Results (552)
Search Parameters:
Keyword: ISIMobility Intelligence: Machine Learning Methods for Received Signal Strength Indicator-based Passive Outdoor Localization
Knowledge of pedestrian and vehicle movement patterns can provide valuable insights for city planning. Such knowledge can be acquired via passive outdoor localization of WiFi-enabled devices using measurements of Received Signal Strength Indicator (RSSI) from WiFi probe requests. In this paper, which is an extension of the work initially presented in WiMob 2021, we continue…
Read MoreTransfer and Ensemble Learning in Real-time Accurate Age and Age-group Estimation
Aging is considered to be a complex process in almost every species’ life, which can be studied at a variety of levels of abstraction as well as in different organs. Not surprisingly, biometric characteristics from facial images play a significant role in predicting human’s age. Specifically, automatic age estimation in real-time situation has begun to…
Read MoreOptimizing Sensors Locations for Tsunami Warning System
To reduce the time necessary for determination of tsunami source parameters it is proposed to optimize the location of sensors system and to use only a part of the measured wave profile. Based on computation, it is possible to balance the number of sensors in use and the time period after the earthquake needed to…
Read MoreInterference-Aware Nodes Deployment of a LoRa-Based Architecture for Smart Agriculture in the Southern Region of Senegal
In Senegal, agriculture has always been seen as the foundation on which the socioeconomic development of the country rests. However, in the rural world, agriculture remains traditional at a time when the challenges of food self-sufficiency to accompany emergence are launched. In the southern part of Senegal commonly called Casamance, the abundance of rain makes…
Read MoreConsideration of Ambiguity in the Analysis Phase of Data Warehouses
We are interested in taking into account ambiguity in the analysis phase of data warehouses, using fuzzy logic. We want to offer decision makers the possibility of using natural language in this phase. We created in a previous work the Baccalaureate fuzzy data warehouse which we were able to query with seven natural language terms…
Read MoreEmerging Trends in Green Best Practices and the Impact on Government Policy
While it is commonly accepted that climate change needs to be addressed to protect both human and environmental health, it is not widely understood what steps need to be taken to accomplish this daunting task. Additionally, there is currently no formal definition of what constitutes a ‘green’ company or ‘green’ best practice, despite the rising…
Read MoreA Review of the Role of Information Technology in Brazilian Higher Educational Institutions during Covid-19 Pandemic
This paper presents the results of a documentary research on the use of information technology in emergency remote teaching in 66 higher educational institutions in Brazil. The theoretical background of this study is based on the works of Feenberg, Bagglaey, Veloso & Mill, Castañeda & Selwyn and Hodges. The methodological approach consisted of analyzing reports…
Read MoreBirds Images Prediction with Watson Visual Recognition Services from IBM-Cloud and Conventional Neural Network
Bird watchers and people obsessed with raising and taming birds make a kind of motivation about our subject. It consists of the creation of an Android application called ”Birds Images Predictor” which helps users to recognize nearly 210 endemic bird species in the world. The proposed solution compares the performance of the python script, which…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreRedesign and Improvement in the Management of the Raw Material Inventory Control Process with Oracle APEX
Having reasonable inventory control is a priority for any company because a lack of inventory could incur economic losses. Not having the necessary stock for the timely production of your orders could generate dissatisfaction in your customers and possibly cause them to lose them. Likewise, reasonable inventory control allows quick decision-making for the company’s benefit.…
Read MoreA Cloud Telemedicine Platform Based on Workflow Management System: A Review of an Italian Case Study
The paper aims to describe a new technological and organizational approach in order to manage teleconsultation and telemonitoring processes involving a Physician, who remotely interacts with one or more Specialists, in order to evaluate and discuss the specific clinical conditions of a patient, based primarily on the sharing of digital clinical data, reports and diagnostic…
Read MoreBangla Speech Emotion Detection using Machine Learning Ensemble Methods
Emotion is the most important component of being human, and very essential for everyday activities, such as the interaction between people, decision making, and learning. In order to adapt to the COVID-19 pandemic situation, most of the academic institutions relied on online video conferencing platforms to continue educational activities. Due to low bandwidth in many…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreAdvantages of 3D Technology in Stereometry Training
This paper presents a new software for stereometry training. Its name is StereoMV (Stereo Math Vision). It is results from a dissertation work on the topic “Stereoscopic Training System”. It introduces virtual reality systems that are both immersive and non-immersive. The difference between them is in the equipment and the stereo effect they offer. A…
Read MoreHybrid Neural Network Method for Predicting the SOH and RUL of Lithium-Ion Batteries
The use of a battery to power an electrical or electronic system is accompanied by battery management, i.e. a set of measures intended to preserve it for preventative maintenance, thus the cost reduction. This management is generally based on two key parameters, the (remaining useful life) RUL and the (State-of-health) SOH, which relate respectively to…
Read MoreAssessing the Impact of Integrating Solar PV System using the Equal Area Criterion Method
The impact of previous energy crisis gives an insight into what happens when the oil price crashes. Μany countries were affected due the slow reaction in boosting the economic growth in key sectors such as oil-importing activities and the economic restructuring progress to face the challenges. But the present energy crisis resulting from the COVID-19…
Read MoreDeep Learning in Monitoring the Behavior of Complex Technical Systems
The article is devoted to the methods of monitoring and control of vibration processes occurring in the structure and units of complex and unique electromechanical equipment. The monitoring object is considered as a dynamic multidimensional information object, for the study of which analytical and numerical methods of modeling and simulation of multidimensional chaotic systems are…
Read MoreAnalysis of Different Supervised Machine Learning Methods for Accelerometer-Based Alcohol Consumption Detection from Physical Activity
This paper builds on the realization that since mobile devices have become a common tool for researchers to collect, process, and analyze large quantities of data, we are now entering a generation where the creation of solutions to difficult real-world problems will mostly come in the form of mobile device apps. One such relevant real-life…
Read MoreBER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks
In the time past, virtually all the contemporary communication systems depend on distinct source and channel encoding schemes for data transmission. Irrespective of the recorded success of the distinct schemes, the new developed scheme known as joint source channel coding technique has proven to have technically outperformed the conventional schemes. The aim of the study…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreThe use of Integrated Geophysical Methods to Assess the Petroleum Reservoir in Doba Basin, Chad
Hydrocarbon exploration and production has been successful in the central region of Doba basin, Chad, north-central Africa. In order to optimize the hydrocarbon production in this area, the combination of seismic and well log datas have been processed and analyzed to better characterize, image and capture the reservoirs. The 3D seismic and well log datas…
Read MoreLung Cancer Tumor Detection Method Using Improved CT Images on a One-stage Detector
Owing to the recent development of AI technology, various studies on computer-aided diagnosis systems for CT image interpretation are being conducted. In particular, studies on the detection of lung cancer which is leading the death rate are being conducted in image processing and artificial intelligence fields. In this study, to improve the anatomical interpretation ability…
Read MoreA Supervised Building Detection Based on Shadow using Segmentation and Texture in High-Resolution Images
Building detection in aerial or satellite imagery is one of the most challenging tasks due to the variety of shapes, sizes, colors, and textures of man-made objects. To this end, in this paper, we propose a novel approach to extracting buildings in high-resolution images based on prior knowledge of the shadow position. Firstly, the image…
Read MoreNiO Quantum dots Doped Triple Cation Perovskite \(\mathrm{CsMAFAPbI_2Br_2}\) Heterojunction Photodetector with High Responsivity
Optoelectronic devices applications based on Organic–inorganic perovskites are promising and effective low-cost energy materials due to their exceptional physical properties which include high carrier mobility, high optical absorption coefficient, and long carrier diffusion length. In the presented work, a TiO2/NiO+5% Fe quantum dots (QDs)–doped CsMAFAPbI2Br2 perovskite heterojunction broadband photodetector was fabricated on FTO/glass substrate. The…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read More
