and non-binary weighted capacitance DACs, low power, high resolution, an asynchronous clock, a spark-detect, vcm-based switching and direct switching,…
Read More
