Results (117)
Search Parameters:
Keyword: AgingBiometric System Vulnerabilities: A Typology of Metadata
This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…
Read MoreWindowing Accuracy Evaluation for PSLR Enhancement of SAR Image Recovery
Synthetic aperture radar (SAR) is an imaging device mounted on a moving platform. Its ability to identify a weak target from a nearby strong one depends upon the peak side lobe ratio (PSLR). This paper is intended to ameliorate such important ratio through the use of windowing of the transmitted pulse and studying the noise…
Read MoreDiscriminant Analysis of Diminished Attentiveness State Due to Mental Fatigue by Using P300
Fatigue is broadly divided into two types depending on the content of a task: physical fatigue and mental fatigue. Mental fatigue is associated with human error. It is thus important to search for indicators that can easily evaluate mental fatigue. The aim of this study is to construct a system that can evaluate mental fatigue…
Read MoreA Word Spotting Method for Arabic Manuscripts Based on Speeded Up Robust Features Technique
The diversity of manuscripts according to their contents, forms, organizations and presentations provides a data-rich structures. The aim is to disseminate this cultural heritage in the images format to the general public via digital libraries. However, handwriting is an obstacle to text recognition algorithms in images, especially cursive writing of Arabic calligraphy. Most current search…
Read MoreMulti Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms
Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…
Read MoreArtificial Bee Colony-Optimized LSTM for Bitcoin Price Prediction
In recent years, deep learning has been widely used for time series prediction. Deep learning model that is most often used for time series prediction is LSTM. LSTM is widely used because of its excellence in remembering very long sequences. However, doing training on models that use LSTM requires a long time. Trying from one…
Read MoreStudy and Implementation of Various Image De-Noising Methods for Traffic Sign Board Recognition
The problem of recognizing traffic sign boards in a correct fashion is one of the major challenges since there is an alarming rate of increase in the number of road accidents happening because of incorrect interpretation of traffic sign boards in bad weather conditions. In this paper, a comparative analysis of various noise removal techniques…
Read MoreCommunication Management of Digital Information Data in Human Resources as a Policy Making Strategic Program for University
Modern universities aim at carrying capacity human resources component in its tri dharma (Three Pillars of Higher Education). UPI with sufficient conditions in the management of several resources has undoubtedly tried to establish itself as a modern university. The superior human resource support in every competition and the university’s tri dharma is the primary resource…
Read MoreMaterial, Structural Optimization and Analysis of Visible-Range Back-Illuminated OPFET photodetector
High gain-bandwidth product and visible/UV contrast photodetectors are vital in Visible Light Communication (VLC) and Ultraviolet (UV) reflectance imaging applications respectively. We adopt material and structural optimization to perceive such photodetectors with back-illuminated Optical Field Effect Transistor (OPFET) wherein any potential difference in absorption coefficient of the semiconductor material between the visible and the UV…
Read MoreDevelopment of Wavelet-Based Tools for Event Related Potentials’ N400 Detection: Application to Visual and Auditory Vowelling and Semantic Priming in Arabic Language
Neurological signals are generally very weak in amplitude and strongly noisy. As a result, one of the major challenges in neuroscience is to be able to eliminate noise and thus exploit the maximum amount of information contained in neurological signals (EEG…). In this paper, we aimed at studying the N400 wave of the Event-Related Potentials…
Read MoreSupporting Better Physical Activity in a Smart City: a Framework for Suggesting and Supervising Walking Paths
The increase of elderly population creates the need to promote healthy aging, with autonomy and independence, for preserving the functional capacity and quality of life as much as possible. To achieve this goal the recommendations include walking a certain amount of steps daily, given that the exact amount of steps changes with age, lesions, and…
Read MoreInvestigating The Detection of Intention Signal During Different Exercise Protocols in Robot-Assisted Hand Movement of Stroke Patients and Healthy Subjects Using EEG-BCI System
Improving the hand motor skills in post-stroke patients through rehabilitation based on movement intention derived signals from the brain in conjunction with robot-assistive technologies are explored. The experimental work is conducted using Electroencephalogram based Brain-Computer Interface (EEG-BCI) system and the AMADEO hand rehabilitation robotic device. Two protocols using visual-cues and then using a 2-Dimensional (2D)…
Read MoreThe Study of PSi & PSo Algorithm for Reducing Power of the Mobile Communication Network
Recently, the trend of mobile communication network in Korea has been dramatically increasing the number of operating equipment for managing the explosion of wireless data traffic in 4G LTE network. This phenomenon has caused an increase in the operating cost to the mobile telecommunication service provider. Especially, the study about the reduction of the operating…
Read MoreAnalysis of Fuzzy Data for the Selection of Ingredients of the Polymer Composition by Technical Functions in Quality Management
The task of fuzzy mathematical modeling of the composition of a polymer composition is singled out and formulated, as one of the types of chemical-technological systems for creating the theoretical foundations for managing the physicochemical properties of the material produced from this composition. Fuzzy data on the technical functions and concentration of individual ingredients that…
Read MoreEffects of The Low-Resolution 3D Video Clip on Cerebrum Blood Flow Dynamics
We have already succeeded in findings that stereoscopic video clips enhance brain activity. We herein increase the knowledge about the influence of 3D and blurred images on the human body, especially on brain activity. From of old, it has been pointed out that the motion sickness is induced by the blurred images. In this study,…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreAutomation System for Regulation Optimization in Power Transformer Design
Large power transformers generally include a customer request for a technically appropriate regulation unit. The selection process of the regulation unit consists of defining the required input data, performing mathematical calculations necessary to find the technical limit values that the regulation unit has to satisfy, and finally optimizing and selecting the appropriate regulation unit. The…
Read MoreCNN-based Automatic Coating Inspection System
The application of protective coatings is the primary method of protecting marine and offshore structures from corrosion. Coating breakdown and corrosion (CBC) assessment is a major aspect of coating failure management. Evaluation methods can result in unnecessary maintenance costs and a higher risk of failure. To achieve a comprehensive collection of data for CBC assessment,…
Read MoreMachine Learning Applied to GRBAS Voice Quality Assessment
Voice problems are routinely assessed in hospital voice clinics by speech and language therapists (SLTs) who are highly skilled in making audio-perceptual evaluations of voice quality. The evaluations are often presented numerically in the form of five-dimensional ‘GRBAS’ scores. Computerised voice quality assessment may be carried out using digital signal processing (DSP) techniques which process…
Read MoreStudent Performance Evaluation Using Data Mining Techniques for Engineering Education
In this research work, we are implementing a student performance evaluation model using Mamdani Fuzzy Inference System (FIS) and Neuro Fuzzy system and comparing the results with classical averaging method for Network Analysis (NA) course studied by third semester Electronics and Communication Engineering students. This work explains the designing of scoring rubrics using Bloom’s levels…
Read MoreA Comparative Study of a Hybrid Ant Colony Algorithm MMACS for the Strongly Correlated Knapsack Problem
Metaheuristic hybridization has recently been widely studied and discussed in many research works as it allows benefiting from the strengths of metaheuristics by combining adequately the different algorithms. MMACS is a new hybrid ant colony optimization algorithm based on the foraging behavior of ants. This algorithm presents two hybridization levels. The first hybridization consists in…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreProposed System of New Generation LMS Using Visual Models to Accelerate Language Acquisition
Language skill is a rule-like operation, based on generalized connections. The main property of language skills is awareness. They are formed with conscious mastery of the language means of communication (phonetic, lexical and grammatical). Language acquisition is a complex process which includes a large number of different parameters. Therefore, the study and improvement of language…
Read MoreWhich User of technology? Perspectivising the UTAUT model by application of the SFL language Pronoun System towards a systems perspective of technology acceptance and use
This study applies systemic functional linguistics (SFL) as complementary framework of analysis of technology acceptance models (TAMs). The purpose is to bridge research methodology language in international business (IB) studies and engineering management science. Currently TAMs and its consolidated version, the Unified Theory of Acceptance and Use of Technology (UTAUT) provides for a typology of…
Read MoreAn Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images
Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…
Read More
