Results (56)
Search Parameters:
Keyword: ARANAutomatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking
In recent years, people-counting problems have increased in popularity, especially in crowded indoor spaces, e.g., public transport. In peak hours, trains move significant numbers of passengers, producing delays and inconveniences for their users. Therefore, analysing how people use public transport is essential to solving this problem. The current analysis estimates how many people are inside…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MorePotential of Solar Energy in Residential Rooftop Surface Area in Semarang City, Indonesia
This study examines the potential of solar energy in the urban environment with a case study in Semarang, Indonesia by analyzing the intensity of solar radiation and the residential rooftop area. The study aims to obtain a quantitative description of the potential for electricity production from rooftop solar photovoltaic systems in residential areas and estimate…
Read MoreLogistics Solutions in the Preparation Phase for the Appearance of Disasters
Natural disasters have caused not only economic but also human losses. These events bring with them, among other things, deficiencies in the supply of food, clothing, health and cleaning products, to name a few. This situation makes it imperative to locate facilities that can supply the needs, as mentioned earlier, to the victims in the…
Read MoreSmart Ambulance: Speed Clearance in the Internet of Things paradigm using Voice Chat
In recent years, researchers have focused on the development of many applications of information and communication which could lead to enhance human life. The congestion and road traffic are one of the most problems facing the ambulance transportation to provide fast healthcare services for patients. In this work, a tracking and data transfer system has…
Read MoreA Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation
Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…
Read MoreFederated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review
The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…
Read MoreDesign of Bio-Inspired Robot Hand Using Multiple Types of Actuators
Many prosthetic hands are focused on appearance and grip strength, however, gestures are also one of the performances that users need for communicating with others as body language to express their feeling and intention. For this paper, the initial prototype of the gesturing robotics hand is presented by using multiple types of actuators concept to…
Read MoreMeta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers
The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…
Read MoreInterference-Aware Nodes Deployment of a LoRa-Based Architecture for Smart Agriculture in the Southern Region of Senegal
In Senegal, agriculture has always been seen as the foundation on which the socioeconomic development of the country rests. However, in the rural world, agriculture remains traditional at a time when the challenges of food self-sufficiency to accompany emergence are launched. In the southern part of Senegal commonly called Casamance, the abundance of rain makes…
Read MoreEfficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage
Using Proofs of Retrievability (PORs), a file owner is able to check that a cloud server correctly stores her files. Using Proofs of Retrievability and Reliability (PORRs), she can even verify at the same time that the cloud server correctly stores both her original files and their replicas. In 2020, a new PORR combined with…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreControl and Monitoring Systems in Medium Voltage Distribution Networks in Poland – Current Status and Directions of Development
The paper describes the control and monitoring systems installed in medium voltage networks by Polish distribution network operators. It also outlines the expected directions of development of these systems, specifies the functions of the individual system components and describes the requirements applicable to them. In particular, attention is paid to the implementation of functions to…
Read MoreEnsemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection
The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…
Read MoreDesign Optimization and Life Cycle Cost Assessment of GRC Shading Screens for Office Buildings in Cairo
Office buildings commonly use fully glazed façades to reflect a luxurious appearance and to maximize natural light of high solar exposure and high-energy consumption due to cooling and heating. There is a great abundance in constructing shading screens as they are part of the modern movement in field of Energy Conservation, renewable energies, and architectural…
Read MoreA Design of Anthropomorphic Hand based on Human Finger Anatomy
In the past decade, multiple anthropomorphic prosthetic hands have been developed to replace the role of human hands. Prostheses should not only replace the functions of human hands in functionality but also replicate human hands in appearance and sense of body-belonging intuitively. Human fingers have very delicate and complex structures, and it is these complex…
Read MoreA Scheduling Algorithm with RTiK+ for MIL-STD-1553B Based on Windows for Real-Time Operation System
In devices using Windows operating system based on x86 system, the real-time performance is not guaranteed by Windows. It is because Windows is not a real-time operating system. Users who develop applications in such a Windows environment generally use commercial solutions such as the RTX or the INtime to provide real-time performance to the system.…
Read MoreInitial Experiments using Game-based Learning Applied in a Classical Knowledge Robotics in In-Person and Distance Learning Classroom
This paper addresses experiments with Scratch-developed games in the robotics introduction course at the Federal University of Technology – Paraná. It aims at assisting learning of classical and initial robotics concepts. This proposal, similar to the classic 80s war tanks game on Atari 2600, was developed using an autonomous vehicle. In the first experiment, applied…
Read MoreRemote Patient Monitoring Systems with 5G Networks
The new generation of mobile communications and the recent advances in data management are going to enable a fast transformation in the health sector of many countries. 5G networks, with superior technical characteristics, would allow the development of a new set of application and services gathered under the concept of eHealth. In this article we…
Read MoreAn Analysis of the Reliability of Reported COVID-19 Data in Western Balkan Countries
More than one year after the outbreak of the COVID-19 pandemic the behavior of figures published by official sources of the countries are skeptical for the public. Many probability tests are used to detect the reliability of information among which Benford’s Law. This study focused on the Western Balkan countries, as one of the foremost…
Read MoreFrequency Scaling for High Performance of Low-End Pipelined Processors
In the Internet of Things era it is expected that low-end processor domination of the embedded market will be further reaffirmed. Then, a question will arise, on whether it is possible to enhance performance of such processors without the cost of high-end architectures. In this work we propose a better-than-worst-case (BTWC) methodology which enables the…
Read MoreArchitecture of Real-Time Patient Health Monitoring Based on 5G Technologies
Worldwide, the epidemiological situation is constantly changing and with the exponential increase in the number of confirmed coronavirus cases, the number of health care workers has decreased significantly and this is due to the direct and daily contact of patients. One of the major challenges of the last few months is to prevent the spread…
Read MoreSuper Resolution Based Underwater Image Enhancement by Illumination Adjustment and Color Correction with Fusion Technique
In underwater photographs are look like low-quality images, the main reason is behind that due to attenuation of the propagated light, absorption and scattering effect. The absorption significantly reduces the light energy, while the dispersion causes changes in the light propagation path. They result in foggy appearance and degradation of contrast, causing misty distant objects.…
Read MoreTowards a Hybrid Probabilistic Timing Analysis
Real-time embedded systems are widely adopted in applications such as automotive, avionics, and medical care. As some of these systems have to provide a guaranteed worst-case execution time to satisfy the time constraints, understanding the timing behaviour of such systems is of the utmost importance regarding the reliability and the safety of these systems. In…
Read MoreUsing a safety PLC to Implement the Safety Function
Nowadays almost every PLC manufacturer offer a so-called safety PLC. It is a specific category of PLC, which in recent years have become a commonly used means of performing safety functions, especially in industrial applications. In this area of specific applications, a maximum of SIL 3 is normally required. However, the guaranteed safety features of…
Read More
