Results (880)
Search Parameters:
Keyword: ICIIntegrated GIS-SUE Map Cost Estimation System Prototype for Designing a Decision Support System
Subsurface Utility Engineering (SUE) is an international model for mapping and classifying underground surfaces according to their accuracy (acquisition method). Utilizing Geographic Information System (GIS) to map and present the SUE levels paved the way for producing a new Decision Support System (DSS) for the utility mapping process. The proposed system represents an efficient tool…
Read MoreAn Ensemble of Voting- based Deep Learning Models with Regularization Functions for Sleep Stage Classification
Sleep stage performs a vital role in people’s daily lives in the detection of sleep-related diseases. Conventional automated sleep stage classifier models are not efficient due to the complexity linked to the design of mathematical models and extraction of hand-engineering features. Further, quick oscillations amongst sleep stages frequently lead to indistinct feature extraction, which might…
Read MoreOn the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor
In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…
Read MoreNonlinear Model Predictive Control of Rover Robotics System
The paper presents two robust and efficient control algorithms based on (i) Optimal Control Allocation (OCA) and (ii) Nonlinear Model Predictive Control (NMPC). The robotics system consists of two rovers with mecanum wheels and mounted two 7-DOF arms carrying a common load. The overall system is an underdetermined one with non-holonomic constraints. The developed control…
Read MoreMeta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers
The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…
Read MoreInterference-Aware Nodes Deployment of a LoRa-Based Architecture for Smart Agriculture in the Southern Region of Senegal
In Senegal, agriculture has always been seen as the foundation on which the socioeconomic development of the country rests. However, in the rural world, agriculture remains traditional at a time when the challenges of food self-sufficiency to accompany emergence are launched. In the southern part of Senegal commonly called Casamance, the abundance of rain makes…
Read MoreOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read MoreEmerging Trends in Green Best Practices and the Impact on Government Policy
While it is commonly accepted that climate change needs to be addressed to protect both human and environmental health, it is not widely understood what steps need to be taken to accomplish this daunting task. Additionally, there is currently no formal definition of what constitutes a ‘green’ company or ‘green’ best practice, despite the rising…
Read MoreProcess Mining in Healthcare: A Systematic Literature Review and A Case Study
Process mining is an innovative technique through which inefficiencies in production systems can be eliminated. This technique has therefore become very important internationally in recent years and is also useful for pursuing the improvement of production systems by extrapolating process knowledge from event logs recorded by information systems. Process mining has easy application in production…
Read MoreDeveloping CubeSat and AI Framework for Crowd Management Case of Short-Term Large-Scale Events
Many consequences can be resulted in mismanagement of crowd, which might get people injured or even lose their lives. Thus, crowd management helps in controlling overcrowded areas during events, and allowing authorities to monitor, manage and reduce incidents. Space science and technology have made huge leap in crowd management, let alone when this technology integrated…
Read MoreThe Security of Information Systems and Image Processing Supported by the Quantum Computer: A review
The knowledge and understanding of the technology of quantum computers and their superiority over classical computers are still insufficient or uncertain for many communities of researchers, manufacturers, investors and the general public. For this reason, we try in this article to present and explain some of the basic concepts of quantum computers. We explain how…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read MoreLong-term Bottom-up Modeling of Renewable Energy Development in Morocco
Renewable energy is an essential source of green growth for countries facing a shortage of fossil fuels. They offer a sustainable, inexhaustible, carbon-free solution to the future energy dependency of nations. Morocco, which has no traditional energy resources, depends entirely on the international primary energy market to meet its growing demand. For this reason, Morocco…
Read MoreAutomatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking
In recent years, people-counting problems have increased in popularity, especially in crowded indoor spaces, e.g., public transport. In peak hours, trains move significant numbers of passengers, producing delays and inconveniences for their users. Therefore, analysing how people use public transport is essential to solving this problem. The current analysis estimates how many people are inside…
Read MoreA Self-Adaptive Routing Algorithm for Real-Time Video Transmission in VANETs
Given the strict Quality of Experience (QoE) and Quality of Service (QoS) criteria for video transmission, such as delivery ratio, transmission delay, and mean opinion Score (MOS), video streaming is one of the hardest challenges in Vehicular Ad-Hoc Networks (VANETs). Additionally, VANET attributes, including environmental impediments, fluctuating vehicle density, and highly dynamic topology, have an…
Read MoreDesign of an Off-Grid Hybrid Energy System for Electrification of a Remote Region: a Case Study of Upper Blink Water Community, South Africa
Electrifying or connecting remote and isolated communities to the national grid is very difficult and expensive. This challenge is due to the geographic locations of these isolated communities and terrain that needs navigation when installing transmission lines to transmit power to the communities. This article presents a case study of the design of a hybrid…
Read MoreDeep Learning in Monitoring the Behavior of Complex Technical Systems
The article is devoted to the methods of monitoring and control of vibration processes occurring in the structure and units of complex and unique electromechanical equipment. The monitoring object is considered as a dynamic multidimensional information object, for the study of which analytical and numerical methods of modeling and simulation of multidimensional chaotic systems are…
Read MoreAnalysis of Different Supervised Machine Learning Methods for Accelerometer-Based Alcohol Consumption Detection from Physical Activity
This paper builds on the realization that since mobile devices have become a common tool for researchers to collect, process, and analyze large quantities of data, we are now entering a generation where the creation of solutions to difficult real-world problems will mostly come in the form of mobile device apps. One such relevant real-life…
Read MoreBER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks
In the time past, virtually all the contemporary communication systems depend on distinct source and channel encoding schemes for data transmission. Irrespective of the recorded success of the distinct schemes, the new developed scheme known as joint source channel coding technique has proven to have technically outperformed the conventional schemes. The aim of the study…
Read MoreARAIG and Minecraft: A Modified Simulation Tool
Various interruptions to the daily lives of researchers have necessitated the usage of simulations in projects which may not have initially relied on anything other than physical inquiry and experiments. The programs and algorithms introduced in this paper, which is an extended version of research initially published in ARAIG And Minecraft: A COVID-19 Workaround, create…
Read MoreComputer Vision Radar for Autonomous Driving using Histogram Method
Mobility is a fundamental human desire. All societies aspire to safe and efficient mobility at low ecological and economic costs. ADAS systems (Advanced Driver Assistance Systems) are safety systems designed to eliminate human error in driving vehicles of all types. ADAS systems such as Radars use advanced technologies to assist the driver while driving and…
Read MoreLung Cancer Tumor Detection Method Using Improved CT Images on a One-stage Detector
Owing to the recent development of AI technology, various studies on computer-aided diagnosis systems for CT image interpretation are being conducted. In particular, studies on the detection of lung cancer which is leading the death rate are being conducted in image processing and artificial intelligence fields. In this study, to improve the anatomical interpretation ability…
Read MoreNiO Quantum dots Doped Triple Cation Perovskite \(\mathrm{CsMAFAPbI_2Br_2}\) Heterojunction Photodetector with High Responsivity
Optoelectronic devices applications based on Organic–inorganic perovskites are promising and effective low-cost energy materials due to their exceptional physical properties which include high carrier mobility, high optical absorption coefficient, and long carrier diffusion length. In the presented work, a TiO2/NiO+5% Fe quantum dots (QDs)–doped CsMAFAPbI2Br2 perovskite heterojunction broadband photodetector was fabricated on FTO/glass substrate. The…
Read MorePhysical and Emission Properties of Blended Bio-Coal Briquettes Derived from Agro-Wastes in Nigeria
Nigeria has one of the highest deforestation rates in the world, due mainly to felling of trees for fuelwood and charcoal production. This challenge could be managed if agricultural waste briquettes are used to augment the fuelwood demand for cooking energy provisioning. Energy density of biomass fuels can be raised by blending with coal, but…
Read More
