Results (347)
Search Parameters:
Keyword: ANNFPGA Implementation of 5G NR LDPC Codes
As a result of rising expectations for quality, the employment of advanced technical requirements for future fifth-generation (5G) new radio is required. The error-correction coding method is one of the most important components of a new generation. The 5G NR New Radio Low-Density Parity Check (LDPC) codes, which have been adopted by the 5G standard,…
Read MoreMRI Semantic Segmentation based on Optimize V-net with 2D Attention
Over the past ten years, deep learning models have considerably advanced research in artificial intelligence, particularly in the segmentation of medical images. One of the key benefits of medical picture segmentation is that it allows for a more accurate analysis of anatomical data by separating only pertinent areas. Numerous studies revealed that these models could…
Read MoreHuman-Centered Design, Development, and Evaluation of an Interface for a Microgrid Controller
Many millions of people have adverse effects on their lives, both socially and economically, when a power outage occurs. Along with other electrical events, the lack of Situational Awareness (SA) is one of the root causes of power system outages. In order to promote adequate situational awareness, both power system and microgrid interfaces should communicate…
Read MoreAchieving a High Isolation for the Triple-band MIMO Antenna in 5G/ Wi-Fi 6 Applications using Symmetric Parasitic Structure
Recently, the Multiple-input multiple-output (MIMO) antennas have been used a lot and attracted many researchers in advanced high-speed wireless communication systems. MIMO antennas are an essential part not only in access points but also in end-user devices. This technology allows a significant increase in channel capacity, but also lead to a challenge of minimize mutual…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreHybrid Machine Learning Model Performance in IT Project Cost and Duration Prediction
Traditional project planning in effort and duration estimation techniques remain low to medium accurate. This study seeks to develop a highly reliable and efficient hybrid Machine Learning model that can improve cost and duration prediction accuracy. This experiment compared the performance of five machine learning models across three different datasets and six performance indicators. Then…
Read MoreDevelopment and Analysis of Models for Detection of Olive Trees
In this paper, an automatic method for detection of olive trees in RGB images acquired by an unmanned aerial vehicle (UAV) is developed. Presented approach is based on the implementation of RetinaNet model and DeepForest Phyton package. Due to fact that original (pretrained) model used in DeepForest package has been built on images of various…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreTemperature-Compensated Overcharge Protection Measurement Technology
Recently, many problems have been caused by battery fires. The existing BMS(Battery Managment System) measured the voltage of each cell of the battery through the physical connection between the battery and the control module. However, if a battery with up to 1000 VDC becomes inoperable due to an external factor, the battery is damaged, and…
Read MoreMultiple Criteria Decision-making: Risk Analyses for the Soft Target
This article focuses on risk analysis using a multi-criteria decision-making method. Due to many performed risk analyses for soft targets, we are constantly trying to find new methods for objective risk assessment. Many risk analyses are subjective, which is a problem when planning security measures and comparing results (different events, objects, places, etc.). In this…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreAnalysis and Trend Estimation of Rainfall and Seasonality Index for Marathwada Region
Droughts are undesirable and highly unwanted form of disasters. It is essential to analyse the cause of such extreme events and act accordingly to pave the way for a sustainable future. The present research work conducts a seasonality and trend analysis of rainfall over the eight districts of Marathwada region. The study is carried out…
Read MoreCharacterization and Investigating the Effect of Gate-Insulator Thickness on Co-Axial Cylindrical Carbon Nanotube Field Effect Transistor
Carbon nanotube field effect transistor (CNTFET) has a huge advantage over the Si- MOSFET. In MOSFET switching occurs by altering channel resistivity whereas in CNTFET switching occurs by modulation contact resistance. CNTFET generates three to four times of drive current than MOSFET. Transconductance of CNTFET is four times higher than the MOSFET. The average carrier…
Read MoreMeta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers
The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…
Read MoreMobility Intelligence: Machine Learning Methods for Received Signal Strength Indicator-based Passive Outdoor Localization
Knowledge of pedestrian and vehicle movement patterns can provide valuable insights for city planning. Such knowledge can be acquired via passive outdoor localization of WiFi-enabled devices using measurements of Received Signal Strength Indicator (RSSI) from WiFi probe requests. In this paper, which is an extension of the work initially presented in WiMob 2021, we continue…
Read MoreDesigning the MIMO SDR-based Antenna Array for 5G Telecommunication
With the significant spread of 5G telecommunication systems, the demand for high quality of service and better coverage is growing rapidly. Multiple-input–multiple-output is planned to be among the key technologies in 5G telecommunication’s field. In this article, a new fully digital 2×2 MIMO testbed is implemented, using USRP B210 and 2 pairs of microstrip antennas…
Read MoreNatural Tsunami Wave Amplitude Reduction by Straits – Seto Inland Sea
Seto Inland Sea is situated between Japanese islands Honshu, Kyushu, and Shikoku. It is separated from the ocean by the Bungo Channel, Kii Channel, and other narrow straits around Shikoku Island. The objective of the article is to draw the attention to the question of how well the coastal population and infrastructure of those locations…
Read MoreMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreµPMU Hardware and Software Design Consideration and Implementation for Distribution Grid Applications
This article presents a roadmap for distribution grid µPMU hardware and software design consideration and implantation to ensure high performance within limited computational time of sampling frequency 512 samples/cycle. A proposed 12 channels, multi-voltage level µPMU hardware and rules of voltage and current transducer, analog filter, analog-to-digital converter, sampling rate definition, and PCB design and…
Read MoreLung Cancer Tumor Detection Method Using Improved CT Images on a One-stage Detector
Owing to the recent development of AI technology, various studies on computer-aided diagnosis systems for CT image interpretation are being conducted. In particular, studies on the detection of lung cancer which is leading the death rate are being conducted in image processing and artificial intelligence fields. In this study, to improve the anatomical interpretation ability…
Read MoreNiO Quantum dots Doped Triple Cation Perovskite \(\mathrm{CsMAFAPbI_2Br_2}\) Heterojunction Photodetector with High Responsivity
Optoelectronic devices applications based on Organic–inorganic perovskites are promising and effective low-cost energy materials due to their exceptional physical properties which include high carrier mobility, high optical absorption coefficient, and long carrier diffusion length. In the presented work, a TiO2/NiO+5% Fe quantum dots (QDs)–doped CsMAFAPbI2Br2 perovskite heterojunction broadband photodetector was fabricated on FTO/glass substrate. The…
Read MoreEncompassing Chaos in Brain-inspired Neural Network Models for Substance Identification and Breast Cancer Detection
The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read More
