Results (1649)
Search Parameters:
Keyword: POSNavigation Aid Device for Visually Impaired using Depth Camera
People with visual impairment face daily struggle of navigating through unfamiliar places. This problem mainly caused by their lack of spatial awareness, i.e., the ability to estimate the distance between themselves and their surroundings. In order for visually impaired people to navigate independently, an effective navigation aid is required. The proposed navigation aid device utilizes…
Read MoreMarkov Regime Switching Analysis for COVID-19 Outbreak Situations and their Dynamic Linkages of German Market
This paper deals with the analysis of the dynamic linkage, co-movement between COVID-19 out- break situations and German stock market. Firstly, Markov Regime Switching Analysis(MRSA) is proposed and employed to investigate the situations in the pandemic, as to catch the dynamics of how the daily number of the newly-infected changes, and also to assess the…
Read MoreAchieving a High Isolation for the Triple-band MIMO Antenna in 5G/ Wi-Fi 6 Applications using Symmetric Parasitic Structure
Recently, the Multiple-input multiple-output (MIMO) antennas have been used a lot and attracted many researchers in advanced high-speed wireless communication systems. MIMO antennas are an essential part not only in access points but also in end-user devices. This technology allows a significant increase in channel capacity, but also lead to a challenge of minimize mutual…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreThe First Application of the Multistage One-Shot Decision-Making Approach to Reevaluate a Technology Project Decision Problem
Decision-makers must make a suitable sequence of decisions under uncertainty in a relatively long period for particular projects and situations. Conventional decision-making approaches under uncertainty are based on expected utility theory and do not sufficiently reflect the one-time nature of decisions. Similarly, the conventional approaches do not adequately incorporate the decision-maker’s intuitions in the decision-analysis…
Read MoreDevelopment and Analysis of Models for Detection of Olive Trees
In this paper, an automatic method for detection of olive trees in RGB images acquired by an unmanned aerial vehicle (UAV) is developed. Presented approach is based on the implementation of RetinaNet model and DeepForest Phyton package. Due to fact that original (pretrained) model used in DeepForest package has been built on images of various…
Read MoreDay-Ahead Power Loss Minimization Based on Solar Irradiation Forecasting of Extreme Learning Machine
Power losses exist naturally and have to be cared for in the operation of electrical power systems. Many researchers have worked on various methods and approaches to reduce losses by incorporating distributed generators (DG), particularly from renewable sources. These studies are based on the maximum unit penetration of the DGs, which is rarely achieved, resulting…
Read MoreOmni-directional Multi-view Image Measurement System in the Co-sphere Framework
This study presents an “Omnidirectional multi-view image measurement system”, which can be used to provide multi-camera 3D reconstruction and multi-view image information. Its characteristic is that four cameras take images from multiple perspectives in the co-sphere framework. The C0 is the middle camera fixed as the geometric center point of measurement, and provides a front…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreChallenges Facing Solar Panel Energy Deployment within Qatari Homes and Businesses
Despite many factors conducive to renewable energy investment in Qatar (e.g., the fact that the state is a major gas exporter whose long-term prosperity depends on economic diversification), there is very low uptake of solar panel adoption among home and business owners. Major challenges implicitly face the deployment of solar and other renewables in Qatar,…
Read MoreTemperature-Compensated Overcharge Protection Measurement Technology
Recently, many problems have been caused by battery fires. The existing BMS(Battery Managment System) measured the voltage of each cell of the battery through the physical connection between the battery and the control module. However, if a battery with up to 1000 VDC becomes inoperable due to an external factor, the battery is damaged, and…
Read MoreDevelopment of an Intelligent Road Anomaly Detection System for Autonomous Vehicles
Globally, road transportation has become one of the most reliable means of moving goods and services from one place to the other. It has contributed immensely to the standard of living and modern civilization. However, this means of transportation is characterised by some issues which are poised to be harmful to the human population if…
Read MoreA Model for Teaching Mathematics to Gifted Students Based on an Effective Combination of Various Approaches for their Preparation
Currently one of the urgent goals of mathematical education is the organization of effective work with gifted students. Based on the study of various approaches to teaching mathematically gifted students, many years of experience of teachers, students’ work, and an analysis of curricula and materials for schools with in-depth study of mathematics, an author’s model…
Read MoreActive Simulation of Grounded Parallel-Type Immittance Functions Employing VDBAs and All Grounded Passive Components
This communication proposes a grounded immittance function simulator that, depending on the proper choice of the passive components, can simulate parallel-type impedances of the R-L, R-C, and L-C forms. Only two grounded passive components and two voltage differencing buffered amplifiers (VDBAs) are used to implement the suggested circuit. All three simulated equivalent elements, namely Req,…
Read MoreNorthern Leaf Blight and Gray Leaf Spot Detection using Optimized YOLOv3
Corn is one of the most important agricultural products in the world. However, climate change greatly threatens corn yield, further increasing already prevalent diseases. Northern corn leaf blight (NLB) and Gray Leaf Spot are two major corn diseases with lesion symptoms that look very similar to each other, and can lead to devastating loss if…
Read MoreMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read MoreDismantle Shilling Attacks in Recommendations Systems
Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…
Read MoreMetaheuristic Optimization Algorithm Performance Comparison for Optimal Allocation of Static Synchronous Compensator
The relevance of static synchronous compensator (STATCOM) controllers in controlling power network parameters is causing them to be included in contemporary networks. But for the intended objectives to be attained, the best device positioning and parameter settings are essential. This work compares the performance of the particle swarm optimization (PSO) and firefly algorithm (FA) in…
Read MoreIntegrated GIS-SUE Map Cost Estimation System Prototype for Designing a Decision Support System
Subsurface Utility Engineering (SUE) is an international model for mapping and classifying underground surfaces according to their accuracy (acquisition method). Utilizing Geographic Information System (GIS) to map and present the SUE levels paved the way for producing a new Decision Support System (DSS) for the utility mapping process. The proposed system represents an efficient tool…
Read MoreDesign, Optimization and Simulation of a New Decoder for Reed Solomon and BCH Codes using the New Syndromes Block
In this paper, a new syndrome block for Reed Solomon RS and BCH codes used respectively in digital Video broadcasting DVB-S and DVB-S2 has been presented in order to reduce the number of iterations compared to the existed block, which can be found in the literature, the new method is based on a factorization of…
Read MoreAn Ensemble of Voting- based Deep Learning Models with Regularization Functions for Sleep Stage Classification
Sleep stage performs a vital role in people’s daily lives in the detection of sleep-related diseases. Conventional automated sleep stage classifier models are not efficient due to the complexity linked to the design of mathematical models and extraction of hand-engineering features. Further, quick oscillations amongst sleep stages frequently lead to indistinct feature extraction, which might…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreNonlinear Model Predictive Control of Rover Robotics System
The paper presents two robust and efficient control algorithms based on (i) Optimal Control Allocation (OCA) and (ii) Nonlinear Model Predictive Control (NMPC). The robotics system consists of two rovers with mecanum wheels and mounted two 7-DOF arms carrying a common load. The overall system is an underdetermined one with non-holonomic constraints. The developed control…
Read MoreAnalysis and Trend Estimation of Rainfall and Seasonality Index for Marathwada Region
Droughts are undesirable and highly unwanted form of disasters. It is essential to analyse the cause of such extreme events and act accordingly to pave the way for a sustainable future. The present research work conducts a seasonality and trend analysis of rainfall over the eight districts of Marathwada region. The study is carried out…
Read MoreMeta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers
The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…
Read More
