Results (532)
Search Parameters:
Keyword: SystemsDesign and Analysis of a Virtual Synchronous Generator Control Scheme to Augment FRT Capability of PMSG-Based Wind Turbine
Massive integration of inverter dominated renewable energy systems (RESs), i.e., wind turbines (WTs), reduces the reliance on conventional alternator-based power stations. The system inertia and damping aspects of the power system were significantly decreased by this extensive integration of inverter-based WT system, which impacts on the fault ride-through (FRT) competence and thus precipitates the frequency…
Read MoreA Review of the Role of Information Technology in Brazilian Higher Educational Institutions during Covid-19 Pandemic
This paper presents the results of a documentary research on the use of information technology in emergency remote teaching in 66 higher educational institutions in Brazil. The theoretical background of this study is based on the works of Feenberg, Bagglaey, Veloso & Mill, Castañeda & Selwyn and Hodges. The methodological approach consisted of analyzing reports…
Read MoreDesigning the MIMO SDR-based Antenna Array for 5G Telecommunication
With the significant spread of 5G telecommunication systems, the demand for high quality of service and better coverage is growing rapidly. Multiple-input–multiple-output is planned to be among the key technologies in 5G telecommunication’s field. In this article, a new fully digital 2×2 MIMO testbed is implemented, using USRP B210 and 2 pairs of microstrip antennas…
Read MoreProcess Mining in Healthcare: A Systematic Literature Review and A Case Study
Process mining is an innovative technique through which inefficiencies in production systems can be eliminated. This technique has therefore become very important internationally in recent years and is also useful for pursuing the improvement of production systems by extrapolating process knowledge from event logs recorded by information systems. Process mining has easy application in production…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreDeveloping CubeSat and AI Framework for Crowd Management Case of Short-Term Large-Scale Events
Many consequences can be resulted in mismanagement of crowd, which might get people injured or even lose their lives. Thus, crowd management helps in controlling overcrowded areas during events, and allowing authorities to monitor, manage and reduce incidents. Space science and technology have made huge leap in crowd management, let alone when this technology integrated…
Read MoreA Cloud Telemedicine Platform Based on Workflow Management System: A Review of an Italian Case Study
The paper aims to describe a new technological and organizational approach in order to manage teleconsultation and telemonitoring processes involving a Physician, who remotely interacts with one or more Specialists, in order to evaluate and discuss the specific clinical conditions of a patient, based primarily on the sharing of digital clinical data, reports and diagnostic…
Read MoreAdvantages of 3D Technology in Stereometry Training
This paper presents a new software for stereometry training. Its name is StereoMV (Stereo Math Vision). It is results from a dissertation work on the topic “Stereoscopic Training System”. It introduces virtual reality systems that are both immersive and non-immersive. The difference between them is in the equipment and the stereo effect they offer. A…
Read MoreRegular Tessellation-Based Collective Movement for a Robot Swarm with Varying Densities, Scales, and Shapes
In complex swarm robotic applications that perform different tasks such as transportation and observation, robot swarms should construct and maintain a formation to adapt and move as a single large-scale robot. For example, transportation and observation tasks require unique robot swarms with either high densities to support the weight of the transported objects or low…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreModel Order Reduction and Distribution for Efficient State Estimation in Sensor and Actuator Networks
We present in this contribution the distribution of a global multi-input-multi-output system in a sensor and actuator network. Based on controllability and observability, the global system is decentralized and the system properties are preserved as a result. This results in multiple decentralized local single-input-single-output systems with the same system order as the global system. As…
Read MoreA DC Grid-Connected PV Microgrid Regulated via Digital and MBPC Cascade Control Strategies
The current paper focuses on the design of cascade control systems employed in photovoltaic (PV) powered microgrids (MG), which have been well received in remote agricultural farms in Ecuador. The study case is composed of a three-phase inverter powered by a DC-DC converter fed by a PV array and its control system. To simulate the…
Read MoreA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read MoreAssessing the Impact of Integrating Solar PV System using the Equal Area Criterion Method
The impact of previous energy crisis gives an insight into what happens when the oil price crashes. Μany countries were affected due the slow reaction in boosting the economic growth in key sectors such as oil-importing activities and the economic restructuring progress to face the challenges. But the present energy crisis resulting from the COVID-19…
Read MoreAnalysis of Different Supervised Machine Learning Methods for Accelerometer-Based Alcohol Consumption Detection from Physical Activity
This paper builds on the realization that since mobile devices have become a common tool for researchers to collect, process, and analyze large quantities of data, we are now entering a generation where the creation of solutions to difficult real-world problems will mostly come in the form of mobile device apps. One such relevant real-life…
Read MoreBER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks
In the time past, virtually all the contemporary communication systems depend on distinct source and channel encoding schemes for data transmission. Irrespective of the recorded success of the distinct schemes, the new developed scheme known as joint source channel coding technique has proven to have technically outperformed the conventional schemes. The aim of the study…
Read MoreA Machine Learning Model Selection Considering Tradeoffs between Accuracy and Interpretability
Applying black-box ML models in high-stakes fields like criminology, healthcare and real-time operating systems might create issues because of poor interpretability and complexity. Also, model building methods that include interpretability is now one of the growing research topics due to the absence of interpretability metrics that are both model-agnostic and quantitative. This paper introduces model…
Read MoreComputer Vision Radar for Autonomous Driving using Histogram Method
Mobility is a fundamental human desire. All societies aspire to safe and efficient mobility at low ecological and economic costs. ADAS systems (Advanced Driver Assistance Systems) are safety systems designed to eliminate human error in driving vehicles of all types. ADAS systems such as Radars use advanced technologies to assist the driver while driving and…
Read MoreLung Cancer Tumor Detection Method Using Improved CT Images on a One-stage Detector
Owing to the recent development of AI technology, various studies on computer-aided diagnosis systems for CT image interpretation are being conducted. In particular, studies on the detection of lung cancer which is leading the death rate are being conducted in image processing and artificial intelligence fields. In this study, to improve the anatomical interpretation ability…
Read MoreA Constrained Intelligent Nonlinear Control Method for Redundant Robotic Manipulators
Redundant robotic systems provide great challenges in solving kinematics and control problems, that are yet also open opportunities for exploring new, diverse and intelligent ideas and methods. In this paper, an advanced control method is proposed for position control problems of redundant robots with output constraints. The controller is structured with two control layers. In…
Read MoreAntenna System Design To Increase Power Transfer Efficiency with NFC Wireless Charging Technology
The NFC wireless charging feature is an extension of the NFC technology that can be implanted on wearables. The purpose of this paper is to show how to increase power transfer efficiency on both transmitter and receiver antenna systems. To demonstrate this problematic, firstly this paper gives an overview of how this NFC feature is…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreA New Technique to Accelerate the Learning Process in Agents based on Reinforcement Learning
The use of decentralized reinforcement learning (RL) in the context of multi-agent systems (MAS) poses some difficult problems. The speed of the learning process for example. Indeed, if the convergence of these algorithms has been widely studied and mathematically proven, they suffer from being very slow. In this context, we propose to use RL in…
Read MoreEncompassing Chaos in Brain-inspired Neural Network Models for Substance Identification and Breast Cancer Detection
The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial…
Read MoreHeuristic Analysis of Overall Performance Measurement Perception and Management in Automotive Industry
Overall Performance (OP) measurement is an essential instrument in sustainable manufacturing implementation and management. The effective use of key performance indicators (KPIs) can potentially contribute to identify the firm’s overall performance, provide the crucial gaps between desired results and current actions, and thus facilitate the implementation and execution of improvement strategies. This study attempts to…
Read More
