Results (2349)
Search Parameters:
Keyword: ARA Constrained Intelligent Nonlinear Control Method for Redundant Robotic Manipulators
Redundant robotic systems provide great challenges in solving kinematics and control problems, that are yet also open opportunities for exploring new, diverse and intelligent ideas and methods. In this paper, an advanced control method is proposed for position control problems of redundant robots with output constraints. The controller is structured with two control layers. In…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MoreAutomated Robotic System for Sample Preparation and Measurement of Heavy Metals in Indoor Dust Using Inductively Coupled Plasma Mass Spectrometry (ICP-MS)
Dust is ubiquitous in our daily environment—outdoor and indoor. In modern times, people often spend the majority of their time at home, in offices, at work or in schools. Suspended particles such as tiny crumbs up to long fibers generate indoor dust deposits. Inhouse sources are the interior releasing abraded fibers from carpets, bedding and…
Read MoreAntenna System Design To Increase Power Transfer Efficiency with NFC Wireless Charging Technology
The NFC wireless charging feature is an extension of the NFC technology that can be implanted on wearables. The purpose of this paper is to show how to increase power transfer efficiency on both transmitter and receiver antenna systems. To demonstrate this problematic, firstly this paper gives an overview of how this NFC feature is…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read MoreHole-Confined Polar Optical Phonon Interaction in \(\mathrm{Al_{0.35}Ga_{0.65}As/GaAs/Al_{0.25}Ga_{0.75}As}\) Quantum Wells
In Al0.35Ga0.65As/GaAs/Al0.25Ga0.75As quantum wells, the hole-confined polar optical phonon interaction is investigated. To calculate the valence band structure, we use the Luttinger-Kohn Hamiltonian with the k.p method. Within the dielectric continuum model, the hole-confined phonon scattering rates of intrasubband heavy holes in quantum well are calculated. It is found that the scattering rates are governed…
Read MoreA New Technique to Accelerate the Learning Process in Agents based on Reinforcement Learning
The use of decentralized reinforcement learning (RL) in the context of multi-agent systems (MAS) poses some difficult problems. The speed of the learning process for example. Indeed, if the convergence of these algorithms has been widely studied and mathematically proven, they suffer from being very slow. In this context, we propose to use RL in…
Read MoreGeneralized Linear Model for Predicting the Credit Card Default Payment Risk
Predicting the credit card default is important to the bank and other lenders. The credit default risk directly affects the interest charged to the borrower and the business decision of the lenders. However, very little research about this problem used the Generalized Linear Model (GLM). In this paper, we apply the GLM to predict the…
Read MoreTowards a Model-based and Variant-oriented Development of a System of Systems
The development of an aggregated system consisting of autonomously developed components is usually implemented as a self-contained unit. If such an aggregation is understood as a system of systems (SoS) that communicates via interfaces with its autonomous subsystems and components, the interfaces and communication exchange should play a central role in the architectural design. In…
Read MoreAnalysis Methods and Classification Algorithms with a Novel Sentiment Classification for Arabic Text using the Lexicon-Based Approach
Social networks have become a valuable platform for tracking and analyzing Internet users’ feelings. This analysis provides crucial information for decision-making in various areas, such as politics and marketing. In addition to this challenge and our interest in the field of big data and sentiment analysis in social networks, we have dedicated this work to…
Read MoreTowards a Framework for Organizational Transformation through Strategic Design Implementation
The aim of the research is to contribute to the emergent field of strategic design as an approach to creating transformational impacts in organizations. This is driven by international strategies to promote sustainable business environments which are innovative and adaptive to change. The literature identifies a gap in the knowledge in relation to how knowledge…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreInterpretable Rules Using Inductive Logic Programming Explaining Machine Learning Models: Case Study of Subclinical Mastitis Detection for Dairy Cows
With the development of Internet of Things technology and the widespread use of smart devices, artificial intelligence is now being applied as a decision-making tool in a variety of fields. To make machine learning models, including deep neural network models, more interpretable, various techniques have been proposed. In this paper, a method for explaining the…
Read MoreAn Interdisciplinary Approach to Fracture of Solids from the Standpoint of Condensed Matter Physics
Instead of approaches of solid mechanics or a formal description of experimental data an interdisciplinary approach is proposed to consider failure and deformation as thermodynamic processes. Mathematical modeling of the processes is carried out using rheological models of the material. One fracture criterion is used, that formally corresponds to the achievement of a threshold concentration…
Read MoreForensic Analysis of “WhatsApp” Artifacts in Android without Root
WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve…
Read MoreSolar Energy Assessment, Estimation, and Modelling using Climate Data and Local Environmental Conditions
On Renewable Energy (RE), this field covers the most significant share of the world energy demand and challenges on the expensive measurement and maintenance equipment to be used. In all studies and designs, global solar radiation (GSR) measurements require assessment, estimation, and models to be applied together with the environment and meteorological data on installing…
Read MoreOnline Support for Tertiary Mathematics Students in a Blended Learning Environment
The context for the study was a naturally occurring quasi-experiment in the core mathematics program in a large Australian university. Delivery of teaching was changed in a sequence of two initial core mathematics subjects taken by engineering and science students. The change replaced one of two face-to-face tutorial classes per week by an online tutorial.…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreOptimization of the Sliding Mode Control (SMC) with the Particle Swarm Optimization (PSO) Algorithm for Photovoltaic Systems Based on MPPT
Photovoltaic systems are classified as non-linear systems. On the other hand, the characteristics of photovoltaic cells are non-linear. For this reason, researchers use several methods of maximum power monitoring (MPPT) to improve the performance of photovoltaic system. It is therefore necessary to use an adaptation stage between the photovoltaic generator (GPV) and the load to…
Read MoreSynthesis and Characterization of CN Thin Films Produced by DC-Pulsed Sputtering in an \(CH_3CH_2OH-N_2\) Atmosphere
This paper reports on the successful deposition of amorphous carbon nitride thin films (a-CNx). Samples were deposited using a DC-pulsed sputtering technique in CH3CH2OH-N2 atmosphere at constant pressure (1 Torr). Raman spectra were collected to investigate the bonding structure of the deposed thin films, while scanning electron microscopy (SEM) and atomic force microscopy (AFM) were…
Read MorePhysics behind the Concept of a Sodium-Potassium-Cesium-Cooled Martian Nuclear Reactor
The main goal of the work is to determine the basic conceptual solutions of a nuclear reactor operating on the surface of another planet. The problem was solved using the example of the Martian nuclear power plant. The article uses calculation and optimization research methods and corresponding program codes (well-known and author’s). The results of…
Read MoreOpinion and Effectiveness of Kahoot! use in Online Distance Learning in Crop Production at Higher Education Level: A Case of Study
Kahoot is one of the most popular learning platforms, with over 2.5 billion players per year worldwide, used mainly for knowledge review through gamification. However, students´ opinion and its effectiveness in online distance learning as well as in another language teaching has been little studied. With these aims, this study was carried out in the…
Read MoreSelf-Regulated Learning and Academic Achievement of Physics Students in Selected Secondary Schools in Aguata Local Government Area of Anambra State, Nigeria
The research investigated the consequence of self-regulated learning on students’ academic performance in physics, using selected public co-education schools in Aguata Educational Zone, Anambra State as the research area. The study became necessary as a result of the observed persistent poor performance of the student in Physics in external examinations over the years. The study…
Read More
