Results (578)
Search Parameters:
Keyword: ApplicationText Line Segmentation on Myanmar Handwritten Document using Average Linkage Clustering Algorithm
Text line segmentation from document images is a significant challenge in the field of document image analysis. It involves extracting individual text lines from Myanmar handwritten document images to enable text recognition. This task becomes particularly challenging in Myanmar handwritten documents, especially those with irregular or cursive writing styles, due to variations in line spacing,…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreImpact of Integrating Chatbots into Digital Universities Platforms on the Interactions between the Learner and the Educational Content
The rapid expansion of digital universities across Africa addresses the need for scalable higher education solutions, but challenges such as limited physical infrastructure and high dropout rates persist. In digital learning environments, effective interaction with educational content is crucial for student success. This article explores the transformative role of chatbots integrated into digital university platforms,…
Read MoreLightning Detection System for Wind Turbines Using a Large-Diameter Rogowski Coil
A lightning detection system based on a large-diameter Rogowski coil and an analog integrator was developed for wind turbine applications and is presented in this paper. To accurately detect lightning current, the Rogowski coil was designed with a lower cutoff frequency of 0.1 Hz. The analog integrator, comprising an inverting active integrator, and an amplifier,…
Read MoreTrue Random Number Generator Implemented in ReRAM Crossbar Based on Static Stochasticity of ReRAMs
True Random Number Generators (TRNG) find applications in various fields, especially hardware security. We suggest a TRNG that exploits the intrinsic static stochasticity of Resistive Switching Random Access Memories (ReRAMs) to generate random bits. Other suggested designs use stochasticity in the switching mechanism, which requires high precision over input voltage and time. In the proposed…
Read MoreAssistive System for Collaborative Assembly Task using Augmented Reality
Augmented reality (AR) technology has been increasingly used in developing teaching materials with the aim of sparking more interest in technology (T) and engineering (E) among students in STEM education. In the proposed system, AR is integrated with an educational robot controlled by a KidBright microcontroller board, developed by the Educational Technology research team (EDT)…
Read MoreDigitalization Review for American SMEs
SME big data maturity models will be reviewed in this study to identify systematic publications related to the subject. For SMEs to remain competitive, digitalization is essential. Due to limited resources, SMEs need to be more proactive in digitalization. Still, the benefits, such as operational efficiency, cost reduction, quality improvement, and innovative culture, make digitalization…
Read MoreAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreTracing the Evolution of Machine Translation: A Journey through the Myanmar (Burmese)-Wa (sub-group of the Austro-Asiatic language) Corpus
Machine Translation (MT) has come a long way toward reducing linguistic gaps. However, its progress in efficiently handling low-resource languages—such as the Wa language in the Myanmar-Wa corpus—has not received enough attention. This study begins with a thorough investigation of the historical development of MT systems, painstakingly following their development against the complex background of…
Read MoreStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreA Smart Farming Management System based on IoT Technologies for Sustainable Agriculture
Advances in Internet of Things (IoT) and wireless technologies are revolutionizing various sectors, including environment, education, healthcare, industry, etc. In the same dynamic, as the world population constantly evolves, solutions based on such technologies need to be proposed to improve the agricultural sector. Senegalese agriculture, primarily rain-fed and based on both cash crops and subsistence…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreA Secure Medical History Card Powered by Blockchain Technology
A reliable healthcare system ensures that the population has access to top-notch medical ser- vices, ultimately enhancing their overall health most efficiently. At times, data are not secured or handled appropriately. Addressing these concerns, blockchain technology is projected to bring about a substantial revolution in the medical industry by assuring the confidentiality of electronic health…
Read MoreModeling Control Agents in Social Media Networks Using Reinforcement Learning
Designing efficient control strategies for opinion dynamics is a challenging task. Understanding how individuals change their opinions in social networks is essential to countering malicious actors and fake news and mitigating their effect on the network. In many applications such as marketing design, product launches, etc., corporations often post curated news or feeds on social…
Read MoreThe Graded Multidisciplinary Model: Fostering Instructional Design for Activity Development in STEM/STEAM Education
In a challenging and increasingly technological world, it is important to promote critical thinking, multidisciplinary problem solving, and collaboration through STEAM education; however, there are important economic, administrative, and especially pedagogical manage- ment limitations for its implementation at the secondary level. Therefore, this paper presents systematic recommendations for an effective and sustainable implementation of STEAM…
Read MoreFeedback Controller for Longitudinal Stability of Cessna182 Fixed-Wing UAVs
Unmanned aerial vehicles (UAVs) are becoming increasingly popular for both civil and military applications. Unmanned aerial vehicles can be categorized into two categories: rotary-wing and fixed-wing. Due to its capacity to fly long distances and carry substantial payloads, fixed-wing UAVs are gaining popularity and are currently utilized for various tasks. However, when confronted with disturbances…
Read MoreAugmented Reality Based Visual Programming of Robot Training for Educational Demonstration Site
The human resource development of robotics and automation in the smart factory is an important factor in “Thailand 4.0” roadmap, which is following the industry 4.0 model. To pursue this goal of Thailand 4.0 roadmap of labor development, the effective and intuitive training system must be easy to understand. This study proposes the implementation of…
Read MoreFPGA Implementation of 5G NR LDPC Codes
As a result of rising expectations for quality, the employment of advanced technical requirements for future fifth-generation (5G) new radio is required. The error-correction coding method is one of the most important components of a new generation. The 5G NR New Radio Low-Density Parity Check (LDPC) codes, which have been adopted by the 5G standard,…
Read MoreDistribution Management Problem: Heuristic Solution for Vehicle Routing Problem with Time Windows (VRPTW) in the Moroccan Petroleum Sector
The attributes of the vehicle routing problem (VRP) are as many additional characteristics or constraints which aim to better take into account the specificities of real application cs. The variants of the VRP thus formed are the support of an extremely rich literature, comprising an immense variety of heuristics. This article constitutes an industrial application…
Read MoreProportional Derivative and Proportional Integral Derivative Controllers for Frequency Support of a Wind Turbine Generator in a Diesel Generation Mix
The levelized cost of electricity production is highly dependent on the cost of fuel oil on the world market. In order to reduce the dependency on the fuel oil, many countries are adopting an energy transition towards distributed generation. Distributed generation can be described as various means of generating electricity at or near where it…
Read MoreA Circuit Designer’s Perspective to MOSFET Behaviour: Common Questions and Practical Insights
Metal Oxide Semiconductor Field-Effect Transistors are commonly taught in courses for electrical engineers as they are the most common components within integrated circuits. However, despite numerous papers and books on MOSFETs, students still struggle with understanding their behaviour, particularly in the saturation region. This paper presents an expanded explanation of MOSFET behaviour, with a consistent…
Read MoreLocalization of Impulsive Sound Source in ShallowWaters using a Selective Modal Analysis Algorithm
Passive remote monitoring applications of underwater signal processing in a shallow water environment are an impactful area of research for environmental and marine-life monitoring. The majority of the sound source localization techniques require carefully placed synchronized hydrophone arrays, which can be complicated and hard to maintain. In this paper, we utilized the modal dispersions of…
Read MoreThe Design, Optimization, and Experimental Study of Hub and Axial Flux BLDC Motor Under Operating Conditions For Light Electric Vehicles
In this study, we conducted an experimental study and efficiency optimization of the outer rotor (hub) BLDC (brushless direct current) motor and axial BLDC motor for light electric vehicles. Both motors were investigated in the simulation environment and experimentally. The axial flux BLDC motor had a rated power of 10 KW, and a rated speed…
Read MoreWaterfall: Salto Collazo. High-Level Design of Tokenomics
This article explains the fundamental principles of the economic policy that are integrated into the decentralized public platform Waterfall. The platform has a DAG (Directed Acyclic Graph) based system architecture and is designed to develop decentralized applications and financial services. The main goal of this work is to create a favorable environment that incentivizes positive…
Read MoreHistoChain: Improving Consortium Blockchain Scalability using Historical Blockchains
Blockchain technology has been successfully applied in many fields for immutable and secure data storage. However, for applications with on-chain big data, blockchain scalability remains to be a main concern. In this paper, we propose a novel scalable storage scheme, called HistoChain, for a consortium blockchain network to manage blockchain data. We use a current…
Read More
