Results (502)
Search Parameters:
Keyword: NetworkWeb Application Interface Data Collector for Issue Reporting
Insufficient information is often pointed out as one of the main problems with bug reports as most bugs are reported manually, they lack detailed information describing steps to reproduce the unexpected behavior, leading to increased time and effort for developers to reproduce and fix bugs. Current bug reporting systems lack support for self-hosted systems that…
Read MoreIoT and Business Intelligence Based Model Design for Liquefied Petroleum Gas (LPG) Distribution Monitoring
Gas leakage caused by various causes poses significant risks to public safety. To address this problem, an intelligent model is proposed for the accurate monitoring of Liquefied Petroleum Gas (LPG) distribution based on the integration of Internet of Things (IoT) and Business Intelli- gence (BI) technologies. Through the use of sensors and actuators, it seeks…
Read MoreAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreEfficient Deep Learning-Based Viewport Estimation for 360-Degree Video Streaming
While Virtual reality is becoming more popular, 360-degree video transmission over the Internet is challenging due to the video bandwidth. Viewport Adaptive Streaming (VAS) was proposed to reduce the network capacity demand of 360-degree video by transmitting lower quality video for the parts of the video that are not in the current viewport. Understanding how…
Read MoreOptimal Engagement of Residential Battery Storage to Alleviate Grid Upgrades Caused by EVs and Solar Systems
The integration of distributed energy resources has ushered in a host of complex challenges, significantly impacting power quality in distribution networks. This work studies these challenges, exploring issues such as voltage fluctuations and escalating power losses caused by the integration of solar systems and electric vehicle (EV) chargers. We present a robust methodology focused on…
Read MoreTracing the Evolution of Machine Translation: A Journey through the Myanmar (Burmese)-Wa (sub-group of the Austro-Asiatic language) Corpus
Machine Translation (MT) has come a long way toward reducing linguistic gaps. However, its progress in efficiently handling low-resource languages—such as the Wa language in the Myanmar-Wa corpus—has not received enough attention. This study begins with a thorough investigation of the historical development of MT systems, painstakingly following their development against the complex background of…
Read MoreAnalysis of Emotions and Movements of Asian and European Facial Expressions
The aim of this study is to develop an advanced framework that not only recognize the dominant facial emotion, but also contains modules for gesture recognition and text-to-speech recognition. Each module is meticulously designed and integrated into unified system. The implemented models have been revised, with the results presented through graphical representations, providing prevalent emotions…
Read MoreStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreTowards Real-Time Multi-Class Object Detection and Tracking for the FLS Pattern Cutting Task
The advent of laparoscopic surgery has increased the need to incorporate simulator-based training into traditional training programs to improve resident training and feedback. However, current training methods rely on expert surgeons to evaluate the dexterity of trainees, a time-consuming and subjective process. Through this research, we aim to extend the use of object detection in…
Read MoreImplementation of a GAS Injection Type Prefabricated Lifting Device for Underwater Rescue Based on Location Tracking
In this paper, we have developed a gas injection-type prefabricated lifting device based on location tracking to efficiently lift the human body in the event of an accident that occurs underwater on the sea or land. The efficiency of the lifting system is very important to ensure the golden time of the rescue and the…
Read MoreEEG Feature Extraction based on Fast Fourier Transform and Wavelet Analysis for Classification of Mental Stress Levels using Machine Learning
Mental stress assessment remains riddled with biases caused by subjective reports and individual differences across societal backgrounds. To objectively determine the presence or absence of mental stress, there is a need to move away from the traditional subjective methods of self-report questionnaires and interviews. Previously, it has been evidence that EEG Oscillations can discriminate mental…
Read MoreSocial Media Text Summarization: A Survey Towards a Transformer-based System Design
Daily life is characterized by a great explosion of abundance of information available on the internet and social media. Smart technology has radically changed our lives, giving a leading role to social media for communication, advertising, information and exchange of opinions. Managing this huge amount of data by humans is an almost impossible task. Adequacy…
Read MoreCondition Assessment of Medium Voltage Assets: A Review
Condition assessment of medium voltage assets is essential to ensure reliability and cost-effective operation of power distribution networks. This article presents a literature review of condition assessment of medium voltage assets related to a distribution system in a non-interconnected zone in Colombia, namely, power transformers, photovoltaic systems, switchgear, lines and cables, and instrument transformers. Advanced…
Read MoreDoubling the Number of Connected Devices in Narrow-band Internet of Things while Maintaining System Performance: An STC-based Approach
Narrow-band Internet of Things (NB-IoT) is a low-power wide-area network (LPWAN) method that was first launched by the 3rd generation partnership project (3GPP) Rel-13 with the purpose of enabling low-cost, low-power, and wide-area cellular connections for the Internet of Things (IoT). As the demand for over-the-air services grows and with the number of linked wireless…
Read MoreWaterfall: Salto Collazo. High-Level Design of Tokenomics
This article explains the fundamental principles of the economic policy that are integrated into the decentralized public platform Waterfall. The platform has a DAG (Directed Acyclic Graph) based system architecture and is designed to develop decentralized applications and financial services. The main goal of this work is to create a favorable environment that incentivizes positive…
Read MoreForecasting Bitcoin Prices: An LSTM Deep-Learning Approach Using On-Chain Data
Over the past decade, Bitcoin’s unprecedented performance has underscored its po-sition as the premier asset class. Starting from an insignificant value and reaching an astounding high of around 65,000 U.S dollars in 2021 – all without a central con-trolling authority – Bitcoin’s trajectory is undoubtedly a historical feat. Its intangible nature, initially a subject of…
Read MoreAccuracy Improvement-Based Wireless Sensor Estimation Technique with Machine Learning Algorithms for Volume Estimation on the Sealed Box
Currently, the quality and quantity of product must be inspected before transporting. Currently the popular unsealing box product inspecting is performed by weighing the box where the errors occur according to the tolerance of the weighting machine and tolerance weight of the product. On the other hand, the quantity of product can be inspected automatically…
Read MoreHistoChain: Improving Consortium Blockchain Scalability using Historical Blockchains
Blockchain technology has been successfully applied in many fields for immutable and secure data storage. However, for applications with on-chain big data, blockchain scalability remains to be a main concern. In this paper, we propose a novel scalable storage scheme, called HistoChain, for a consortium blockchain network to manage blockchain data. We use a current…
Read MoreForecasting the Weather behind Pa Sak Jolasid Dam using Quantum Machine Learning
This paper extends the idea of creating a Quantum Machine Learning classifier and applying it to real weather data from the weather station behind the Pa Sak Jonlasit Dam. A systematic study of classical features and optimizers with different iterations of parametrized circuits is presented. The study of the weather behind the dam is based…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreDevelopment and Analysis of Models for Detection of Olive Trees
In this paper, an automatic method for detection of olive trees in RGB images acquired by an unmanned aerial vehicle (UAV) is developed. Presented approach is based on the implementation of RetinaNet model and DeepForest Phyton package. Due to fact that original (pretrained) model used in DeepForest package has been built on images of various…
Read MoreDay-Ahead Power Loss Minimization Based on Solar Irradiation Forecasting of Extreme Learning Machine
Power losses exist naturally and have to be cared for in the operation of electrical power systems. Many researchers have worked on various methods and approaches to reduce losses by incorporating distributed generators (DG), particularly from renewable sources. These studies are based on the maximum unit penetration of the DGs, which is rarely achieved, resulting…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read More
