Volume 2, Issue 3

Current Issue features key papers related to multidisciplinary domains involving complex system stemming from numerous disciplines; this is exactly how this journal differs from other interdisciplinary and multidisciplinary engineering journals. This issue contains 220 accepted papers in Computer, Electrical and Electronics domains.
Download Complete IssueFront Cover
Editorial Board
Editorial
Table of Contents
Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets
Frequency diverse array (FDA) employs a small frequency increment across its array elements to provide range, angle and time dependent beampattern. In most radar systems, FDA with linear frequency offsets have been employed. But, its transmit beampattern is coupled in range and angle dimensions, which may degrade the output signal-to-interference-plus-noise ratio performance. Note that nonlinear…
Read MoreDetailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model
In urban, rural and indoor applications, diffraction mechanism is very important to predict the field strength and calculate the coverage accurately. The diffraction mechanism takes place on NLOS (non-line-of-sight) cases like rooftop, vertex, corner, edge and sharp surfaces. S-UTD-CH model computes three type of electromagnetic wave incidence such as direct, reflected and diffracted waves, respectively.…
Read MoreApplications of Case Based Organizational Memory Supported by the PAbMM Architecture
In the aim to manage and retrieve the organizational knowledge, in the last years numerous proposals of models and tools for knowledge management and knowledge representation have arisen. However, most of them store knowledge in a non-structured or semi-structured way, hindering the semantic and automatic processing of this knowledge. In this paper we present a…
Read MoreLow Probability of Interception Beampattern Using Frequency Diverse Array Antenna
Frequency diverse array (FDA) antenna employs a small frequency increment, as compared with the carrier frequency, across antenna array elements. The use of a frequency increment generates an array factor that is dependent on angle, time, and the range and this yields a range and angle dependent beampattern. In this paper, a transmit array beamforming…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreA Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management
This paper presents a Release Management model to support requirements management. Requirements development and management can be integrated with a release-planning approach to achieve lesser Requirements spillover problems which is an innovative way to capture, control and evolve the user requirements based on integer linear programming.
Read MoreFeedback device of temperature sensation for a myoelectric prosthetic hand
In this study, a control system of a feedback device of temperature sensation for myoelectric prosthetic hand users was improved. The device is mounted on a user’s upper arm in contact with the skin, and transfers the temperature sensation in the upper arm corresponding to the temperature detected by the temperature sensor at the fingertip…
Read MoreDeep venous thrombus characterization: ultrasonography, elastography and scattering operator
A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreAviation Navigation with Use of Polarimetric Technologies
The article deals with the problem of increasing the accuracy of determination of aircraft’s navigation flight parameters. Increasing the accuracy and sensitivity of navigation parameters determination will improve the efficiency of air conveyance by optimizing the flight trajectories and reducing the flight time and simultaneously will ensure the sufficient level of air conveyance safety. The…
Read MoreOptimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations
A new architecture of multi-standard transmitter that combines single and double frequency conversion is presented. The transmitter is able to generate waveforms of different cellular standards (GSM, UMTS, Wimax), LAN standards (Bluetooth, Zigbee, IEEE802.11 b/g) and Radio navigation standards (GPS, Galileo) as well. Depending on the selected standard and frequency, the transmitter routes the intermediate…
Read MoreSingular Integral Equations in Electromagnetic Waves Reflection Modeling
The processes of reflection of three-dimensional electromagnetic waves by locally irregular media interfaces are investigated. The problem under study is mathematically reduced to the solution of a boundary value problem for the Maxwell equations in an infinite space with an irregular boundary. In order to develop a numerical algorithm, the potential theory and a special…
Read MoreMethodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…
Read MoreDependence-Based Segmentation Approach for Detecting Morpheme Boundaries
The unsupervised morphology processing in the emerging mutant languages has the advantage over the human/supervised processing of being more agiler. The main drawback is, however, their accuracy. This article describes an unsupervised morphemes identification approach based on an intuitive and formal definition of event dependence. The input is no more than a plain text of…
Read MorePaper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language
Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a rule based extraction method of Arabic text to solve some weaknesses founded on previous research works. Our approach is divided on preprocessing phase, on which we proceed to the tokenization of the text, and formatting it…
Read MoreMedical imbalanced data classification
In general, the imbalanced dataset is a problem often found in health applications. In medical data classification, we often face the imbalanced number of data samples where at least one of the classes constitutes only a very small minority of the data. In the same time, it represent a difficult problem in most of machine…
Read MoreADOxx Modelling Method Conceptualization Environment
The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…
Read MoreGPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs
Vehicular ad-hoc networks (VANETs) are still more challenging to overcome even if they have been widely studied during the last decades. The routing mechanism is the essentially relevant issue in this field. Indeed, it must strictly to be adapted to specific and unique characteristics such as the high mobility of the vehicles, the dynamic nature…
Read MoreOptimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters
This paper presents the synthesis of a dynamic space vector modulation for power matrix converters so that it is possible to implement a universal modulator that provides a control algorithm dynamically optimized according to the requirements for the matrix converter.
Read MoreControl design for axial flux permanent magnet synchronous motor which operates above the nominal speed
The axial flux permanent magnet synchronous motor (AFPM motor) using magnet bearings instead of ball-bearings at both two shaft ends could allow rotational speed of shaft much greater than nominal speed. One of the solutions to increase motor speed higher than its nameplate speed is reducing rotor’s pole magnetic flux of rotor (Yp). This paper…
Read MoreA synchronizing second order sliding mode control applied to decentralized time delayed multi-agent robotic systems: Stability Proof
This study investigates the synchronization issue of multiple robot manipulators in the presence of time delay. Since several previous works based on synchronization task neglect the communication delay, in this paper we develop a finite time stability based on a Lyaponov functional for synchronization of a networked robotic system where time delay exists during the…
Read MoreFault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor
This paper focuses on studying the problem of fault tolerant control (FTC), including a detailed fault detection and diagnosis (FDD) module using observer banks which consists of output and unknown input observers applied to a continuous stirred tank reactor (CSTR). The main objective of this paper is to use a FDD module here proposed to…
Read MoreDevelopment and Validation of a Heat Pump System Model Using Artificial Neural Network
Modeling of direct expansion (DX) air conditioning and heat pump systems can be necessary in developing energy saving methods required to reduce energy consumption in buildings. The artificial neural networks (ANN) can be simple and reliable as compared to traditional methods. A properly trained artificial neural network can provide accurate results, while being relatively straightforward…
Read MoreAssessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness
The present work describes the first serious game designed to reduce the stigma among students towards mental health problems. The game is called Stigma-Stop, and it features characters who suffer from various mental disorders. Players are provided with information about different mental illnesses, and they are presented with several options on how to act when…
Read MoreKinect-Based Moving Human Tracking System with Obstacle Avoidance
This paper is an extension of work originally presented and published in IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). This work presents a design and implementation of a moving human tracking system with obstacle avoidance. The system scans the environment by using Kinect, a 3D sensor, and tracks the center of mass of a…
Read MoreA security approach based on honeypots: Protecting Online Social network from malicious profiles
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read MorePulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC)
This paper describes the design of a pulse generator to excite PZT and PVDF ultrasonic transducer arrays, based on the Programmable System-on-Chip (PSoC) module. In this module, using programmable logic different pulses were implemented; these pulses are required in ultrasonic applications for multiple channels to excite PZT and PVDF transducer arrays. To excite multiple elements,…
Read MoreEnabling Toy Vehicles Interaction With Visible Light Communication (VLC)
An effective communication among the road users is crucial for safety precautions. Nowadays, a light emitting diode (LED) are commonly installed on a motor vehicle as the lighting system. The LED lights are more reliable and flexible in terms of the design and power adjustments. To further utilize the LED applications in a vehicular system,…
Read MoreAnalysis of Fractional-Order 2xn RLC Networks by Transmission Matrices
In this study, a new method is devised and presented for the dynamic analysis of a 2xn RLC circuit network modeled with the fractional-order circuit elements. The analysis method is based on the principles of dynamic analysis with transfer function approximation. Firstly, the fractional-order 2xn RLC circuit network of interest which is divided into n…
Read MoreFire extinguishing system in large underground garages
In the work is considered an acceptable constructive scheme from a practical point of view at fire extinguishing in underground garages. The garage space is divided into quadrants which covering, for example, 2 cars. In case of ignition on one of them, a sprinkler nozzle system is triggered by the effect of the vertical convective…
Read MoreDirectional Antenna Modulation Technique using A Two-Element Frequency Diverse Array
Direction dependent antenna modulation (DAM), as a potential physical-layer security technique, is able to enhance the security of wireless communication systems by virtue of the capability of its direction-dependent signal modulation format transmission. In this paper, DAM using frequency diverse array (FDA) to produce the modulation is presented. By phase shifting each element, the desired…
Read MoreClassifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks
Breast cancer is one of the most common cancers among female diseases all over the world. Early diagnosis and treatment is particularly important in reducing the mortality rate. This research is focused on the prevention of breast cancer, therefore it is important to detect micro-calcifications (MCs) which are a sign of early stage breast cancer.…
Read MoreMagnetically Levitated and Guided Systems
The paper describes the fundamentals of magnetic levitation technology. A general background of the magnetic levitation is given in this article, including applications of this technology, several comparisons with other types of technologies, the real stage of its development, etc. Further in the paper, the two main types of magnetically levitated systems are compared within…
Read MoreEnergy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks
In this paper, we exploit an integration between Compressive sensing (CS) and the random mobility of sensors in distributed mobile sensor networks (MSNs). A small number of distributed mobile sensors are deployed randomly in a sensing area to observe a large number of positions. The distributed mobile sensors sparsely sample the sensing area for data…
Read MoreValidity and efficiency of conformal anomaly detection on big distributed data
Conformal Prediction is a recently developed framework for reliable confident predictions. In this work we discuss its possible application to big data coming from different, possibly heterogeneous data sources. On example of anomaly detection problem, we study the question of saving validity of Conformal Prediction in this case. We show that the straight forward averaging…
Read MoreS-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency
Segmented and unsegmented 3D insulated copper through silicon vias (TSVs) of diameter 10 micro-meter, height 100 micro-meter and silicon of sizes 100 micro-meter by 100 micro-meter by 100 micro-meter are modeled using analysis system (ANSYS), equivalent circuit using advanced design system (ADS) at frequency ranges between 100MHz and 40GHz and 10MHz step size. The segmented…
Read MoreSynthesis of Important Design Criteria for Future Vehicle Electric System
In this article, we give a brief overview of future trends and corresponding stakeholder requests regarding the design of automotive electric and electronic (e/e)-architectures. While today’s optimization is mainly based on the static design criteria of unit costs and weight, three dynamic design criteria are considered decisive factors in the future: voltage stability, vehicle energy…
Read MoreGestural Interaction for Virtual Reality Environments through Data Gloves
In virtual environments, virtual hand interactions play a key role in interactivity and realism allowing to perform fine motions. Data glove is widely used in Virtual Reality (VR) and through simulating a human hands natural anatomy (Avatar’s hands) in its appearance and motion is possible to interact with the environment and virtual objects. Recently, hand…
Read MoreSolving the Capacitated Network Design Problem in Two Steps
In this paper, we propose a two steps-based algorithm to solve the modular link version of the Capacitated Network Design Problem (CNDP) which consists to determine the optimal network that guarantees the routing of a set of commodities. In our proposition, CNDP is divided into two sub-problems: Network Design problem (NDP) and Network Loading Problem…
Read MoreA Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks
A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…
Read MoreReal Time Advanced Clustering System
This paper describes a system to gather information from a stationary camera to identify moving objects. The proposed solution makes only use of motion vectors between adjacent frames, obtained from any algorithm. Starting from them, the system is able to retrieve clusters of moving objects in a scene acquired by an image sensor device. Since…
Read MoreIndoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors
This paper presents the development and design of a methodology based on fuzzy logic to control an indoor mobile robot for a complete navigation in an unknown environment. The methodology incorporates two basic behaviors, namely: reaching the goal and avoiding obstacles. The obstacle avoidance behavior is treated using wall-following scheme based on an Interval Type-2…
Read MoreValidity of Mind Monitoring System as a Mental Health Indicator using Voice
We have been developing a method of evaluating the mental health condition of a person based on the sound of their voice. Currently, we have applied this technology to create a smartphone application that shows the vitality and the mental activity as mental health condition indices. Using voice to measure one’s mental health condition is…
Read MoreThe Model of Adaptive Learning Objects for virtual environments instanced by the competencies
This article presents the instantiation of the Model of Adaptation of Learning Objects (MALO) developed in previous works, using the competencies to be developed in a given educational context. MALO has been developed for virtual environments based on an extension of the LOM standard. The model specifies modularly and independently two categories of rules, of…
Read MoreAn Overview of Traceability: Towards a general multi-domain model
Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…
Read MoreL-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits
L-band SiGe HBT active differential equalizers with variable, positive or negative gain slopes have been designed and fabricated for frequency and temperature compensation of microwave and optical systems. The active equalizer employs dual-resonant RLC circuits in the series feedback path of the differential amplifier for positive gain slopes or in the load for negative gain…
Read MoreMoving Towards Reliability-Centred Management of Energy, Power and Transportation Assets
Infrastructure Asset Management was first adopted in 1980s for challenges faced by the utilities, road and rail transport systems, mining, process and manufacturing industries in asset life cycle value optimization. International standards ISO 55000 and PAS 55 were subsequently developed to provide a basis for a structured methodology in the development of Asset Management System.…
Read MoreSecure Path Selection under Random Fading
Application-oriented Wireless Sensor Networks (WSNs) promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP) and Sub-optimal Secure Path (SSP)) to minimize the outage probability of secrecy capacity in…
Read MoreSecurity in SWIPT with Power Splitting Eavesdropper
Simultaneous wireless information and power transfer (SWIPT) has drawn significant research interest in recent years. In this paper, we investigate the information theoretic secrecy of a SWIPT system under Weibull fading channel. To be specific, we analyze the information security in the presence of an energy harvesting and information decoding eavesdropper. All links are subjected…
Read MorePerformance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions
Radar ambiguity function is widely employed to analyze a radar system’s time delay (range) resolution, Doppler frequency (range rate) resolution, mainlobe width and sidelobes in both range and Doppler. In this paper, ambiguity functions of frequency diverse array (FDA) which offers range-angle dependent transmit beampattern and Phased array which yields angle transmit beampattern is investigated.…
Read MoreAdaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems
In this paper, we propose an adaptive discrete-time fuzzy sliding mode control for a class of chaotic systems. For this aim, a discrete sliding mode controller and a fuzzy system are combined to achieve an adequate control. The Laypunov stability theorem is used to testify the asymptotic stability of the whole system and the consequence…
Read MoreFault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter
The paper describes the results of the system analysis of various options of electric inverter topologies for the use in the traction drive of an electrical helicopter. The paper explains the optimal choice, in terms of the design requirements and future operational conditions, and the type and topology of the electric inverter to supply the…
Read MoreComputational Intelligence Methods for Identifying Voltage Sag in Smart Grid
In recent years pattern recognition of power quality (PQ) disturbances in smart grids has developed into crucial topic for system equipments and end-users. Undoubtedly analyzing the PQ disturbances develop and maintain smart grids effectiveness. Voltage sags are the most common events that affect power quality. These faults are also the most costly. This paper represents…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreService Productivity and Complexity in Medical Rescue Services
The increasing impact of services on economic wealth and income in high wage countries calls for a detailed examination of service productivity and complexity in current research projects. This paper describes the development of a measurement model of service productivity and complexity within the domain of medical service provision. While the measurement model of service…
Read MorePrincipal Component Analysis Application on Flavonoids Characterization
Flavonoid is one of the bioactive compounds that are currently used in pharmaceutical and medicinal industries due to their health benefit. The focus of current research is mainly on the extraction and isolation of bioactive compounds; however non to date has explored on the identification of flavonoids classes under the Fourier Transform Infrared spectroscopy (FTIR).…
Read MoreA Reconfigurable Metal-Plasma Yagi-Uda Antenna for Microwave Applications
This paper is an extension of the work originally presented at the European Microwave Conference (EuMC) about a reconfigurable hybrid metal-plasma Yagi-Uda antenna operating at 1.55 GHz: this antenna consists of metallic reflector and active element and two plasma directors. The conference work showed through full-wave numerical simulations (CST Microwave Studio) how it is possible…
Read MoreVerifying the Detection Results of Impersonation Attacks in Service Clouds
A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…
Read MoreImage Segmentation Using Fuzzy Inference System on YCbCr Color Model
This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…
Read MoreSegmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery
The evolution of technology has changed the face of education, especially when combined with appropriate pedagogical bases. This combination has created innovation opportunities in order to add quality to teaching through new perspectives for traditional methods applied in the classroom. In the Health field, particularly, augmented reality and interaction design techniques can assist the teacher…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MoreOptimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria
A method for optimal sizing of hybrid system consisting of a Photovoltaic (PV) panel, diesel generator, Battery banks and load is considered in this paper. To this end a novel approach is proposed. More precisely a methodology for the design and simulation of the behavior of Hybrid system PV-Diesel-Battery banks to electrify an isolated rural…
Read MoreRFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe
In this paper the design of a new 3D magnetic field (H-field) probe with a near-field scanning system is presented, then the near electromagnetic fields radiated by a Library RFID system is characterized. The proposed system is developed in order to determine the magnetic near-field emitted by electronic devices. The designed isotropic H-field probe consists…
Read MoreDesign, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators
Nowadays, compliant micro-motion stages offer high positioning accuracy and repeatability. When assembled with conventional stages, the resulting dual-range positioning systems allow for nanometer scale accuracy within a centimeter scale working area. However, such systems invoke a high cost and large footprint. This paper presents a low-cost, compact compliant XY micro-motion stage where dual-range manipulation has…
Read MoreSelf-Organizing Map based Feature Learning in Bio-Signal Processing
Feature extraction is playing a significant role in bio-signal processing. Feature identification and selection has two approaches. The standard method is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The…
Read MoreA delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances
In this paper, a delay-dependent controller based on the sliding mode concept is proposed to stabilize a networked robotic system in a decentralized synchronization scheme. In addition to being affected by communication time-delays between agents, and seen that external disturbances obviously affect any physical and dynamic system, an unsettling action resulting from measurement errors affects…
Read MoreModelization of cognition, activity and motivation as indicators for Interactive Learning Environment
In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…
Read MoreHomemade array of surface coils implementation for small animal magnetic resonance imaging
Small animal modeling is an exciting research field where human pathogenic frameworks can be replicated in a controlled environment. Accurate Imaging is in high demand when modeling abnormalities and, magnetic resonance imaging plays a vital role due to its demonstrated lowest intrusion when compared with other imaging methods. However, the required high-resolution yields low-quality images…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read MoreMulti-Domain Virtual Network Embedding with Coordinated Link Mapping
Network Virtualization, which allows the co-existence of various logical networks on shared physical infrastructure, has become popular in recent years. The optimal mapping of virtual resource to physical resource is a major issue in network virtualization. This problem, called virtual network embedding (VNE), has been well explored in the context of one physical domain, which…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreImpact of PSS and SVC on the Power System Transient Stability
The Static Var Compensator (SVC) is used to improve the stability of the power system because of its role in injecting or absorbing the reactive power in the electrical transmission lines. The Power System Stabilizer (PSS) is also a control device which ensures maximum power transfer and thus the stability of the power system enhancement.…
Read MoreThe Search for a Convergent Option to Deploy Smart Grids on IoT Scenario
Smart city projects are quickly evolving in several countries as a feasible solution to the urban organization to provide sustainable socioeconomic growth and solve problems that arise as the populations of these cities grow. In this sense, technology application plays an important role in enabling automation of processes, improving the citizen’s quality of life and…
Read MoreOptimizing the Decoding Complexity of PEG-Based Methods with an Improved Hybrid Iterative/Gaussian Elimination Decoding Algorithm
This paper focuses on optimizing the decoding complexity of the progressive-edge-growth-based (PEG-based) method for the extended grouping of radio frequency identification (RFID) tags using a hybrid iterative/Gaussian elimination decoding algorithm. To further reduce the decoding time, the hybrid decoding is improved by including an early stopping criterion to avoid unnecessary iterations of iterative decoding for…
Read MoreFAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle
One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MorePower requirements and battery life measurement for wireless transmission between two nodes in different mediums
One of the most important roles of the wireless sensor networks (WSN) is to avoid wiring costs, be self-sustainable and be able to function for several years. However, due to the slow progress in battery technology, power continues to be a limited resource in wireless sensor communication and electric energy storage remains to be an…
Read MoreA Novel Dual-Band Rectenna for Ambient RF Energy Harvesting at GSM 900 MHz and 1800 MHz
This paper presents a novel dual-band rectenna for RF energy harvesting system. This rectenna is created from a dual-band antenna and a dual-band rectifier which operates at GSM bands (900 MHz and 1800 MHz). The printed monopole antenna is miniaturized by two meander-lines. The received signal from the receiving antenna is rectified by a voltage…
Read MoreOptimisation of Software-Defined Networks Performance Using a Hybrid Intelligent System
This paper proposes a novel intelligent technique that has been designed to optimise the performance of Software Defined Networks (SDN). The proposed hybrid intelligent system has employed integration of intelligence-based optimisation approaches with the artificial neural network. These heuristic optimisation methods include Genetic Algorithms (GA) and Particle Swarm Optimisation (PSO). These methods were utilised separately…
Read MoreData Error Detection and Recovery in Embedded Systems: a Literature Review
This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make…
Read MoreAugmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment
The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…
Read MoreIncorporating Spatial Information for Microaneurysm Detection in Retinal Images
The presence of microaneurysms(MAs) in retinal images is a pathognomonic sign of Diabetic Retinopathy (DR). This is one of the leading causes of blindness in the working population worldwide. This paper introduces a novel algorithm that combines information from spatial views of the retina for the purpose of MA detection. Most published research in the…
Read MoreHuman Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots
In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of…
Read MoreMulti Level Integrity Management in LTE/LTE-A Networks
The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…
Read MoreDevelopment of an automated vehicle stop system for cardiac emergencies
This paper describes the concept and configuration of a novel automated safety vehicle stop system, and a future prospect of the study. Intrinsic sudden death may cause traffic accident since such accidents sometimes involve not only the driver but also other traffic users such as passengers and pedestrians. Cardiovascular disease (CVD) is considered as a…
Read MoreComputer Aided Classification using Support Vector Machines in Detecting Cysts of Jaws
Jaw cyst is one of the most common pathology observed in the field of dentistry. Early detection of the cystic lesion will help the surgeons to take appropriate therapeutic measures after a thorough diagnostic procedure. One of the challenging task for surgeons is to differentiate the cysts from the other pathologies. The appearance of these…
Read MoreSpatiotemporal Traffic State Prediction Based on Discriminatively Pre-trained Deep Neural Networks
The availability of traffic data and computational advances now make it possible to build data-driven models that capture the evolution of the state of traffic along modeled stretches of road. These models are used for short-time prediction so that transportation facilities can be operated in an efficient way that guarantees a high level of service.…
Read MoreLow-cost Hybrid Wheelchair Controller for Quadriplegias and Paralysis Patients
Wheelchair controller design is very important for handicapped users such as quadriplegia, amputee, paralyzed and elderly. The safe use, easiness, and comfort are an important factor that can directly affect the user’s social efficiency and quality of life. In this paper, the design, implementation, and test of a new low-cost hybrid wheelchair controller for quadriplegics…
Read MorePreparation of Ni-C Ultrafine Composite from Waste Material
This work depicts the preparation of Ni-C ultrafine composite from used engine oil. The used oil was emulsified with detergent loaded with Ni (OH)2. The loaded emulsion was sprayed on electric plasma generated between two C electrodes to a DC main 28 V and 70-80 A. The purged Ni-doped carbon fume was trapped on a…
Read MoreSchizophrenia Prediction Using Integrated Imaging Genomic Networks
In order to increase the diagnosis accuracy of schizophrenia (SCZ) disease, it is essential to comprehensively employ complementary information from multiple types of data. It is well known that a network is a general method for analyzing relationships between patients, with its nodes representing patients and its edges showing relationships between them. In this study,…
Read MoreIGS: The Novel Fast IC Power Ground Network Optimization Flow Based on Improved Gauss-Seidel Method
With silicon technology further scaling, the switching activities together with GHz operation frequency greatly affects the power integrity by generating large IR-drop noises. Excessive IR-drop causes functional failures such as timing failure, abnormal reset and SRAM flipping. The PGN needs to be optimized to reduce IR-drop. The traditional EDA optimization routine repeats the steps such…
Read MoreGNSS Positioning in Non-line-of-Sight Context—a Survey for Technological Innovation
Reliable, available and accurate localization of people and vehicles is one crucial requirement for intelligent transportation systems (ITSs). This has led to a variety of technical approaches in recent years. Towards an exact positioning via Global Navigation Satellite Systems (GNSSs) the visibility of satellites is an important factor. In this paper, we review the literature…
Read MoreCollision avoidance between a wheelchair front wheels and a step wall during step climbing using a care robot
This paper discusses a step climbing strategy using a wheelchair and a teleoperated care robot that avoids collisions between the wheelchair’s front wheels and the step wall. In our method, the two vehicles are connected and use the velocity difference between them to climb steps. Since the wheelchair’s front wheels, or another part of the…
Read MoreAdapting Model Predictive Control for a PV Station and Evaluating two different MPPT Algorithms P&O and FLC
In this paper first discussion approach will stress out the integration of model predictive control in maximum power point tracking MPPT and as progressing a second approach identified as fuzzy logic controller FLC and perturb & Observe P&O algorithms are analyzed. All are interrelated to MPPT model for a photovoltaic module, PVM, to search for…
Read MoreHuman Sit Down Position Detection Using Data Classification and Dimensionality Reduction
The analysis of human sit down position is a research area allows for preventing health physical problems in the back. Many works have proposed systems that detect the sitting position, some open issues are still to be dealt with, such as: Cost, computational load, accuracy, portability, and among others. In this work, we present an…
Read MoreDesigning a Smart Car Parking System (PoC) Prototype Utilizing CCTV Nodes: A vision of an IoT parking system via UCD process
Using smart parking systems has become very important, and particularly so for metropolitan areas, because of the benefits for drivers in many aspects, such as time, frustration, stress, and anger, in addition to the increased consumption of fuel while searching for a vacant parking space. This paper proposes a review of recent advances in sensing…
Read MoreMultilingual evaluation of voice disability index using pitch rate
We propose the use of the pitch rate of free-form speech recorded by smartphones as an index of voice disability. This research compares the effectiveness of pitch rate, jitter, shimmer, and harmonic-to-noise ratio (HNR) as indices of voice disability in English, German, and Japanese. Normally, the evaluation of these indices is performed using long-vowel sounds;…
Read MoreEfficacy of multiple anticancer therapies may depend on host immune response
The host immune system is a key player in anticancer therapy response and resistance. Although the impact of host immune response in the ‘war against cancer’ has been studied and it has been the basis for immunotherapy, understanding of its role in attenuating the action of conventional anticancer therapies is an area that has not…
Read MoreInterdisciplinarity to Integrate Knowledge in Engineering
This paper is an extension of work originally presented at the 2nd International Conference of the Portuguese Society for Engineering Education and aims to describe an interdisciplinarity teaching experiment involving three subjects of the scientific area of Mathematics and a fourth one in the area of Management. Using only one project, the students developed skills,…
Read MoreTreadmill and Vision System for Human Gait Acquisition and Analysis
This paper presents a developed low cost system for human gait analysis. Two web cameras placed in opposite sides of a treadmill are used to acquire images of a person walking at different speeds on a treadmill, carrying a set of passive marks located at strategic places of its body. The treadmill also has passive…
Read MoreAssessment of the heat sinking effect of a human hand that holds a flexible phototherapy device for use in Kangaroo Mother Care
The heat transfer process from a 6.4 Watt blue light flexible phototherapy mattress to a human hand has been studied. The intended use of the mattress is the provision of neonatal jaundice phototherapy during Kangaroo Mother Care (KMC) or skin-to-skin care. The heat transfer process has been studied with temperature and heat flow sensors inside…
Read MoreNetwork Intrusion Detection System using Apache Storm
Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various…
Read MoreTowards Optimality in Online Learning – The OLeCenT Approach
Higher Education Institutions (HEIs) employ Learning Management Systems (LMSs) primarily for greater efficiency, profitability, technological advancement or survival. The predominantly used LMSs, Moodle and Blackboard account for in excess of 60% usage by the top HEIs. However, the individual international regions do not necessarily bear the percentages of the overall total. Gaps are identified in…
Read MoreAn efficient model to improve the performance of platelet inventory of the blood banks
Platelet transfusions are vital for the prevention of fatal hemorrhage. Therefore, a stable inventory of platelets is required for an efficient and effective delivery of services in all the hospitals and medical centers. However, over the past decades, the requirement for platelets seems to be continuously increasing, while the number of potential donors is decreasing.…
Read MorePerformance Evaluation of Associative Classifiers in Perspective of Discretization Methods
Discretization is the process of converting numerical values into categorical values. Contemporary literature study reveals that there are many techniques available for numerical data discretization. The performance of classification method is dependent on the exploitation of the data discretizing method. In this article, we investigate the effect of discretization methods on the performance of associative…
Read MoreA novel model for Time-Series Data Clustering Based on piecewise SVD and BIRCH for Stock Data Analysis on Hadoop Platform
With the rapid growth of financial markets, analyzers are paying more attention on predictions. Stock data are time series data, with huge amounts. Feasible solution for handling the increasing amount of data is to use a cluster for parallel processing, and Hadoop parallel computing platform is a typical representative. There are various statistical models for…
Read MoreAnalysis of Wireless Traffic Data through Machine Learning
The paper presents an analytical study on a wireless traffic dataset carried out under the different approaches of machine learning including the backpropagation feedforward neural network, the time-series NARX network, the self-organizing map and the principal component analyses. These approaches are well-known for their usefulness in the modeling and in transforming a high dimensional data…
Read MoreVideo-frame Quality Improvement before Shot boundary Detection by using Logarithm, Wavelet and Contoulet Transform
Video shot boundary detection is important step for the research in the content analysis and retrieval fields. In this paper, firstly we presented an efficient method for Video-frame quality improvement to suppress flash occurred within video frame using logarithm, wavelet and contourlet transform. In addition, wavelet and contourlet transform also performed denoising. Secondly, for shot…
Read MoreElectromagnetic Field and Lumped Circuit Analysis of Planar Transformer at Medium Frequency for Converter Application
High frequency planar transformer is a new type of transformer that operates at high frequency. Its significance is proved through its miniaturised features, high power density and other performances. The design of planar transformer needs to consider several fundamental factors, including core material, dimension of layers and winding pattern. As the volume decreases, extra attentions…
Read MoreIndoor monitoring in Public Buildings: workplace wellbeing and energy consumptions. An example of IoT for smart cities application
In the recent years LepidaSpa created Sensornet platform for the control of the Emilia-Romagna territory managing heterogeneous environmental sensor networks distributed all over the region. LepidaSpa decided to integrate into Sensornet a brand-new family of sensors measuring indoor environmental parameters inside public buildings, in order to monitor energy consumption on one hand and workers’ wellbeing…
Read MoreEEG Mind Controlled Smart Prosthetic Arm – A Comprehensive Study
Recently, the field of prosthetics has seen many accomplishments especially with the integration of technological advancements. In this paper, different arm types (robotic, surgical, bionic, prosthetic and static) are analyzed in terms of resistance, usage, flexibility, cost and potential. Most of these techniques have some problems; they are extremely expensive, hard to install and maintain…
Read MoreFeatures based approach for indexation and representation of unstructured Arabic documents
The increase of textual information published in Arabic language on the internet, public libraries and administrations requires implementing effective techniques for the extraction of relevant information contained in large corpus of texts. The purpose of indexing is to create a document representation that easily find and identify the relevant information in a set of documents.…
Read MoreThe Analysis and Comparison of Multiport Converter used for Renewable Energy Sources
The concept of renewable energy is increasing day by day because the electrical applications are moving towards utilization of renewable sources and due to this factor electric power is also gaining ground and new type of converters are modelled in order to get high utilization of renewable sources. In this paper, two types of multiport…
Read MoreStructural Optimization of Wavy FinFET for Leakage Reduction and Performance Enhancement
Wavy FinFET is a hybrid device that integrates FinFET and Ultrathin Body FET technologies on SOI platform to provide high density and drivability without causing area penalty. The problem associated with this device is higher leakage and lower threshold voltage. This problem can be solved by structural modification of the device. This work analyses the…
Read MoreProgram with Ixquic
The goal of this paper is to explain the story telling, game design, game play and how is the interaction with the game Program with Ixquic. Here is the description about the new approach to this video game I called Program with Ixquic. Initially focused on an educational video game but now is a hybrid,…
Read MoreA Design of SDN Based IP Mobility Management Considering Inter-Domain Handovers and Its Evaluation
To use IP services continually while users are moving with their mobile devices, IP mobility management that enables them to keep IP communication is necessary. Although Mobile IP is a popular method to manage IP mobility, Mobile IP has a problem that there is a possibility of a mobile node (MN) communicating over a redundant…
Read MoreComputer Tomography from Micro-Electronics to Assembled Products
Traditional CT in our industry has been limited to Business card sized samples, due to the Cone Beam x-ray systems used by Electronics manufacturing companies. Inclined or Partial CT provides a slightly different solution showing layers or slices in 2D very well, but due to the partial nature of the scans does not produce very…
Read MoreMathematical Modeling and Digital Control of A Hybrid Switching Buck Converter
The aim of this paper is to describe mathematical modeling and digital control of a hybrid switching buck converter. This converter belongs to a class of so called hybrid switching converters and contains a resonant capacitor, resonant inductor and a diode in addition to original buck converter components. The dc gain of this converter is…
Read MoreEffect of Ambient Temperature Variations on Particle Dimesions in Ultrasonic Nebulizers during Cold Vaporization
For human comfort and convenience, appropriate temperature values may not be sufficient enough for the environment that they live in. The moisture content of the air has an important place in this regard. 30% to 65% humidity is desireable for a relaxed and comfortable life. Humidity in the environment is fundamental for the human health,…
Read MoreGraphics on demand: the automatic data visualization on the WEB
Data visualization is an effective tool for communicating the results of opinion surveys, epidemiological studies, statistics on consumer habits, etc. The graphical representation of data usually assists human information processing by reducing demands on attention, working memory, and long-term memory. It allows, among other things, a faster reading of the information (by acting on the…
Read MoreSpectral Reflectance Estimation and Color Reproduction Based on Sparse Neugebauer Model
This paper proposes a method for estimating the spectral reflectance of Neugebauer primaries or eight basic colors when the spectral reflectance data of several colors are given. The proposed method is based on Neugebauer model, which expresses an arbitrary color as a weighted average of Neugebauer primaries, and its sparse version called sparse Neugebauer model.…
Read More3D Senor-based Library Navigation System
The discussed system in this paper uses the Kinect’s 3D input (acquired through IR projector and Camera) to detect gestures and then based on these gestures perform certain tasks, and display certain results on an output screen. The programming language used here is the Processing open source software and a database was implemented to manage…
Read MoreDeterministic Approach to Detect Heart Sound Irregularities
A new method to detect heart sound that does not require machine learning is proposed. The heart sound is a time series event which is generated by the heart mechanical system. From the analysis of heart sound S-transform and the understanding of how heart works, it can be deducted that each heart sound component has…
Read MoreSpatial Modulation Technique For Filtered-OFDM Based Wireless Transmission
In this paper, a spatial modulation (SM) which provides no synchronization between the transmitting antennas and avoids inter-channel interference (ICI) at the receiver input while maintaining high spectral efficiency is applied to filtered-orthogonal frequency division multiplexing (F-OFDM) transmission. The SM technique maps a block of information bits into two information carrying units, namely, a symbol…
Read MoreTemplate-like Tensor Domain Operations to Enhancing Diffusion Datasets Quality
Diffusion MRI-based tractography, which is built by connecting the principal components of the estimated water diffusion pattern, is used to elucidate neuronal connectivity. However, the anatomical accuracy of the method is affected by factors such as noise and imaging misalignments. In this manuscript, we present a method to clean diffusion datasets by rotating the diffusion…
Read MoreEnsemble of Neural Network Conditional Random Fields for Self-Paced Brain Computer Interfaces
Classification of EEG signals in self-paced Brain Computer Interfaces (BCI) is an extremely challenging task. The main difficulty stems from the fact that start time of a control task is not defined. Therefore it is imperative to exploit the characteristics of the EEG data to the extent possible. In sensory motor self-paced BCIs, while performing…
Read MoreOptimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things
Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless…
Read MoreSkeletonization in Natural Image using Delaunay Triangulation
In this paper a novel approach to extract 2D skeleton information (skeletonization) from natural image is proposed. The work presented here is the extension of our previous paper presented at the International Sympsosium on Multimedia 2016. In the past work, a threshold based method is utilized. Here the algorithm is further improved by using a…
Read MoreA High Efficiency 0.13μm CMOS Full Wave Active Rectifier with Comparators for Implanted Medical Devices
This paper presents a full wave active rectifier for biomedical implanted devices using a new comparator in order to reduce the rectifier transistors reverse current. The rectifier was designed in 0.13μm CMOS process and it can deliver 1.2Vdc for a minimum signal of 1.3Vac. It achieves a power conversion efficiency of 92% at the 13.56MHz…
Read MoreMulticlass Myoelectric Identification of Five Fingers Motion using Artificial Neural Network and Support Vector Machine
The research in Neuro-Prosthetics is gaining more significance and popularity as the advancement in prosthetics control allows amputees to perform even more tasks. Indeed, the improvement of classification accuracy is a challenge in prosthetics control. In this research, a system is developed in order to improve the multiclass classification rate. Two classifiers namely Artificial Neural…
Read MoreGroup of UAVs Moving on Smooth Control Law with Fixed Obstacles
In this paper considered the movement of multi-agent system that consists of several UAVs that carry out monitoring ground surface. The multi-agent system includes a lead agent and several agents-members of the group. The motion of this system occurs along a trajectory, which is determined by the initial conditions, its mathematical model and obstacles on…
Read MorePredictive Technology Management for the Identification of Future Development Trends and the Maximum Achievable Potential Based on a Quantitative Analysis
A company’s ability to find the most profitable technology is based on a precise forecast of achievement potential. Technology Management (TM) uses forecasting models to analyse future potentials, e.g. the Gartner Hype Cycle, Arthur D. Little’s technology lifecycle or McKinsey’s S-curve model. All these methods are useful for qualitative analysis in the planning of strategic…
Read MoreImproving the Performance of Fair Scheduler in Hadoop
Cloud computing is a power platform to deal with big data. Among several software frameworks used for the construction of cloud computing systems, Apache Hadoop, which is an open-source software, becomes a popular one. Hadoop supports for distributed data storage and the process of large data sets on computer clusters based on a MapReduce parallel…
Read MoreRanking of Two Multi Criteria Decision Making Cases with Evidential Reasoning under Uncertainty
Many decision problems have more than one objective that need to be dealt with simultaneously. Moreover, because of the qualitative nature of the most of real world problem it is an inevitable activity and very important to interpret and present the uncertain information for making effective decision. The Evidential Reasoning (ER) approach which is one…
Read MoreApplied Horizontal and Vertical Geothermal Heat Exchanger with Heat Pump System to Provide Air Conditioning for an Academic Facility in Mexico
At present in Mexico, the renewable energy has become more important due to the great dependence of the country for fossil fuels. Within the several applications of renewable energy, there are the geothermal applications for the air conditioning of spaces. This technology employs heat pumps that interexchange heat with the ground. This technology is relatively…
Read MoreSpace Time – Track Circuits with Trellis Code Modulation
The track circuits are very important equipments used in the railway transportation system. Today these are used to send vital information, to the running train, in the same time with the integrity checking of the rail. The actual track circuits have a small problem due to the use of the same transmission medium by the…
Read MoreSupport Vector Machine based Vehicle Make and Model Recognition System
Vehicle analysis is a very useful component in various real world applications. In this paper, we have developed a Vehicle Make and Model Recognition (VMMR) system using Support Vector Machine (SVM). Scale Invariant Feature Transform (SIFT) and Speed-Up Robust Transform (SURF) are used to extract local features from an image. Bag-of-Features (BoF) model is used…
Read MoreEstimation of voltage unbalance at an AC traction substation with different train operational scenarios
This paper presents the modeling and simulation of the voltage unbalance in the power supply system of an AC electrified railway. The operating voltage at the traction substation is obtained by MATLAB/SIMULINK program and the voltage unbalance is evaluated by considering the voltage unbalance factor (VUF). Suvarnabhumi Airport Rail Link (ARL), in Bangkok, Thailand, is…
Read MoreA Microwave Reflectometer Prototype for Detection of Body Through the Rubble of Collapsed Buildings
There is a growing interest in using radio frequency in imaging for problem solving in situational awareness, surveillance, search and rescue operations, and screening for security. This has been fetched from recent development in addition to innovative technologies in microwave radar imaging applications. Despite the fact that no new phenomenology is exposed in this field,…
Read MoreRotary Cutting of Electrical Steel Laminations – A Contrast to Traditional Stamping
Rotary cutting of electrical steel laminations is a novel, promising alternative in the processing of electrical steel strip with enormous economical and technical potentials. This paper is an extension of work originally presented on the 6th International Electric Drives Production Conference (E|DPC) in Nuremberg, Germany 2016. The scope of this paper includes a theoretical description…
Read MoreDesign for Smaller, Lighter and Faster ICT Products: Technical Expertise, Infrastructures and Processes
For the design of Information and Communications Technology (ICT) related products, basic level of technical expertise and simple development tools were enough in the early 1980s. As time goes by, new generation products designed by engineers are always expected to be smaller, lighter and faster, due to the increasing global competition and the application of…
Read MoreA Novel Ultra High Speed and Configurable Discrete Wavelet Packet Transform Architecture
This work is dedicated to present a new pipeline-parallel architecture of Discrete Wavelet Packet Transform (DWPT) for all wavelet family implemented in FPGA technology. The main target of our architecture is to provide an effective performance trade-off, where it significantly increases the throughput with a restricted amount of hardware. In this article, we propose two…
Read MoreCognitive Artificial Intelligence Method for Interpreting Transformer Condition Based on Maintenance Data
A3S(Arwin-Adang-Aciek-Sembiring) is a method of information fusion at a single observation and OMA3S(Observation Multi-time A3S) is a method of information fusion for time-series data. This paper proposes OMA3S-based Cognitive Artificial-Intelligence method for interpreting Transformer Condition, which is calculated based on maintenance data from Indonesia National Electric Company (PLN). First, the proposed method is tested using…
Read MoreSelective Detrending using Baseline Drift Detection Index for Task-dependant fNIRS Signal
A functional near-infrared spectroscopy (fNIRS) can be employed to investigate brain activation by measuring the absorption of near-infrared light through the intact skull. The general linear model (GLM) as a standard model for fMRI analysis has been applied to functional near-infrared spectroscopic (fNIRS) imaging analysis as well. The GLM has drawback of failure in fNIRS…
Read MoreAutonomous Micro-Air-Vehicle Control Based on Visual Sensing for Odor Source Localization
In this paper, we propose a novel control method for autonomous-odor-source localization using visual and odor sensing by micro air vehicles (MAVs). Our method is based on biomimetics, which enable highly autonomous localization. Our method does not need any instruction signals, including even global positioning system (GPS) signals. An experimenter simply blows a whistle, and…
Read MoreEMI Shielding Performance For Varies Frequency by Metal Plating on Mold Compound
Conformal metalization on mold compound offers new possibility for IC package design to improve features such as rigidization of the flexible core, heat sink capability, 3D-circuit patterning and the electromagnetic interference (EMI) shielding. With the unique processes, the fabrication technology had enabled to achieve the high reliable performance and had passed the electrical test. Following…
Read MoreComparative Study of Adaptive Consensus Control of Euler-Lagrange Systems on Directed Network Graph
A comparative study between adaptive consensus control of multi-agent systems composed of fully actuated mobile robots which are described as a class of Euler-Lagrange systems on directed network graphs based on the notion of inverse optimal H∞ control criterion (Controller I), and the similar control strategy without H∞ control criterion (Controller II), is given in this paper.…
Read MoreFuture Contract Selection by Term Structure Analysis
In futures markets, a single asset is generally represented by several contracts with different maturities. The selection of specific contracts is an inevitable task that also creates new opportunities, especially in terms of speculative trading. Evaluating immediate and upcoming trading costs for all considered contracts might lead to a significantly improved performance. Among that, even…
Read MoreOptimal Rotor Design of Line Start Permanent Magnet Synchronous Motor by Genetic Algorithm
Line start permanent magnet synchronous motor (LSPMSM) is one of the highest efficiency motors due to no rotor copper loss at synchronous speed and self-starting. LSPMSM has torque characteristics of both induction motor IM and Permanent Magnet Synchronous Motor-PMSM. Using Genetic Algorithm (GA) for balancing magnetic cost and for copper loss minimization, the magnetic sizes…
Read MoreFault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task
Multiprocessor Systems-on-Chip (MPSoC) allow the implementation of heterogeneous architectures with a high integration capacity. In recent years, computational requirements MPSoC are increasing exponentially. This complexity, coupled with constantly evolving specifications, has forced designers to consider intrinsically flexible implementations. Deploying applications typical of multimedia domains is difficult, not only due to the heterogeneous parallelism in the…
Read MoreIncremental Control Techniques for Layout Modification of Integrated Circuits
Analog layout is created in integrated circuits (IC) computer aided design (CAD) environment and during realization requires a lot of modifications of database objects. Because database objects modification is time consuming, then any improvement and simplification of modification flow in IC CAD environment can increase layout productivity. A proposed new modification concept can speed-up layout…
Read MoreEffect of Cold Drawing Pass Schedule on Mechanical Properties and Microstructure of ST 52 during Cold Drawing of Seamless Tubes and its Influence on Springback
In-elastic recovery behavior of seamless tube material has been investigated by uniaxial tensile tests. Unloading Stress–Strain curves obtained under different passes of cold drawing process shows that the percentage of in-elastic recovery to the total recovery increased with plastic deformation. This paper is an experimental study that shows Young’s Modulus decreases with plastic strain for…
Read MoreIoT: Their Conveniences, Security Challenges and Possible Solutions
The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…
Read MoreRecognition and Position Estimation for Multiple Labware Transportation Using Kinect V2 and Mobile Robots
Mobile robots can be used to perform transportation tasks for different objects. These tasks have to be implemented carefully. Therefore, an accurate approach for object recognition and position estimation is required. This work presents a concept for identification and position estimation of multiple labware. These labware, which contain chemical and biological components, have to be…
Read MoreGrasping and Placing Operation for Labware Transportation in Life Science Laboratories using Mobile Robots
In automated working environments, mobile robots can be used for different purposes such as material handling, domestic services, and objects transportation. This work presents a grasping and placing operation for multiple labware and tube racks in life science laboratories using the H20 mobile robots. The H20 robot has dual arms where each arm consists of…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read MoreEfficiency of Photovoltaic Maximum Power Point Tracking Controller Based on a Fuzzy Logic
This paper examines the efficiency of a fuzzy logic control (FLC) based maximum power point tracking (MPPT) of a photovoltaic (PV) system under variable climate conditions and connected load requirements. The PV system including a PV module BP SX150S, buck-boost DC-DC converter, MPPT, and a resistive load is modeled and simulated using Matlab/Simulink package. In…
Read MoreModel-based Development of Safety-critical Functions and ISO 26262 Work Products using modified EAST-ADL
Safety is becoming more and more important with the ever increasing level of safety related E/E Systems built into the cars. Increasing functionality of vehicle systems through electrification of power train, in future even more by autonomous driving, leads to complexity in designing system, software and safety architecture. ISO 26262 aims to reduce the complexity…
Read MoreOn-Chip Testing Schemes of Through-Silicon-Vias (TSVs) in 3D Stacked ICs
This paper presents on-chip testing structures to characterize and detect faulty Through Silicon Vias (TSVs) in 3D ICs technology. 3D Gunning Transceiver Logic (GTL) I/O testing is proposed to characterize the performance of 3D TSVs in high speed applications. The GTL testing circuit will fire different data patterns at different frequencies to characterize the transient…
Read MoreStability and nonlinear controller design of Fast-Lock Phase-Locked Loop in 0.18-µm CMOS
This paper introduces a kind of novel backstepping phase- locked loops (PLL). The paper presents a developed theoretical model of (PLL) frequency synthesizer and provides analytical equations for calculating the desired specification such as phase margin (PM). The proposed model aims to improve the control accuracy, ensure stability and reducing the lock time. Adaptive controller…
Read MoreTowards Deployment Strategies for Deception Systems
Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…
Read MoreClassification of patient by analyzing EEG signal using DWT and least square support vector machine
Epilepsy is a neurological disorder which is most widespread in human beings after stroke. Approximately 70% of epilepsy cases can be cured if diagnosed and medicated properly. Electro-encephalogram (EEG) signals are recording of brain electrical activity that provides insight information and understanding of the mechanisms inside the brain. Since epileptic seizures occur erratically, it is…
Read MoreProposal for a Visualization System of Purchase Relationship Using ID-POS Data
In recent years, big data analysis is gaining immense credence in the fields of academics and business. Businesses such as management and marketing have demonstrated a strong inclination and interest in data analytics. However, many businesses are unable to utilize data even if they have access to it. The main reason for that is the…
Read MorePublic transportation network design: a geospatial data-driven method
The paper explores an issue of efficient public transportation network design as a part of the urban developing process. Having data about everyday residents travelling inside of an urban area, we can consider this data as people’s requirements for the public transport system. We propose a novel method for initial public transportation network design based…
Read MoreA Secure Communication Framework for ECUs
Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…
Read MoreContent Reordering Based on Mouse-tracking for Web Applications
Rising usage of web applications in every aspect of life has created intense need of enhancement of user experience and formation of intelligent web applications. This research work was conducted with a view to do so. This paper focuses on the reorganization of web application content based on user’s specific interests while browsing any web…
Read MoreMulti-attribute Reverse Auction Design Based on Fuzzy Data Envelopment Analysis Approach
Multi-attribute reverse auction is widely used for the procurements of enterprises or governments. To overcome the difficulty of identifying bidding attribute weight and score function of the buyer, the multi-round auction and bidding models with multiple winners are established based on fuzzy data envelopment analysis. The winner determination model of the buyer considers the integrated…
Read MoreA Category Based Threat Evaluation Model Using Platform Kinematics Data
Command and control (C2) systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to…
Read MoreThe effect of employing knowledge workers from technologically advanced countries: The knowledge spillover caused by the mobility of knowledge workers in electronic industries in Asia
This paper is an extension of work originally presented in 2017 6th International Conference on Industrial Technology and Management (ICITM) [53]. This research focuses on the mobilization of human resources in the Asian electrical industry and analyzes the impact of engineers’ international mobility on the innovation of enterprises in the host countries. I examine the…
Read MoreCompact wireless control network protocol with fast path switching
Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER), such as wireless control networks, often adopt time division multiple access (TDMA). However, it is difficult to add or adjust functions in protocol stacks that use TDMA…
Read MoreA Meta-analysis of Content and Language Integrated Learning in English
The purpose of this study is to investigate the effects of integrated content and English education. To fulfill this, 30 studies conducted in elementary school setting matching the meta-analysis criteria, such as being quantitative, experimental, or having affective statistical results after searching for the key words of “content-based”, “theme-based” and “integrated learning” on the accessible…
Read MoreHybrid Ontology-based knowledge with multi-objective optimization model framework for Decision Support System in intercropping
The problem of multi-criteria or multi-objective intercropping crop planning makes it vital to consider all related factors under the constraints that will produce the highest revenue and minimum cost. Principles of intercropping elements including soil type, plant area, plant diseases, planting and harvesting time and economics factors (e.g. price, cost) are some of the factors…
Read MoreEvaluating the Effect of Mozart Music and White Noise on Electroencephalography Pattern toward Visual Memory
Listening to auditory stimuli during study can give positive and negative influence on human cognitive processing. Thus, it has attracted researchers to conduct studies using various types of auditory stimuli. Some researchers believe that Mozart music and white noise are able to give positive influence on cognitive performance. However, most of the past studies gave…
Read MoreA Way for Measuring the Temperature Transients of Capacitors
With the increasing integration level of electronic circuits management of the generated heat became one of the most important design aspects. Beside the semiconductor components capacitors are also affected by the elevated temperature. In this paper a new thermal characterization method is proposed adopting the thermal transient measurement technique for capacitors utilizing the capacitance itself…
Read MoreRadiation Hybrid Mapping: A Resampling-based Method for Building High-Resolution Maps
Abstract— The process of mapping large numbers of markers is computationally complex, as the increase of numbers of markers results in an exponential increase in the mapping runtime. Also, having unreliable markers in the dataset adds more complexity to the mapping process. In this research, we have addressed these two issues and proposed our solution.…
Read MoreTwo-axis Gimbal with Passive Revolute Joints for Motion Isolation of a Stabilizing Mechanism
Energy efficiency is a salient design consideration for stabilization mechanisms when assembled on a battery-powered vehicle. In this paper we study the implementation of a two-axis gimbal with passive revolute joints for motion isolation of an inertially stabilized platform (ISP) mounted on a host vehicle. The objective is for the ISP to maintain a steady…
Read MoreCAM-Infrastructure: a novel solution for service advertisement in Cooperative Intelligent Transportation Systems
Cooperative Intelligent Transportation Systems (C-ITS) are gaining ground and currently are almost part of our everyday life. A C-ITS environment can provide numerous services that soon will become essential to roads’ users. The latter resides in improvement of road safety, entertainment, and commercial services. However, in order to provide such services, the C-ITS environment needs…
Read MoreUse of machine learning techniques in the prediction of credit recovery
This paper is an extended version of the paper originally presented at the International Conference on Machine Learning and Applications (ICMLA 2016), which proposes the construction of classifiers, based on the application of machine learning techniques, to identify defaulting clients with credit recovery potential. The study was carried out in 3 segments of a Bank’s…
Read MoreMonocular Height Estimation Method with 3 Degree-Of-Freedom Compensation of Road Unevennesses
Height estimation of objects is a valuable information for locomotion of autonomous robots and vehicles. Even though several sensors such as stereo cameras have been applied in these systems, cost and processing time have been motivating solutions with monocular cameras. This research proposes two new methods: i) height estimation of objects using only a monocular…
Read MoreScalability Dilemma and Statistic Multiplexed Computing — A Theory and Experiment
The For the last three decades, end-to-end computing paradigms, such as MPI (Message Passing Interface), RPC (Remote Procedure Call) and RMI (Remote Method Invocation), have been the de facto paradigms for distributed and parallel programming. Despite of the successes, applications built using these paradigms suffer due to the proportionality factor of crash in the application…
Read MoreEmbedded C Programming Using FRDM to Enhance Engineering Students’ Learning Skill
Computer programming course that utilizes languages such as C/C++ is always packed with dreary syntax details that consume most of the students’ learning time to obtain ‘grammatically’ correct source code. Consequently, it is difficult for most of the students to apply the theory they have learned in a real life context. Thus, this project proposed…
Read MoreA Modified Patch Antenna with Square-Open Loop Resonator Slot for Improved Bandwidth Performance in WiFi Applications
A novel, modified square patch antenna with square open loop resonator slot, operating at 5.5 GHz, for improved bandwidth performance is proposed in this article. A complementary square open loop resonator is introduced on the patch to enhance the bandwidth more than twice that of the conventional square patch antenna operating at the same frequency.…
Read MoreA comparative study for using the LBC format for compressing static medical images
This paper is an extension of work originally presented at conference Applied Machine Intelligence and Informatics (SAMI), 2017 IEEE 13th International Symposium. The article performs a comparative study between the image compression technique Local Binary Compressed format (LBC) proposed by the authors and the standard image compression techniques used today (BMP, JPEG, PNG and GIF).…
Read MoreAnalytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs
A Linear Wireless Sensor Network (LWSN) is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be…
Read MoreSystem for the Automatic Estimation of the Tilt Angle of a Flat Solar Collector
In this work, a compact system for the automatic estimation of the tilt angle at any location of the world is presented. The system components are one computer, one GPS receiver and one Python program. The tilt angle is calculated through the maximization of the flux of direct radiation incident upon a flat solar collector.…
Read MoreSource Code Vulnerabilities in IoT Software Systems
An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…
Read MoreLookup Tables-based mean level detection of spatially distributed targets in non Gaussian clutter
In this paper, Constant False Alarm Rate (CFAR) detection of spatially distributed targets embedded in compound Gaussian clutter with Inverse Gamma texture is addressed. By taking into account the fact that clutter parameters are unknown in practical situations, we propose mean level based on Lookup Tables detectors, that operate as a two-step approach, which consists…
Read MoreA Machine Learning based Framework for Parameter based Multi-Objective Optimisation of Video CODECs
All multimedia devices now incorporate video CODECs that comply with international video coding standards such as H.264 / MPEG4-AVC and the new High Efficiency Video Coding Standard (HEVC), otherwise known as H.265. Although the standard CODECs have been designed to include algorithms with optimal efficiency, a large number of coding parameters can be used to…
Read More2-D and 3-D Visualization of Many-to-Many Relationships
With the unprecedented wave of Big Data, the importance of information visualization is catching greater momentum. Understanding the underlying relationships between constituent objects is becoming a common task in every branch of science, and visualization of such relationships is a critical part of data analysis. While the techniques for the visualization of binary relationships are…
Read MoreOn the Performance of a Clustering-based Task Scheduling in a Heterogeneous System
Recent task scheduling algorithms for a generalized workflow job in heterogeneous system adopt list-based scheduling. In those algorithms, the response time cannot be effectively reduced if the given workflow job is data-intensive. If the workflow job is computationally intensive, an attempt is made to assign tasks to many processors, which can lead to resource starvation.…
Read MoreModeling and Control of Collaborative Robot System using Haptic Feedback
When two robot systems can share understanding using any agreed knowledge, within the constraints of the system’s communication protocol, the approach may lead to a common improvement. This has persuaded numerous new research inquiries in human-robot collaboration. We have built up a framework prepared to do independent following and performing table-best protest object manipulation with…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MorePlanning an Availability Demonstration Test with Consideration of Confidence Level
The full service life of a technical product or system is usually not completed after an initial failure. With appropriate measures, the system can be returned to a functional state. Availability is an important parameter for evaluating such repairable systems: Failure and repair behaviors are required to determine this availability. These data are usually given…
Read MoreA Reliable, Non-Invasive Approach to Data Center Monitoring and Management
Recent standards, legislation, and best practices point to data center infrastructure management systems to control and monitor data center performance. This work presents an innovative approach to address some of the challenges that currently hinder data center management. It explains how monitoring and management systems should be envisioned and implemented. Key parameters associated with data…
Read MoreAn Ontology-Based Temporal Scheduling and Complexity Reduction Model for Timetabling Knowledge Management
Technological tools such as Semantic Web and ontologies have contributed immensely to the reduction of most managerial complexities on daily basis. However, most resolved complexities are solely dependent on the emerging issues which are not general enough to accommodate some specific domain challenges. Temporal scheduling complexities occur in several domains including timetabling, but inter-departmental courses…
Read MoreCOTS – Harsh Condition Effects Considerations from Technology to User Level
Radiation hardened devices are mostly extremely expensive. The continuously downscaling of microelectronic structures and the unavoidable presence of particle radiation on ground and in space leads to unwanted failures in electronic devices. Furthermore it is expected that in the next few years around 8000 new satellites will be launched around the world. Due to the…
Read MoreA Secure Automated Elevator Management System and Pressure Sensor based Floor Estimation for Indoor Mobile Robot Transportation
In this paper, a secure elevator handling system is presented to enable a flexible movement of wheeled mobile robots among laboratories distributed in different floors. The automated handling system consists mainly of an ADAM module which has the ability to call the elevator to the robot’s current floor and to request the destination floor. The…
Read MoreCall Arrival Rate Prediction and Blocking Probability Estimation for Infrastructure based Mobile Cognitive Radio Personal Area Network
The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power…
Read MoreSoft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems
The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…
Read MoreProposal of an Embedded Methodology that uses Organizational Diagnosis and Reengineering: Case of bamboo panel company
This work is an extension of the Proceedings of the International Conference on Industrial Engineering, Management Science and Applications, which presented some of the phases of Reengineering applied to Bamboo Panel Company; the results were Strategic planning, Systemic Diagnosis and Performance Indicators through the Balanced Scorecard. Now, the main purpose of this article is to…
Read MoreThree-Dimensional EEG Signal Tracking for Reproducible Monitoring of Self-Contemplating Imagination
Electroencephalography (EEG) can globally monitor neural activity in millisecond scale, which is critical for identifying causality of human brain functions and mechanisms. However, to obtain accurate EEG stimulation-response relationship one usually needs to repeat multiple-ten times of stimulation-response recording to average out background signals of other irreverent brain activities, making real-time monitoring difficult to be…
Read MoreOptimizing the front-end power solution for automotive ADAS systems
In this paper the front-end power solution for automotive ADAS electronic systems is analyzed. The increased complexity of electronic systems in ADAS automotive brings new challenges for hardware design, especially with regard to improving the efficiency of the switched-mode power supply while maintaining the overall cost reasonably low and keeping the occupied area on the…
Read MoreEmotional state recognition in speech signal
The matters regarding speech signal processing and analyzing in terms of emotional states recognition were presented in this paper. An experiment was conducted to perform both objective and subjective emotional states recognition tests for Polish language.
Read MoreFactors Affecting the Adsorption of Trivalent Chromium Ions by Activated Carbon Prepared from Waste Rubber Tyres
Economic gains are generally the outcome of industrialization and consequently urbanization. However, positive fiscal index generates a negative impact on natural environment sources heaving pollutant burden on soil, air and water. Industries throw tones of contaminated water into soil and water bodies without proper treatment and create a potential threat for both living and non-living…
Read MoreA prospective design of a social assistive electronic system for the elderly
Aging is a natural process that progressively introduces limitations in a person’s life, which can have dramatic effects on the person’s lifestyle and wellbeing and in most cases is related to the strength of the person’s social bonds with the family and friends group. Therefore, it is important to maintain these bonds in the various…
Read MoreTheoretical developments for interpreting kernel spectral clustering from alternative viewpoints
To perform an exploration process over complex structured data within unsupervised settings, the so-called kernel spectral clustering (KSC) is one of the most recommended and appealing approaches, given its versatility and elegant formulation. In this work, we explore the relationship between (KSC) and other well-known approaches, namely normalized cut clustering and kernel k-means. To do…
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read More1-D Wavelet Signal Analysis of the Actuators Nonlinearities Impact on the Healthy Control Systems Performance
The objective of this paper is to investigate the use of the 1-D wavelet analysis to extract several patterns from signals data sets collected from healthy and faulty input-output signals of control systems as a preliminary step in real-time implementation of fault detection diagnosis and isolation strategies. The 1-D wavelet analysis proved that is an…
Read MorePluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read MoreOn Modeling Affect in Audio with Non-Linear Symbolic Dynamics
The discovery of semantic information from complex signals is a task concerned with connecting humans’ perceptions and/or intentions with the signals content. In the case of audio signals, complex perceptions are appraised in a listener’s mind, that trigger affective responses that may be relevant for well-being and survival. In this paper we are interested in…
Read MoreRetrieving Dialogue History in Deep Neural Networks for Spoken Language Understanding
In this paper, we propose a revised version of the semantic decoder for multi-label classification task in the spoken language understanding (SLU) pilot task of the Dialog State Tracking Challenge 5 (DSTC5). Our model concatenates two deep neural networks – a Convolutional Neural Network (CNN) and a Recurrent Neural Networks (RNN) – for detecting semantic…
Read MoreA Novel Approach to Sensor and Actuator Integrity Monitoring and Fault Magnitude Reconstruction
This paper proposes a novel approach to sensor and actuator integrity monitoring in a dynamic system. Multiple sensor and actuator faults can be detected. Furthermore, faulty sensors and actuators are isolated by contribution analysis. Most importantly, fault magnitudes can be correctly estimated and failed sensors or actuators outputs can be reconstructed. The proposed approach is…
Read MoreA Comparison of Mean Models and Clustering Techniques for Vertebra Detection and Region Separation from C-Spine X-Rays
In Computer Aided Diagnosis (CAD) tools, vertebra localization and detection are the essential steps for the diagnosis of cervical spine injuries. The accurate localization leads to accurate treatment, which is more challenging in case of poor contrast and noisy radiographs. This paper targets c-spine radiographs for the localization of vertebra using different vertebra templates, vertebra…
Read MoreMonitoring power breakers using vibro acoustic techniques
Speaking about the commutation’s equipment, it can be said that the best solution in increasing reliability and lowering the maintenance costs is a continuous monitoring of the equipment. However, if the price/quality ratio is considered, it is obvious that, for the moment, the diagnosis can be also an acceptable solution. Nowadays the predictive maintenance for…
Read MoreA Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System
Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…
Read MoreInvestigating the Expertise Indicators of Vulnerability Discovery Professionals
In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…
Read MoreOptimization of Depth-Based Routing for Underwater Wireless Sensor Networks through Intelligent Assignment of Initial Energy
Underwater Wireless Sensor Networks (UWSNs) are extensively used to explore the diverse marine environment. Energy efficiency is one of the main concerns regarding performance of UWSNs. In a cooperative wireless sensor network, nodes with no energy are known as coverage holes. These coverage holes are created due to non-uniform energy utilization by the sensor nodes…
Read MoreImproved Hybrid Opponent System for Professional Military Training
Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming.…
Read MoreSmartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches
Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…
Read More
