Results (2367)
Search Parameters:
Keyword: REField Oriented Control and Commutation Based on Sensorless Methods for High-Speed Electrical Motors of Unmanned Multicopters
In recent years, unmanned aerial vehicles (UAVs), especially small and light multicopters driven by electrical motors and batteries, have experienced a boom in applications. The electrical drive system is a central component of these UAVs. This paper introduces the basics of these drives and presents control methods for them using permanent magnet synchronous motors (PMSMs).…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read MoreBlockchain Applications in Suning and PingAn
The emergence of blockchain technology has facilitated the digital transformation of many businesses and thereby increased the competitiveness of China in the global market. As a cutting-edge technology, Blockchain has significantly influenced the practices across all business sectors. Focusing on the retail and insurance sectors, this paper analyzes the blockchain technology applications in two companies…
Read MoreAutomatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking
In recent years, people-counting problems have increased in popularity, especially in crowded indoor spaces, e.g., public transport. In peak hours, trains move significant numbers of passengers, producing delays and inconveniences for their users. Therefore, analysing how people use public transport is essential to solving this problem. The current analysis estimates how many people are inside…
Read MoreSensitive Analysis in Holding and Penalty Costs for the Stochastic Sequencing Problem in Agile Manufacturing
In agile manufacturing, due to the desire to meet customer’s requirements, processing times are stochastic because operations could be done by robots or humans. This can cause several problems in scheduling the jobs, and it is necessary to select the dispatch rule with the least change in costs and times, to respond quickly to different…
Read MoreA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read MoreEffect of Knee Orthosis on Lateral Thrust in Patients with Knee Osteoarthritis
To examine the effects of wearing a flexible knee orthosis (FKO) on the lateral thrust in patients with knee osteoarthritis (OA) by changing the wearing pressure. This study was a cross-sectional study. Thirteen patients (mean age: 82.8 ± 7.5years with Kellgren Lawrence Stages I and II knee OA were included and prescribed FKO. Patient with…
Read MoreAn Improved Model to Analyze the Impact of Cyber-Attacks on Power Systems
In this paper, an improved model has been proposed for investigating the impact of cyber-attacks on power systems regarding frequency disturbances and voltage disruption while changing the load called ICAPS. The proposed ICAPS model is formulated by five different controllers, such as LFC, AGC, AGC-PID, AVR, and AVR-PID, implemented in two sets of the system…
Read MoreDeep Learning in Monitoring the Behavior of Complex Technical Systems
The article is devoted to the methods of monitoring and control of vibration processes occurring in the structure and units of complex and unique electromechanical equipment. The monitoring object is considered as a dynamic multidimensional information object, for the study of which analytical and numerical methods of modeling and simulation of multidimensional chaotic systems are…
Read MoreScalability of Multi-Stage Nested Mach-Zehnder Interferometer Optical Switch with Phase Generating Couplers
A nested Mach-Zehnder interferometer (MZI) configuration whose phase shifters are placed in parallel is suitable for silicon-silica hybrid structure to realize a high-speed optical switch. Even when the signal wavelength deviates from an optimal wavelength, the crosstalk of the nested MZI optical switch can be suppressed by employing phase generating couplers (PGCs) in place of…
Read MorePerformance Adjustment Factor for Fixed Solar PV Module
There are different factors which contribute to the amount of output power which can be delivered by solar photovoltaic (PV) module at any time of the year. The factors include but not limited to solar irradiation, ambient temperature, relative humidity, wind velocity, position of sun in the sky, geographical position of installed solar PV module…
Read MoreARAIG and Minecraft: A Modified Simulation Tool
Various interruptions to the daily lives of researchers have necessitated the usage of simulations in projects which may not have initially relied on anything other than physical inquiry and experiments. The programs and algorithms introduced in this paper, which is an extended version of research initially published in ARAIG And Minecraft: A COVID-19 Workaround, create…
Read MoreComputer Vision Radar for Autonomous Driving using Histogram Method
Mobility is a fundamental human desire. All societies aspire to safe and efficient mobility at low ecological and economic costs. ADAS systems (Advanced Driver Assistance Systems) are safety systems designed to eliminate human error in driving vehicles of all types. ADAS systems such as Radars use advanced technologies to assist the driver while driving and…
Read MoreMaintainability Improving Effects such as Insulation Deterioration Diagnosis in Solitary Wave Track Circuit
This paper is an extended version of the journal presented at ICECCME2021. In ICECCME2021, the authors presented that we have developed a solitary wave track circuit (SW-TC), and it is energy-saving compared to existing track circuits. Furthermore, we also explained that it can realize advanced train control at a low cost, equivalent to digital automatic…
Read MoreLung Cancer Tumor Detection Method Using Improved CT Images on a One-stage Detector
Owing to the recent development of AI technology, various studies on computer-aided diagnosis systems for CT image interpretation are being conducted. In particular, studies on the detection of lung cancer which is leading the death rate are being conducted in image processing and artificial intelligence fields. In this study, to improve the anatomical interpretation ability…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MorePhysical and Emission Properties of Blended Bio-Coal Briquettes Derived from Agro-Wastes in Nigeria
Nigeria has one of the highest deforestation rates in the world, due mainly to felling of trees for fuelwood and charcoal production. This challenge could be managed if agricultural waste briquettes are used to augment the fuelwood demand for cooking energy provisioning. Energy density of biomass fuels can be raised by blending with coal, but…
Read MoreHole-Confined Polar Optical Phonon Interaction in \(\mathrm{Al_{0.35}Ga_{0.65}As/GaAs/Al_{0.25}Ga_{0.75}As}\) Quantum Wells
In Al0.35Ga0.65As/GaAs/Al0.25Ga0.75As quantum wells, the hole-confined polar optical phonon interaction is investigated. To calculate the valence band structure, we use the Luttinger-Kohn Hamiltonian with the k.p method. Within the dielectric continuum model, the hole-confined phonon scattering rates of intrasubband heavy holes in quantum well are calculated. It is found that the scattering rates are governed…
Read MoreTowards a Model-based and Variant-oriented Development of a System of Systems
The development of an aggregated system consisting of autonomously developed components is usually implemented as a self-contained unit. If such an aggregation is understood as a system of systems (SoS) that communicates via interfaces with its autonomous subsystems and components, the interfaces and communication exchange should play a central role in the architectural design. In…
Read MoreAnalysis Methods and Classification Algorithms with a Novel Sentiment Classification for Arabic Text using the Lexicon-Based Approach
Social networks have become a valuable platform for tracking and analyzing Internet users’ feelings. This analysis provides crucial information for decision-making in various areas, such as politics and marketing. In addition to this challenge and our interest in the field of big data and sentiment analysis in social networks, we have dedicated this work to…
Read MoreMethodology for Calculating Shock Loads on the Human Foot
The leading place among diseases of the musculoskeletal system is occupied by various feet deformations. Clinical movement analysis and posturological examination are required to objectively assess the distribution for load caused by the weight of human body on the feet and its locomotion effect. In normal conditions, the foot is exposed to elastic deformations. When…
Read MoreTowards a Framework for Organizational Transformation through Strategic Design Implementation
The aim of the research is to contribute to the emergent field of strategic design as an approach to creating transformational impacts in organizations. This is driven by international strategies to promote sustainable business environments which are innovative and adaptive to change. The literature identifies a gap in the knowledge in relation to how knowledge…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read More
