Results (380)
Search Parameters:
Keyword: NeedModified Blockchain based Hardware Paradigm for Data Provenance in Academia
Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…
Read MoreSwitching Capability of Air Insulated High Voltage Disconnectors by Active Add-On Features
The need of add-on features (secondary contacts) for current paths of air insulated high voltage disconnectors switching capabilities (e.g. bus transfer switching) is introduced. The relevant product components for the switching capability and their functionality is described, which is giving boundary conditions for adding features necessary to achieve the switching capability. Possible features are discussed…
Read MoreThe Role of RFID in Green IoT: A Survey on Technologies, Challenges and a Way Forward
The Internet of Things (IoT) is a technology that enables communication between everyday life using different sensor actuators that work together to identify, capture, and distribute critical data from the planet. Massive machines and devices are therefore linked and communicate with them. The use of resources in this area presents new challenges for this technology.…
Read MoreStandardized UCI-EGO Dataset for Evaluating 3D Hand Pose Estimation on the Point Cloud
To evaluate and compare methods in computer vision, scientists must use a benchmark dataset and unified sets of measurements. The UCI-EGO dataset is a standard benchmark dataset for evaluating Hand Pose Estimation (HPE) on depth images. To build robotic arms that perform complex operations such as human hands, the poses of the human hand need…
Read MoreAn Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware
Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…
Read MoreA Machine Vision Approach for Underwater Remote Operated Vehicle to Detect Drowning Humans
Today, Drowning is the 3rd major cause for unintentional injury death accounting for 7% of deaths of all injury deaths. Drowning is a state of suffocation when water or other fluids accumulate the lungs, resulting in respiratory impairment, ultimately leading to death. The predominant problem during rescue operations of such accidental drowning is to locate…
Read MoreNew Properties of Crimes in Virtual Environments
Virtual reality is a technology that literally allows constructing of a new reality for its users. VR has huge potential, it is able to change social life, communications, and the academic sphere, but VR may also be applied by criminals. In the present paper properties of potentially committed crimes in VR are analyzed. It is…
Read MoreFeatures Preference using Conjoint Analysis Method for E-marketplace Social Care System
With the features of the application system make it easier for users to transact, make the user feel comfortable in using the application system. The problem is that the intensity of application usage decreases judging by the application rating given by the user each time they perform a transaction, this is because the company initially…
Read MoreA Software-Defined Network Approach for The Best Hospital Localization Against Coronavirus (COVID-19)
Traditional networks have difficulty in meeting the technological developments and the continuous increase in the size of data to be processed. Software-Defined Network (SDN) approach has emerged as an alternative to traditional networks. SDN separates the control and data planes from each other and manages the network over the control plane with flexibility and cost…
Read MoreProphet Architecture in Normalized Meter Energy Consumption Prediction on Building
Normalized Metered Energy Consumption (NMEC) is a solution for investors in determining the best energy-saving strategy for buildings. But on the other hand, investors need a fast and reliable evaluation results in measuring how effective the savings methods they use without wasting money. To address this issue, we selected Facebook’s latest predictive time series method…
Read MoreImplementation of a Journalist Business Intelligence in Social Media Monitoring System
The need to update the news at this time is very important. Journalists have responsibilities as their job. Apart from conveying the correct news to the public, they must also deliver it quickly. Journalists who are tasked as news seekers must always be updated about the latest news that is viral, therefore a journalist must…
Read MoreSocial skills and Resilience in Adolescents of Secondary Education of the Kumamoto I 3092 Educational Institution, of the Puente Piedra District – Lima 2019
Social skills are the behaviors that the individual adopts on a regular basis at specific moments in everyday life. Resilience is the way in which the individual faces the adversity that life imposes on them, as well as manages to overcome it. In adolescence, problems are perceived because important changes are generated in an accelerated…
Read MoreSH-CNN: Shearlet Convolutional Neural Network for Gender Classification
Gender detection and age estimation become an active research area and a very important field today, wish has been widely used in various applications including them: biometrics, social network, Targeted advertising, access control, human-computer interaction, electronic customer, etc. The need to further improve the recognition or classification rate keeps increasing day after day. In this…
Read MoreEmpirical Probability Distributions with Unknown Number of Components
We consider the estimation of empirical probability distributions, both discrete and continuous. We focus on deriving formulas to estimate number of categories for the discrete distribution, when the number of categories is hidden, and the means and methods to estimate the number of components in the Gaussian mixture model representing a probability density function given…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read MoreTowards a Documents Processing Tool using Traceability Information Retrieval and Content Recognition Through Machine Learning in a Big Data Context
In 1980, an application was developed to track, manage and store documents in electronic format. Scan technology has enabled organizations to digitize papers for easier document storage and tracking. Document management tools have since developed by introducing new functionalities, related to security, users services, workflow and audit. Our research is part of the context of…
Read MorePriority-based Scheduling Algorithm for NOMA-integrated V2X
The fifth-generation (5G) wireless system was implemented due to the massive connectivity, especially Internet of Things (IoT) including industrial automation, Vehicle to Everything (V2X) communications, which is shelter an extensive range of applications services and use cases and Intelligent Transportation Systems (ITS). A cellular Non-Orthogonal Multiple Access (NOMA) based on radio resource allocation schemes need…
Read MoreEvolution of Teaching Approaches for Science, Engineering and Technology within an Online Environment: A Review
The emergence of the COVID-19 pandemic earlier this year destabilised the operations in the education sector, particularly in institutions of higher learning. Most of these institutions are now expected to teach online, assess their students using non-venue examinations and offer remote laboratory practical and experiments. However, many of these institutions were not prepared for such…
Read MoreDefeating Anti-Debugging Techniques for Malware Analysis Using a Debugger
Cyberattacks such as spear phishing and malspam pretending to be companies, institutes, and government officials are increasing and evolving. Malware has a variety of purposes, such as collecting personal information and illegal access to the system. New types of malware are increasing every day, and many malware programs spread all over the Internet, causing severe…
Read MoreAn Efficient Performance of OFDM-Shaped Symbol for 5G Green Communication Compared to FBMC
The filter bank multi-carrier (FBMC) technique is being considered as the major candidates for the 5G schemes. The orthogonal frequency division multiplexing (OFDM) technique is used in 4G but it has drawbacks such as higher Out-of-Band (OOB) power reduction, and higher peak to average power ratio (PAPR). OFDM uses cyclic prefix (CP) extension to overcome…
Read MoreA Novel Approach of Smart Logistics for the Health-Care Sector Using Genetic Algorithm
The heath-care sector has confronted significant difficulties in the past few years due to several issues such as insufficient human resources, budget cuts, and shortage of equipment and drugs. The logistics in the health-care sector take an extensive part of the budget, especially since it is the main axis to provide the hospital’s pharmacies with…
Read MoreDeveloping a Modular Material-Based Independent Training Model for Primary School Teacher Training
This study is based on the challenges related to the low quality of education in Indonesia. One of the reasons for these challenges is the low ability of teachers to conduct professional tasks. Future demands for teachers’ professionalization will be higher, considering the rapid development of society, science and technology, and current global competitiveness. In…
Read MoreDesign of a Mobile Application for the School Enrollment Process in Order to Prevent Covid-19
In 2020, a great change occurred around the world due to the covid-19 pandemic, daily activities were restructured and thanks to technological advance it has been an ideal means to carry out remote work. With regard to education in Peru, it was paralyzed for a long time and only obtained in later months the option…
Read MoreEvaluation of the Living Condition in Fishermen Settlement in the Coastal Area of Marisa City, Gorontalo Province
The population living in the residential area in two villages, including Pohuwato village and Pohuwato Timur village, are mostly fishermen, who live under the poverty line, meaning that the people there have low income. The objective of the present study was to explore the living condition in terms of the physical, social, and economic aspects…
Read MoreAn Analysts’ Skills: Bespoke Software vs Packaged Software at Small Software Vendors
SMEs usually succeed in today market since they achieve unique things in the business market. Therefore, SMEs look to keep their business benefit by avoiding any regulation conducted of software. Executed software packaged at SMEs consequently provides obstacle concerning to misfits between software services process and SMEs business process. Hence software analysts’ skills are a…
Read More
