Results (1793)
Search Parameters:
Keyword: IADistributed Microphone Arrays, Emerging Speech and Audio Signal Processing Platforms: A Review
Given ubiquitous digital devices with recording capability, distributed microphone arrays are emerging recording tools for hands-free communications and spontaneous tele-conferencings. However, the analysis of signals recorded with diverse sampling rates, time delays, and qualities by distributed microphone arrays is not straightforward and entails important considerations. The crucial challenges include the unknown/changeable geometry of distributed arrays,…
Read MoreLogistics Solutions in the Preparation Phase for the Appearance of Disasters
Natural disasters have caused not only economic but also human losses. These events bring with them, among other things, deficiencies in the supply of food, clothing, health and cleaning products, to name a few. This situation makes it imperative to locate facilities that can supply the needs, as mentioned earlier, to the victims in the…
Read MoreDeep Learning Model for A Driver Assistance System to Increase Visibility on A Foggy Road
For many years, a lot of researches have been made to develop Advanced Driver Assistance Systems (ADAS) that are based on integrated systems. The main objective is to help drivers. Hence, keeping them safe under different driving conditions. Visibility for drivers remains the biggest problem faced on the road in an atmosphere of fog. In…
Read MoreCluster Centroid-Based Energy Efficient Routing Protocol for WSN-Assisted IoT
Wireless sensor network is highly resource constrained, where energy efficiency and network lifetime plays a major role for its sustenance. As the sensor nodes are battery operated and deployed in hostile environments, either recharging or replacement of batteries in sensor nodes is not possible after its deployment in inaccessible areas. In such condition, energy is…
Read MoreOptimization of the Procedures for Checking the Functionality of the Greek Railways: Data Mining and Machine Learning Approach to Predict Passenger Train Immobilization
Information is the driving force of businesses because it can ensure the ability of knowledge and prediction. The railway industry produces a huge volume of data, with the proper processing of them and the use of innovative technology, there is the possibility of beneficial information to be provided which constitute the deciding factor for the…
Read MoreCoastal Risk Modelling for Oil Spill in the Mediterranean Sea
The accident probability estimation and the consequence analysis are based on statistical data about oil spill accident occurrence in the Mediterranean area, on the probability of different release sizes, and on the joint probability of wind speed and directions. The risk model and its evaluation have been assessed for the Mediterranean littoral considering the time…
Read MoreDiffusion of Technology for Language Challenges in the South African Healthcare Environment
Even though mobile technologies are increasingly used to enable communications between providers and receivers of healthcare services, there remain severity challenges owing to the use of various indigenous languages in many Africa countries. Some of the challenges get worst in a countries like South Africa where there are eleven official languages. As a result, interpreters…
Read MoreUtilization of Data Mining to Predict Non-Performing Loan
In the banking industry, the existence of problem loans is inevitable. NPL (Non-Performing Loan) will certainly have an impact on the reduction in the capital of a bank. One good step in reducing the risk of credit default or the emergence of non-performing loans is to take proper care of debtors who begin to experience…
Read MoreNonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection
Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…
Read MoreCause of Time and Cost Overruns in the Construction Project in Nepal
There are many works in construction in Nepal. To build the country, there must be different buildings, roads, bridges, etc. with rapid flights. But here it seems to be slowly delayed for various reasons. Many people have studied in this regard. But no one seems to have thought about reducing it. Therefore, I have prepared…
Read MoreIndustry 4.0 Operators: Core Knowledge and Skills
One of the most important technological changes due to the arrival of Industry 4.0, an initial, gradual, and complex process of technology transfer is taking place, which strongly relies on the integration of universities, industries, and governments. In this context, to make the Industry 4.0 approach a reality, several requirements need to be met. One…
Read MoreModelling and Simulation of Aerodynamic Parameters of an Airship
The dynamic modelling of an airship is the primary requirement in designing and developing a control system for a particular application. Extracting/predicting/modelling the aerodynamic coefficients is a crucial step towards the modelling of an airship. There is a huge amount of literature on the aerodynamic modelling of airships which presents experimental as well as analytical…
Read MoreNearest Neighbour Search in k-dSLst Tree
In the last few years of research and innovations, lots of spatial data in the form of points, lines, polygons and circles have been made available. Traditional indexing methods are not perfect to store spatial data. To search for nearest neighbour is one of the challenges in different fields like spatiotemporal data mining, computer vision,…
Read MoreA Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network
Restoring, estimating the fully 3D hand skeleton and pose from the image data of the captured sensors/cameras applied in many applications of computer vision and robotics: human-computer interaction; gesture recognition, interactive games, Computer-Aided Design (CAD), sign languages, action recognition, etc. These are applications that flourish in Virtual Reality and Augmented Reality (VR/AR) technologies. Previous survey…
Read MoreComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreDesign of an EEG Acquisition System for Embedded Edge Computing
The human brain is one of the most complex machines on the planet. Being the only method to get real-time data with high temporal resolution from the brain makes EEG a highly sought upon signal in the neurological and psychiatric domain. However, recent developments in this field have made EEG more than just a tool…
Read MoreSmart Grid Users Benefits Based on DSM Algorithm Mathematical Optimization Problems Studied
The purpose of this research paper is to demonstrate that optimization of energy consumption, distributed generation and storage contribute towards mutually beneficial and satisfactory Demand Side Management algorithms that can be installed into consumer smart meters or in Home Energy Storage. A new solution based on an Energy Scheduling and Distributed Storage (ESDS) and Microgrid…
Read MoreMulti-Agent Data Recognition System Based on Received Signal in Antenna on Board Telecom System
Information data recognition during traditional operating step in telecommunication system, as their interpretation, presents an important active research field. In this context, we propose as a solution multi-agent data identification system starting with received signal parameters in antenna network connected on board telecom system. Due to the Information Identification Data (IID) response variability that differ…
Read MoreFraud Detection Call Detail Record Using Machine Learning in Telecommunications Company
Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…
Read MoreEnergy Recovery Equipment and Control Strategies in Various Climate Regions
Different types of air-to-air energy recovery technologies such as coil loops, heat pipes, sensible wheels, and total energy wheels are frequently incorporated in HVAC systems in an attempt to reduce energy consumption. This study examines the impact of various types of energy recovery technologies and capacity control strategies on a building’s cooling, heating, and fan…
Read MoreA Mobile Application Design to Prevent Criminal Acts in Lima, Peru
In the province of Lima, Peru, criminal acts are increasing every day; it is a social problem that affects many people, who often try with the life of the indignant person, becoming the greatest fear of the community. For this reason, a mobile application was designed that allows the inhabitants to report and share the…
Read MoreAdapting to Individual Differences (ATID) For Inductive Thinking and Learning Purpose
The research in general aims to develop students’ writing skills by applying a model with reader response strategy and visual symbols to promote students’ morals. Specifically, this inquiry is expected to describe the acceptability, comparison, impact, strength, and shortcomings, and the model Adapting To Individual Differences (ATID) of Indonesian literature learning to promote writing skills.…
Read MoreCitizen Behavior: The Evaluation of Complaint Application that Connected to Smart City
SIARAN is application which is created by Government of South Tangerang City, Indonesia. The application is e-government services social media based. It is designed for citizens to be able to report problems that occur around South Tangerang City. The research was conducted to find out the factors that affect the intention of SIARAN’s users. The…
Read MoreA Novel Representative k-NN Sampling-based Clustering Approach for an Effective Dimensionality Reduction-based Visualization of Dynamic Data
Visualization plays a crucial role in the exploratory analysis of Big Data. The direct visualization of Big Data is a challenging task and difficult to analyze. Dimensionality Reduction techniques extract the features in the context of visualization. Due to the unsupervised and non-parametric nature, most of the dimensionality reduction techniques are not evaluated quantitatively and…
Read MoreOffline Signature Recognition and Verification Using ORB Key Point Matching Techniques
An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…
Read More
