Results (2107)
Search Parameters:
Keyword: ATESystem Control Device Electronics Smart Home Using Neural Networks
The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system…
Read MoreA Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method
One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…
Read MoreAnalysis of Learning Development With Sugeno Fuzzy Logic And Clustering
In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…
Read MoreCombination of Caesar Cipher Modification with Transposition Cipher
The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…
Read MoreCollaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma
Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MoreLow-cost Hybrid Wheelchair Controller for Quadriplegias and Paralysis Patients
Wheelchair controller design is very important for handicapped users such as quadriplegia, amputee, paralyzed and elderly. The safe use, easiness, and comfort are an important factor that can directly affect the user’s social efficiency and quality of life. In this paper, the design, implementation, and test of a new low-cost hybrid wheelchair controller for quadriplegics…
Read MoreComputer Aided Classification using Support Vector Machines in Detecting Cysts of Jaws
Jaw cyst is one of the most common pathology observed in the field of dentistry. Early detection of the cystic lesion will help the surgeons to take appropriate therapeutic measures after a thorough diagnostic procedure. One of the challenging task for surgeons is to differentiate the cysts from the other pathologies. The appearance of these…
Read MoreMulti Level Integrity Management in LTE/LTE-A Networks
The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…
Read MoreHuman Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots
In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of…
Read MoreIncorporating Spatial Information for Microaneurysm Detection in Retinal Images
The presence of microaneurysms(MAs) in retinal images is a pathognomonic sign of Diabetic Retinopathy (DR). This is one of the leading causes of blindness in the working population worldwide. This paper introduces a novel algorithm that combines information from spatial views of the retina for the purpose of MA detection. Most published research in the…
Read MoreOptimisation of Software-Defined Networks Performance Using a Hybrid Intelligent System
This paper proposes a novel intelligent technique that has been designed to optimise the performance of Software Defined Networks (SDN). The proposed hybrid intelligent system has employed integration of intelligence-based optimisation approaches with the artificial neural network. These heuristic optimisation methods include Genetic Algorithms (GA) and Particle Swarm Optimisation (PSO). These methods were utilised separately…
Read MoreA Novel Dual-Band Rectenna for Ambient RF Energy Harvesting at GSM 900 MHz and 1800 MHz
This paper presents a novel dual-band rectenna for RF energy harvesting system. This rectenna is created from a dual-band antenna and a dual-band rectifier which operates at GSM bands (900 MHz and 1800 MHz). The printed monopole antenna is miniaturized by two meander-lines. The received signal from the receiving antenna is rectified by a voltage…
Read MorePower requirements and battery life measurement for wireless transmission between two nodes in different mediums
One of the most important roles of the wireless sensor networks (WSN) is to avoid wiring costs, be self-sustainable and be able to function for several years. However, due to the slow progress in battery technology, power continues to be a limited resource in wireless sensor communication and electric energy storage remains to be an…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MoreFAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle
One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…
Read MoreThe Search for a Convergent Option to Deploy Smart Grids on IoT Scenario
Smart city projects are quickly evolving in several countries as a feasible solution to the urban organization to provide sustainable socioeconomic growth and solve problems that arise as the populations of these cities grow. In this sense, technology application plays an important role in enabling automation of processes, improving the citizen’s quality of life and…
Read MoreImpact of PSS and SVC on the Power System Transient Stability
The Static Var Compensator (SVC) is used to improve the stability of the power system because of its role in injecting or absorbing the reactive power in the electrical transmission lines. The Power System Stabilizer (PSS) is also a control device which ensures maximum power transfer and thus the stability of the power system enhancement.…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read MoreHomemade array of surface coils implementation for small animal magnetic resonance imaging
Small animal modeling is an exciting research field where human pathogenic frameworks can be replicated in a controlled environment. Accurate Imaging is in high demand when modeling abnormalities and, magnetic resonance imaging plays a vital role due to its demonstrated lowest intrusion when compared with other imaging methods. However, the required high-resolution yields low-quality images…
Read MoreModelization of cognition, activity and motivation as indicators for Interactive Learning Environment
In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…
Read MoreA delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances
In this paper, a delay-dependent controller based on the sliding mode concept is proposed to stabilize a networked robotic system in a decentralized synchronization scheme. In addition to being affected by communication time-delays between agents, and seen that external disturbances obviously affect any physical and dynamic system, an unsettling action resulting from measurement errors affects…
Read MoreSelf-Organizing Map based Feature Learning in Bio-Signal Processing
Feature extraction is playing a significant role in bio-signal processing. Feature identification and selection has two approaches. The standard method is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The…
Read MoreDesign, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators
Nowadays, compliant micro-motion stages offer high positioning accuracy and repeatability. When assembled with conventional stages, the resulting dual-range positioning systems allow for nanometer scale accuracy within a centimeter scale working area. However, such systems invoke a high cost and large footprint. This paper presents a low-cost, compact compliant XY micro-motion stage where dual-range manipulation has…
Read MoreRFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe
In this paper the design of a new 3D magnetic field (H-field) probe with a near-field scanning system is presented, then the near electromagnetic fields radiated by a Library RFID system is characterized. The proposed system is developed in order to determine the magnetic near-field emitted by electronic devices. The designed isotropic H-field probe consists…
Read More
