Results (2352)
Search Parameters:
Keyword: SEAssessment of Electromagnetic-Based Sensing Modalities for Red Palm Weevil Detection in Palm Trees
In this paper, we investigate the utilization of three effective detection methods to identify potential threats of insects in date palm trees. The detection techniques presented here are the application of infrared radiation, microwave antennas and metamaterials based sensors. Experimental trials using IR radiation took place in a local farm. Moreover, the second sensing system…
Read MoreUsing Dynamic Market-Based Control for Real-Time Intelligent Speed Adaptation Road Networks
Traffic road management is becoming more complex due to limited resources and an increasing number of hybrid vehicles. Currently, a number of global classical computing tools are used to manage the traffic road network. This kind of classical computing is resource intensive and expensive, and in the best case, optimizing a traffic network takes a…
Read MoreLow-cost Smart Basket Based on ARM System on Chip Architecture: Design and Implementation
This paper presents the design and implementation of a low-cost basket based on an ARM system on chip architecture using Raspberry Pi single board computer. The inspiration of this research is how to support the traditional low-income retail store in Thailand driving the local micro-business deal with the economic impacts of survival business from the…
Read MoreA Supervised Building Detection Based on Shadow using Segmentation and Texture in High-Resolution Images
Building detection in aerial or satellite imagery is one of the most challenging tasks due to the variety of shapes, sizes, colors, and textures of man-made objects. To this end, in this paper, we propose a novel approach to extracting buildings in high-resolution images based on prior knowledge of the shadow position. Firstly, the image…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MoreAntenna System Design To Increase Power Transfer Efficiency with NFC Wireless Charging Technology
The NFC wireless charging feature is an extension of the NFC technology that can be implanted on wearables. The purpose of this paper is to show how to increase power transfer efficiency on both transmitter and receiver antenna systems. To demonstrate this problematic, firstly this paper gives an overview of how this NFC feature is…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read MoreA New Technique to Accelerate the Learning Process in Agents based on Reinforcement Learning
The use of decentralized reinforcement learning (RL) in the context of multi-agent systems (MAS) poses some difficult problems. The speed of the learning process for example. Indeed, if the convergence of these algorithms has been widely studied and mathematically proven, they suffer from being very slow. In this context, we propose to use RL in…
Read MoreTowards a Model-based and Variant-oriented Development of a System of Systems
The development of an aggregated system consisting of autonomously developed components is usually implemented as a self-contained unit. If such an aggregation is understood as a system of systems (SoS) that communicates via interfaces with its autonomous subsystems and components, the interfaces and communication exchange should play a central role in the architectural design. In…
Read MoreAnalysis Methods and Classification Algorithms with a Novel Sentiment Classification for Arabic Text using the Lexicon-Based Approach
Social networks have become a valuable platform for tracking and analyzing Internet users’ feelings. This analysis provides crucial information for decision-making in various areas, such as politics and marketing. In addition to this challenge and our interest in the field of big data and sentiment analysis in social networks, we have dedicated this work to…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreInterpretable Rules Using Inductive Logic Programming Explaining Machine Learning Models: Case Study of Subclinical Mastitis Detection for Dairy Cows
With the development of Internet of Things technology and the widespread use of smart devices, artificial intelligence is now being applied as a decision-making tool in a variety of fields. To make machine learning models, including deep neural network models, more interpretable, various techniques have been proposed. In this paper, a method for explaining the…
Read MoreAn Interdisciplinary Approach to Fracture of Solids from the Standpoint of Condensed Matter Physics
Instead of approaches of solid mechanics or a formal description of experimental data an interdisciplinary approach is proposed to consider failure and deformation as thermodynamic processes. Mathematical modeling of the processes is carried out using rheological models of the material. One fracture criterion is used, that formally corresponds to the achievement of a threshold concentration…
Read MoreSolar Energy Assessment, Estimation, and Modelling using Climate Data and Local Environmental Conditions
On Renewable Energy (RE), this field covers the most significant share of the world energy demand and challenges on the expensive measurement and maintenance equipment to be used. In all studies and designs, global solar radiation (GSR) measurements require assessment, estimation, and models to be applied together with the environment and meteorological data on installing…
Read MoreOn the Construction of Symmetries and Retaining Lifted Representations in Dynamic Probabilistic Relational Models
Our world is characterised by uncertainty and complex, relational structures that carry temporal information, yielding large dynamic probabilistic relational models at the centre of many applications. We consider an example from logistics in which the transportation of cargoes using vessels (objects) driven by the amount of supply and the potential to generate revenue (relational) changes…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreAutomated Hydroponic System using Wireless Sensor Networks
Researchers have associated agriculture and food processing with adverse environmental impacts like; falls in the underground freshwater table, energy consumption, and high carbon emission. These factors have the worst effect on developing countries. Therefore, there is a need for on-demand food production techniques that require minimum resource utilization. For these reasons, scientists are now focusing…
Read MoreOptimization of the Sliding Mode Control (SMC) with the Particle Swarm Optimization (PSO) Algorithm for Photovoltaic Systems Based on MPPT
Photovoltaic systems are classified as non-linear systems. On the other hand, the characteristics of photovoltaic cells are non-linear. For this reason, researchers use several methods of maximum power monitoring (MPPT) to improve the performance of photovoltaic system. It is therefore necessary to use an adaptation stage between the photovoltaic generator (GPV) and the load to…
Read MoreSynthesis and Characterization of CN Thin Films Produced by DC-Pulsed Sputtering in an \(CH_3CH_2OH-N_2\) Atmosphere
This paper reports on the successful deposition of amorphous carbon nitride thin films (a-CNx). Samples were deposited using a DC-pulsed sputtering technique in CH3CH2OH-N2 atmosphere at constant pressure (1 Torr). Raman spectra were collected to investigate the bonding structure of the deposed thin films, while scanning electron microscopy (SEM) and atomic force microscopy (AFM) were…
Read MoreOpinion and Effectiveness of Kahoot! use in Online Distance Learning in Crop Production at Higher Education Level: A Case of Study
Kahoot is one of the most popular learning platforms, with over 2.5 billion players per year worldwide, used mainly for knowledge review through gamification. However, students´ opinion and its effectiveness in online distance learning as well as in another language teaching has been little studied. With these aims, this study was carried out in the…
Read MoreSelf-Regulated Learning and Academic Achievement of Physics Students in Selected Secondary Schools in Aguata Local Government Area of Anambra State, Nigeria
The research investigated the consequence of self-regulated learning on students’ academic performance in physics, using selected public co-education schools in Aguata Educational Zone, Anambra State as the research area. The study became necessary as a result of the observed persistent poor performance of the student in Physics in external examinations over the years. The study…
Read More
