Results (222)
Search Parameters:
Keyword: FrameStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreA Secure Medical History Card Powered by Blockchain Technology
A reliable healthcare system ensures that the population has access to top-notch medical ser- vices, ultimately enhancing their overall health most efficiently. At times, data are not secured or handled appropriately. Addressing these concerns, blockchain technology is projected to bring about a substantial revolution in the medical industry by assuring the confidentiality of electronic health…
Read MoreAugmented Reality Based Visual Programming of Robot Training for Educational Demonstration Site
The human resource development of robotics and automation in the smart factory is an important factor in “Thailand 4.0” roadmap, which is following the industry 4.0 model. To pursue this goal of Thailand 4.0 roadmap of labor development, the effective and intuitive training system must be easy to understand. This study proposes the implementation of…
Read MoreImproving License Plate Identification in Morocco: Intelligent Region Segmentation Approach, Multi-Font and Multi-Condition Training
The exponential growth in the number of automobiles over the past few decades has created a pressing need for a robust license plate identification system that can perform effectively under various conditions. In Morocco, as in other regions, local authorities, public organizations, and private companies require a reliable License Plate Recognition (LPR) system that takes…
Read MoreDetecting the Movement of the Pilot’s Body During Flight Operations
This research presents a “Multi-camera for pilot’s cockpit measurement system”, which uses four multi-view images to eliminate the instrument and human body shielding and record the touched area. That could record the body reaction time (velocity and acceleration) and trajectory of the tested personnel. Real-time conversion of multi-view images corresponding to the 3D skeletal joint…
Read MoreMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read MoreDismantle Shilling Attacks in Recommendations Systems
Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…
Read MoreOn the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor
In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…
Read MoreRedesign and Improvement in the Management of the Raw Material Inventory Control Process with Oracle APEX
Having reasonable inventory control is a priority for any company because a lack of inventory could incur economic losses. Not having the necessary stock for the timely production of your orders could generate dissatisfaction in your customers and possibly cause them to lose them. Likewise, reasonable inventory control allows quick decision-making for the company’s benefit.…
Read MoreBlockchain Applications in Suning and PingAn
The emergence of blockchain technology has facilitated the digital transformation of many businesses and thereby increased the competitiveness of China in the global market. As a cutting-edge technology, Blockchain has significantly influenced the practices across all business sectors. Focusing on the retail and insurance sectors, this paper analyzes the blockchain technology applications in two companies…
Read MoreHigh Performance SqueezeNext: Real time deployment on Bluebox 2.0 by NXP
DNN implementation and deployment is quite a challenge within a resource constrained environment on real-time embedded platforms. To attain the goal of DNN tailor made architecture deployment on a real-time embedded platform with limited hardware resources (low computational and memory resources) in comparison to a CPU or GPU based system, High Performance SqueezeNext (HPS) architecture…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreA Unified Visual Saliency Model for Automatic Image Description Generation for General and Medical Images
An enduring vision of Artificial Intelligence is to build robots that can recognize and learn the visual world and who can speak about it in natural language. Automatic image description generation is a demanding problem in Computer Vision and Natural Language Processing. The applications of image description generation systems are in biomedicine, military, commerce, digital…
Read MoreEfficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage
Using Proofs of Retrievability (PORs), a file owner is able to check that a cloud server correctly stores her files. Using Proofs of Retrievability and Reliability (PORRs), she can even verify at the same time that the cloud server correctly stores both her original files and their replicas. In 2020, a new PORR combined with…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreAutomated Hydroponic System using Wireless Sensor Networks
Researchers have associated agriculture and food processing with adverse environmental impacts like; falls in the underground freshwater table, energy consumption, and high carbon emission. These factors have the worst effect on developing countries. Therefore, there is a need for on-demand food production techniques that require minimum resource utilization. For these reasons, scientists are now focusing…
Read MorePhysics behind the Concept of a Sodium-Potassium-Cesium-Cooled Martian Nuclear Reactor
The main goal of the work is to determine the basic conceptual solutions of a nuclear reactor operating on the surface of another planet. The problem was solved using the example of the Martian nuclear power plant. The article uses calculation and optimization research methods and corresponding program codes (well-known and author’s). The results of…
Read MoreVideo Risk Detection and Localization using Bidirectional LSTM Autoencoder and Faster R-CNN
This work proposes a new unsupervised learning approach to detect and locate the risks “abnormal event” in video scenes using Faster R-CNN and Bidirectional LSTM autoencoder. The approach proposed in this work is carried out in two steps: In the first step, we used a bidirectional LSTM autoencoder to detect the frames containing risks. In…
Read MoreImpact Assessment of the Renewable Energy Sources Implementation in Bulgarian Single-Family Houses on the Greenhouse Gas by HOMER Pro Software
It is widely known that cities now house more than half of the world’s population. Within this framework, this study presents the possibilities for real-world application of renewable energy sources (RES) in urban areas, as well as their contribution to the urban deployment of the new energy paradigm. A comparison is made between hybrid power…
Read MoreCyber Incident Handling and the Perceptions of Learners on Cyber Incidents in South African Schools
With increases in technological usage, cyber incidents are also on the rise and have become a major concern in schools across the globe. What is of significant concern is that cyber incidents in South African schools are also on the rise. Existing evidence suggests that, in South Africa there are no clear procedures that are…
Read MorePower Saving MAC Protocols in Wireless Sensor Networks: A Performance Assessment Analysis
Wireless sensor networks are an emerging technology that is used to monitor points or objects of interest in an area. Despite its many applications, this kind of network is often limited by the fact that it is difficult to provide energy to the nodes continuously, forcing the use of batteries, which restricts its operations. Network…
Read MoreBoltzmann-Based Distributed Control Method: An Evolutionary Approach using Neighboring Population Constraints
In control systems, several optimization problems have been overcome using Multi-Agent Sys- tems (MAS). Interactions of agents and the complexity of the system can be understood by using MAS. As a result, functional models are generated, which are closer to reality. Nevertheless, the use of models with permanent availability of information between agents is assumed…
Read MoreExploiting Domain-Aware Aspect Similarity for Multi-Source Cross-Domain Sentiment Classification
We propose a novel framework exploiting domain-aware aspect similarity for solving the multi- source cross-domain sentiment classification problem under the constraint of little labeled data. Existing works mainly focus on identifying the common sentiment features from all domains with weighting based on the coarse-grained domain similarity. We argue that it might not provide an accurate…
Read MoreDecision Support System for Testing and Evaluating Software in Organizations
Organizations make use of different tools and methods to test and evaluate software, for quality and appropriateness purposes. However, many organizations are unable to perform multiple testing activities (manual, automation and performance testing), using a single tool. As a result of limitation of some tools, some organizations are hampered in their attempt to test software,…
Read MoreOptimized Multi-Core Parallel Tracking for Big Data Streaming Applications
Efficient real-time clustering is a relevant topic in big data streams. Data stream clustering needs necessarily a short time execution frame with bounded memory utilizing a one-scan process. Because of the massive volumes and dynamics of data streams, parallel clustering solutions are urgent. This paper presents a new approach for this trend, with advantages to…
Read More
