Results (301)
Search Parameters:
Keyword: ApplicationsAlternative Real-time Image-Based Smoke Detection Algorithm
Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreReview on Smart Electronic Nose Coupled with Artificial Intelligence for Air Quality Monitoring
With the advent of the Internet of Things Technologies (IOT), smart homes, and smart city applications, E-Nose was created. Almost of gas sensors consisting the electronic nose system suffer from cross sensitivity and lack of selectivity. Coupling smart gas sensors with artificial intelligence algorithms can thus empower conventional gas sensing technologies and increase accuracy in…
Read MoreA Resolution-Reconfigurable Asynchronous SAR ADC with Segmented and Non-Binary Weighted Capacitance DACs
With the addition of thing of internet applications to 5G smartphones, mobile standby time and ultra-low-power sensing systems have become increasingly important. Nowadays, such sensing systems typically reduce power consumption to microwatts. This paper presents segmented and non-binary weighted capacitance DACs, low power, high resolution, an asynchronous clock, a spark-detect, vcm-based switching and direct switching,…
Read MoreCombination of Salient Object Detection and Image Matching for Object Instance Recognition
Object Instance Recognition aims to classify objects specifically and usually use a single reference image. It is possible to be used in many applications such as visual search, information retrieval and augmented reality. However, various things affect the appearance of the objects, which makes the recognition process harder, especially if a single reference image is…
Read MoreOn the Ensemble of Recurrent Neural Network for Air Pollution Forecasting: Issues and Challenges
Time-series is a sequence of observations that are taken sequentially over time. Modelling a system that generates a future value from past observations is considered as time-series forecasting system. Recurrent neural network is a machine learning method that is widely used in the prediction of future values. Due to variant improvements on recurrent neural networks,…
Read MoreScapy Scripting to Automate Testing of Networking Middleboxes
Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…
Read MoreControl of Electrostatic Suspension System Using Pulse Width Modulation
Electrostatic suspension systems have great potential applications in contactless transportation objects since they allow many different materials to be suspended. The electrostatic suspension will be widely applied in practice if the system cost is inexpensive. This paper presents an electrostatic suspension system controlled by using pulse width modulation (PWM). The use of PWM in electrostatic…
Read MoreThe Implementation of Smart Farming Application Based on the Microcontroller and Automatic Sprinkler Irrigation System of Agricultural Land
This research to applying the application of e-smart farming to control the sprinkler irrigation on agricultural land. This study aims to be able to help farmers to solve the watering problems that are manually carried out into watering done automatically and controlled, besides that this research also obtained data about the level of moisture content…
Read MoreDesign and Validation of a Meter Band Rate in OpenFlow and OpenDaylight for Optimizing QoS
Technological developments in the Internet and communications have created a vastly complex and dynamic context with diverse heterogeneous networks and fast growth of mobile devices and multimedia. As the Internet becomes the primary mode of communication for many organisations there is requirement to enhance quality of service (QoS) from heterogeneous systems and networks. Traditional networks…
Read MoreDistributed Linear Summing in Wireless Sensor Networks with Implemented Stopping Criteria
Many real-life applications based on the wireless sensor networks are equipped with data aggregation mechanisms for suppressing or even overcoming negative environmental effects and data redundancy. In this paper, we present an extended analysis of the linear average consensus algorithm for distributed summing with bounded execution over wireless sensor networks. We compare a centralized and…
Read MoreEffects of Split Ring Resonator (SRR) Metamaterial on the Radiation Pattern and Variation of the Heating Focus Point of the Microstrip Patch Antenna
Metamaterial antennas are some sort of antennas which utilize metamaterials to improve the efficiency of small (small electrical) antenna systems and also enhance the antenna’s radiation pattern. The unusual properties of metamaterials such as coefficients of permittivity and permeability, as well as the negative refractive index, have led to increase the use of these artificial…
Read MoreFramework for Automation of Cloud-Application Testing using Selenium (FACTS)
A framework is an amalgamation of integrated tools, libraries, utilities and its coordination to interact with the other automation components. The motive of designing a test automation framework is to implement uniform standards towards automation throughout the organization to achieve the desired outcomes. Test automation framework is required to maintain the standardization of the activities…
Read MoreBiometric System Vulnerabilities: A Typology of Metadata
This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…
Read MoreTesting Web Service Compositions: Approaches, Methodology and Automation
Web services give a new view of the web as the biggest, widely accepted and the most straightforward distributed software platform. Their composition into applications and business processes is still a complex, non-trivial task, requiring highly rational efforts not only from the software developers, but from the quality assurance specialists. The provision if web service…
Read MorePerformance Portability and Unified Profiling for Finite Element Methods on Parallel Systems
The currently available variety of modern, highly-parallel universal processors includes multi-core CPU and many-core GPU (Graphics Processing Units) from different vendors. Systems composed of such processors enable high-performance execution of demanding applications like numerical Finite Element Methods. However, today’s application pro- gramming for parallel systems lacks performance portability: the same program code cannot achieve stable…
Read MoreAdvanced Hybrid Energy Harvesting Systems for Unmanned Aerial Vehicles (UAVs)
The recent use of rotary-wing unmanned aerial vehicles (UAVs) has gained significant interest and continuously been implemented since they are used across the world for civilian, commercial, as well as military applications. The drawback of UAVs is the fight-time due to the limited battery capacity. Therefore, energy harvesting (EH), captured energy from the ambient environment…
Read MoreA Method for Mosaicking Aerial Images based on Flight Trajectory and the Calculation of Symmetric Transfer Error per Inlier
In recent years, development of aerial autonomous systems and cameras have allowed increasing enormously the number of aerial images, and their applications in many research areas. One of the most common applications is the mosaicking of images to improve the analysis by getting representations of larger areas with high spatial resolution. This paper describes a…
Read MoreSmart Ambulance: Speed Clearance in the Internet of Things paradigm using Voice Chat
In recent years, researchers have focused on the development of many applications of information and communication which could lead to enhance human life. The congestion and road traffic are one of the most problems facing the ambulance transportation to provide fast healthcare services for patients. In this work, a tracking and data transfer system has…
Read MoreIntelligent Wireless System for PV Supervision Based on The Raspberry Pi
Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…
Read MoreEKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection
Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…
Read MoreStability Analysis of a Linear Model Predictive Control and its Application in a Water Recovery Process
This paper examines application of linear general model predictive control (LGMPC). The stability of the LGMPC is proven by means of a demonstration of a theorem stating a sufficient and constructive condition. Lower bounds conditions are found for one of these matrices and then a system with saturation is taken into consideration. The conditions can…
Read MorePriority Incorporated Zone Based Distributed Clustering Algorithm for Heterogeneous Wireless Sensor Network
Wireless sensor networks (WSNs) are considered to be the currently flourishing scientific domain, thereby found to be applicable in numerous industrial and domestic applications. As per the mathematical results in Pulse-coupled oscillator (PCO), it has been predicted that, numerous iterations are needed for convergence, leading to increased power consumption. Biologically inspired solutions are greatly applicable…
Read MoreAn Integrated Framework for Pronominal Anaphora Resolution in Malayalam
Anaphora resolution is one of the old problems in Natural Language Processing. It is the process of identifying the antecedent of an anaphoric expression in a natural language text. Most of the NLP applications such as text summarization, question answering, information extraction, machine translation etc. require the successful resolution of anaphors. In this paper, we…
Read MorePrediction of Non-Communicable Diseases Using Class Comparison Data Mining
Data mining is recognized as an effective technique for extracting and retrieving valuable information or decision from the vast available data. Because of the nature of the functionality of medical centers and hospitals, their data centers contain a collection of valuable information about their patients. By properly processing these data, different applications can be developed…
Read More
