Results (1793)
Search Parameters:
Keyword: IAGNSS Positioning in Non-line-of-Sight Context—a Survey for Technological Innovation
Reliable, available and accurate localization of people and vehicles is one crucial requirement for intelligent transportation systems (ITSs). This has led to a variety of technical approaches in recent years. Towards an exact positioning via Global Navigation Satellite Systems (GNSSs) the visibility of satellites is an important factor. In this paper, we review the literature…
Read MoreIGS: The Novel Fast IC Power Ground Network Optimization Flow Based on Improved Gauss-Seidel Method
With silicon technology further scaling, the switching activities together with GHz operation frequency greatly affects the power integrity by generating large IR-drop noises. Excessive IR-drop causes functional failures such as timing failure, abnormal reset and SRAM flipping. The PGN needs to be optimized to reduce IR-drop. The traditional EDA optimization routine repeats the steps such…
Read MoreAnalysis of Learning Development With Sugeno Fuzzy Logic And Clustering
In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreSpatiotemporal Traffic State Prediction Based on Discriminatively Pre-trained Deep Neural Networks
The availability of traffic data and computational advances now make it possible to build data-driven models that capture the evolution of the state of traffic along modeled stretches of road. These models are used for short-time prediction so that transportation facilities can be operated in an efficient way that guarantees a high level of service.…
Read MoreComputer Aided Classification using Support Vector Machines in Detecting Cysts of Jaws
Jaw cyst is one of the most common pathology observed in the field of dentistry. Early detection of the cystic lesion will help the surgeons to take appropriate therapeutic measures after a thorough diagnostic procedure. One of the challenging task for surgeons is to differentiate the cysts from the other pathologies. The appearance of these…
Read MoreMulti Level Integrity Management in LTE/LTE-A Networks
The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…
Read MoreHuman Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots
In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of…
Read MoreData Error Detection and Recovery in Embedded Systems: a Literature Review
This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make…
Read MoreOptimisation of Software-Defined Networks Performance Using a Hybrid Intelligent System
This paper proposes a novel intelligent technique that has been designed to optimise the performance of Software Defined Networks (SDN). The proposed hybrid intelligent system has employed integration of intelligence-based optimisation approaches with the artificial neural network. These heuristic optimisation methods include Genetic Algorithms (GA) and Particle Swarm Optimisation (PSO). These methods were utilised separately…
Read MoreA Novel Dual-Band Rectenna for Ambient RF Energy Harvesting at GSM 900 MHz and 1800 MHz
This paper presents a novel dual-band rectenna for RF energy harvesting system. This rectenna is created from a dual-band antenna and a dual-band rectifier which operates at GSM bands (900 MHz and 1800 MHz). The printed monopole antenna is miniaturized by two meander-lines. The received signal from the receiving antenna is rectified by a voltage…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MoreFAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle
One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…
Read MoreThe Search for a Convergent Option to Deploy Smart Grids on IoT Scenario
Smart city projects are quickly evolving in several countries as a feasible solution to the urban organization to provide sustainable socioeconomic growth and solve problems that arise as the populations of these cities grow. In this sense, technology application plays an important role in enabling automation of processes, improving the citizen’s quality of life and…
Read MoreImpact of PSS and SVC on the Power System Transient Stability
The Static Var Compensator (SVC) is used to improve the stability of the power system because of its role in injecting or absorbing the reactive power in the electrical transmission lines. The Power System Stabilizer (PSS) is also a control device which ensures maximum power transfer and thus the stability of the power system enhancement.…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read MoreModelization of cognition, activity and motivation as indicators for Interactive Learning Environment
In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…
Read MoreSelf-Organizing Map based Feature Learning in Bio-Signal Processing
Feature extraction is playing a significant role in bio-signal processing. Feature identification and selection has two approaches. The standard method is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The…
Read MoreDesign, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators
Nowadays, compliant micro-motion stages offer high positioning accuracy and repeatability. When assembled with conventional stages, the resulting dual-range positioning systems allow for nanometer scale accuracy within a centimeter scale working area. However, such systems invoke a high cost and large footprint. This paper presents a low-cost, compact compliant XY micro-motion stage where dual-range manipulation has…
Read MoreRFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe
In this paper the design of a new 3D magnetic field (H-field) probe with a near-field scanning system is presented, then the near electromagnetic fields radiated by a Library RFID system is characterized. The proposed system is developed in order to determine the magnetic near-field emitted by electronic devices. The designed isotropic H-field probe consists…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MoreSegmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery
The evolution of technology has changed the face of education, especially when combined with appropriate pedagogical bases. This combination has created innovation opportunities in order to add quality to teaching through new perspectives for traditional methods applied in the classroom. In the Health field, particularly, augmented reality and interaction design techniques can assist the teacher…
Read MoreImage Segmentation Using Fuzzy Inference System on YCbCr Color Model
This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…
Read MoreVerifying the Detection Results of Impersonation Attacks in Service Clouds
A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…
Read More
