Skip to main content

Journals

A collection of scholarly literature created by experts and professionals in their fields. Included are theses, books, abstracts and articles.



rss RSS

1,877,936
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Journals
by Mohammed Mahdi Salih Altufaili, Ameer Najm Najaf, Zainab Sabah Idan
texts

eye 8

favorite 0

comment 0

Design of circular-shaped microstrip patch antenna for 5G applications 
Topics: Circular geometry, Circular-shaped antenna, Computer simulation technology, Fifth generation,...
Journals
by Svetlana A. Sadchikova, Mubarak Abdujapparova
texts

eye 11

favorite 0

comment 0

Characteristic's analysis of associative switching system
Topics: Associative switching, Fiber-optic communication, Probability of the switching module state,...
Journals
by Ahmed Hussein Ali, Mostafa Abduhgafoor Mohammed, Raed Abdulkareem Hasan, Maan Nawaf Abbod, Mohammed Sh. Ahmed, Tole Sutikno
texts

eye 0

favorite 0

comment 0

In response to the rapid growth of many sorts of information, highway data has continued to evolve in the direction of big data in terms of scale, type, and structure, exhibiting characteristics of multi-source heterogeneous data. The k-nearest neighbor (KNN) join has received a lot of interest in recent years due to its wide range of applications. Processing KNN joins is time-consuming and inefficient due to the quadratic structure of the join method. As the number of applications dealing with...
Topics: big data, k-nearest neighbor, machine learning, parallel processing, Radoop, Spark
Journals
by Hadhrami Ab. Ghani, Farah Najwa Roslim, Muhammad Akmal Remli, Eissa Mohammed Mohsen Al-Shari, Nurul Izrin Md Saleh, Azizul Azizan
texts

eye 20

favorite 0

comment 0

Non-orthogonal multiple access (NOMA) technology meets the increasing demand for high-seed cellular networks such as 5G by offering more users to be accommodated at once in accessing the cellular and wireless network. Moreover, the current demand of cellular networks for enhanced user fairness, greater spectrum efficiency and improved sum capacity further increase the need for NOMA improvement. However, the incurred interference in implementing NOMA user grouping constitutes one of the major...
Topics: Discrete, Multiple access, Non-orthogonal, Particle swarm optimization, User grouping
Journals
texts

eye 0

favorite 0

comment 0

Wireless Sensor Network (WSN) are in great demand from the recent years, as nowadays we have seen a wide growth of wireless devices including cellular phones, laptops, mobiles, PDA’s etc. WSNs consists of thousands of tiny sensor nodes. In a WSN a node is no longer useful when its battery dies, so to avoid this problem many protocols were introduced, but most of the rank is given to hierarchical routing protocols. In this paper, we analyze LEACH protocol, its phases, advantages and...
Topics: Wireless Sensor Networks, LEACH Protocol, Cluster
Wireless Sensor Networks (WSNs) consist of small nodes with identifying component by sensing, computation, and wireless communications infrastructure capabilities. The path searching means routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. WSN provide several types of applications providing...
Topics: Topology, Wireless sensor network, Fault tolerance
Journals
texts

eye 0

favorite 0

comment 0

Water is individual of the maximum essential beginnings for all consisting beings in the soil. In a rustic like India accompanying excellent society, categorization and control of water is established wonted harsh. The forever increasing entail for water stresses projects had relation accompanying water control, making sure the sensible outdoing and utilization of water origins. It further requires the bettering of main novelty and networks to advance the practice of water and proves calm...
Topics: Smart water, Sensor network, IoT
Wireless sensor networks are fast process of connection in part such as agriculture, healthcare, environmental monitoring, security, and manufacturing and also it thesaurus and measure physical signals and it also have wireless communication. Wireless sensors also can track the appliances; it is an automatic control of devices. It works as an investigation of types and application of wireless sensors in the ground and home. In this paper we have presented sort study on WSN applications.
Topics: Wireless sensor, Networks, Smart home appliances
Journals
by Nadhir Ibrahim Abdulkhaleq, Nahla Abdul Jalil Salih, Rajaa Salih Mohammed Hasan, Ihsan Jabbar Hasan
texts

eye 0

favorite 0

comment 0

This paper introduces a Simulink model design for a modified fountain code. The code is a new version of the traditional Luby transform (LT) codes. The design constructs the blocks required for generation of the generator matrix of a limited-degree-hopping-segment Luby transform (LDHS-LT) codes. This code is especially designed for short length data files which have assigned a great interest for wireless sensor networks. It generates the degrees in a predetermined sequence but random generation...
Topics: fountain codes, generator matrix, LDHS-LT, short length files, simulink model
Journals
by Nadhir Ibrahim Abdulkhaleq, Nahla Abdul Jalil Salih, Rajaa Salih Mohammed Hasan, Ihsan Jabbar Hasan
texts

eye 0

favorite 0

comment 0

This paper introduces a Simulink model design for a modified fountain code. The code is a new version of the traditional Luby transform (LT) codes. The design constructs the blocks required for generation of the generator matrix of a limited-degree-hopping-segment Luby transform (LDHS-LT) codes. This code is especially designed for short length data files which have assigned a great interest for wireless sensor networks. It generates the degrees in a predetermined sequence but random generation...
Topics: fountain codes, generator matrix, LDHS-LT, short length files, simulink model
Journals
by Vikas Goel, Mukul Aggarwal, Amit Kumar Gupta, Narendra Kumar
texts

eye 5

favorite 0

comment 0

An Aadhaar is a unique number issued to every citizen in India.   Aadhar’s current identity authentication relies on the central identities data repository (CDIR) of the unique identification authority of India (UIDAI), which is at risk of a single-point fault attack. Perhaps worse, internal attacks can tamper with the sensitive data of authenticated devices without being detected. In this paper, the proposed system utilizes emerging technology: blockchain for solving the issue of...
Topics: aadhar authentication, bitcoin, blockchain, ethereum, smart contact, solidity
Journals
by Majed O. Al-Dwairi, Amjad Y. Hindi, Mohamed S. Soliman, Mohammad F. Aljafari
texts

eye 33

favorite 0

comment 0

A modified rectangular monopole ultra-wideband (UWB) antenna with penta notched frequency bands is presented. An inverted U shaped and slanted U-shaped on the radiating patch are inserted to achieve WiMAX and ARN bands rejection respectively, two mirrored summation Σ-shaped and four mirrored 5-shaped slots are inserted on the partial ground to achieve WLAN and X-band bands rejection respectively, finally rectangular shaped slot with partially open on the feed is inserted to achieve ITU-8 band...
Topics: Maximum gain, Monopole antenna, Penta-band notched, Reject band, UWB antenna
Journals
texts

eye 34

favorite 0

comment 0

A rectangular tuneable ultra-wideband (UWB) microstrip patch (MP) antenna based on a single sheet of graphene (SSG) is designed in this study. The antenna band can be tuned by applying a DC voltage bias perpendicular to the SSG at various values via adjusting the input impedance. The antenna has been analyzed by computer simulation technology (CST) microwave studio (MWS) software using an FR4 substrate of thickness 1.6 mm with a dielectric permittivity 𝜀𝑟= 4.4 and loss tangent tan δ =...
Topics: Graphene, Microstrip patch antenna, Notch-characteristics, Reconfigurability, Ultra wideband antenna
Journals
by Qazwan Abdullah, Nor Shahida Mohd Shah, Nabil Farah, Waheb A. Jabbar, Noorsaliza Abdullah, Adeeb Salh, Jameel A. A. Mukred
texts

eye 22

favorite 0

comment 0

This paper presents a reduced size microstrip five poles hairpin band-pass filter using three-layers structure for Ku-band satellites application. The three-layers structure shows a substantially reduced filter size and enlarged bandwidth. The filter has been designed based on five-pole resonators at 12.475 GHz and bandwidth of 550 MHz. This filter is designed on Rogers RO3003 substrate having relative permittivity (εr) of 3. The proposed band-pass filter has been designed with the help of...
Topics: Band-pass, Filter, Multi-layer hairpin, Reduced size, Size reduction
Journals
by Hanan A. Al-Jubouri, Sawsan M. Mahmmod
texts

eye 15

favorite 0

comment 0

Feature descriptor and similarity measures are the two core components in content-based image retrieval and crucial issues due to “semantic gap” between human conceptual meaning and a machine low-level feature. Recently, deep learning techniques have shown a great interest in image recognition especially in extracting features information about the images. In this paper, we investigated, compared, and evaluated different deep convolutional neural networks and their applications for image...
Topics: Content-based image retrieval, Convolutional neural networks, Image classification, Image retrieval...
Journals
by Kusrini Kusrini, Suputa Suputa, Arief Setyanto, I Made Artha Agastya, Herlambang Priantoro, Sofyan Pariyasto
texts

eye 2

favorite 0

comment 0

Mango is a popular fruit for local consumption and export commodity. Currently, Indonesian mango export at 37.8 M accounted for 0.115% of world consumption. Pest and disease are the common enemies of mango that degrade the quality of mango yield. Specialized treatment in export destinations such as gamma-ray in Australia, or hot water treatment in Korea, demands pest-free and high-quality products. Artificial intelligence helps to improve mango pest and disease control. This paper compares the...
Topics: CNN, inceptionResNet-V2, inception-V3, mango pest and disease, ResNet50, VGG16
Journals
by Choon Beng Tan, Mohd Hanafi Ahmad Hijazi, Puteri Nor Ellyza Nohuddin
texts

eye 0

favorite 0

comment 0

As the emergence of the voice biometric provides enhanced security and convenience, voice biometric-based applications such as speaker verification were gradually replacing the authentication techniques that were less secure. However, the automatic speaker verification (ASV) systems were exposed to spoofing attacks, especially artificial speech attacks that can be generated with a large amount in a short period of time using state-of-the-art speech synthesis and voice conversion algorithms....
Topics: artificial speech, artificial speech detection, support vector machine
Journals
by Akinwale Oluwaseyi Fadamiro, Fujiang Lin
texts

eye 7

favorite 0

comment 0

This paper presented a compressive sensing (CS) calibration technique that simultaneously measures all the element excitations of a 2×2 active phased antenna array (APAA) instantaneously. The power patterns of the rectangular 2×2 APAA element are synchronized to orthogonally cross multiplicative sub-array system applying compressive sensing in achieving an array thinning along two 1-D sub-arrays for a fixed steered beam radiation. The far field radiation pattern direction of the 2×2 APAA is...
Topics: antenna arrays, antenna measurements, calibration, compressed sensing, fault diagnosis
Journals
by Nadia A. Karim, Suhad A. Ali, Majid Jabbar Jawad
texts

eye 6

favorite 0

comment 0

Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret data in a more secure way and to enhance the robustness against attacks. This method depends on frequency domain. The embedding process consists of several steps. Firstly, the secret data is divided into no overlapping segments. Secondly, a set of images is...
Topics: coverless steganography, discrete wavelet transform, information hiding, information security,...
Journals
texts

eye 11

favorite 0

comment 0

The recent corona virus disease (COVID-19) pandemic has brought the issues of technological deficiencies and challenges of security and privacy, validating and maintaining anonymity, user control over records while fully utilizing the available records etc., that can be encountered in an emergency or pandemic condition. Blockchain technology has evolved as a promising solution in conditions that necessitate immutability, record integrity, and proper records authentication. Blockchain can...
Topics: Blockchain, COVID-19, Electronic health record, Healthcare, Security
Journals
by Rula Amjad Hamid, Muayad Sadik Croock
texts

eye 31

favorite 0

comment 0

One of the areas that have challenges in the use of internet of things (IoT) is the field of tourism and travel. The issue here is how to employ this technology to serve the tourism and managing the produced data. This work is focus on the use of tourists' trajectories that are collected from global positioning system (GPS) mobile sensors as a source of information. The aim of work is to predict preferred tourism places for tourists by tracking tourists' behavior to extract the tourism places...
Topics: IoT, Point of interest, Stay points, Tourism, Trajectories
Journals
by Huda Rashid Shakir, Sadiq Abdul Aziz Mehdi, Anwar Abbas Hattab
texts

eye 5

favorite 0

comment 0

S-box is one of the most significant structures used to construct encryption that is strong and resistant to attacks in encryption algorithms. The new 4D-hyper chaotic system and deoxyribonucleic acid (DNA) computing are used in this paper to provide a new dynamic S-box generating approach. The 4D generated numbers are processed to generate a hexadecimal number that will encode using the DNA coding method and using addition, subtraction, and exclusive-or operations to produce the final DNA...
Topics: balanced, bit independence criteria, DNA computing, hyper-chaotic system, strict avalanche...
Journals
by Micheal Olaolu Arowolo, Marion Olubunmi Adebiyi, Ayodele Ariyo Adebiyi
texts

eye 30

favorite 0

comment 0

Malaria larvae accept explosive variable lifecycle as they spread across numerous mosquito vector stratosphere. Transcriptomes arise in thousands of diverse parasites. Ribonucleic acid sequencing (RNA-seq) is a prevalent gene expression that has led to enhanced understanding of genetic queries. RNA-seq tests transcript of gene expression, and provides methodological enhancements to machine learning procedures. Researchers have proposed several methods in evaluating and learning biological data....
Topics: Decision tree, Genetic algorithm KNN, Mosquito anopheles, Ribonucleic acid sequencing
Journals
by Fatima El Barakaz, Omar Boutkhoum, Abdelmajid El Moutaouakkil
texts

eye 42

favorite 0

comment 0

In this paper, a hybrid method has been introduced to improve the classification performance of naïve Bayes (NB) for the mixed dataset and multi-class problems. This proposed method relies on a similarity measure which is applied to portions that are not correctly classified by NB. Since the data contains a multi-valued short text with rare words that limit the NB performance, we have employed an adapted selective classifier based on similarities (CSBS) classifier to exceed the NB limitations...
Topics: CSBS, Mixed data, Multi-classification, Naïve Bayes, Short text, Similarity-based
Journals
by Shaik Asif Hussain, Jyothi Chinna Babu, Raza Hasan, Salman Mahmood
texts

eye 6

favorite 0

comment 0

The Euclidean geometry (EG) based low-density parity check (LDPC) codes are enciphered and deciphered in various modes. These algorithms have the back-and-forth between decoding delay, and power usage, device unpredictability resources, and error rate efficacy are all available with these methods. As a result, the goal of this paper is to develop a comprehensive method to describe both soft and burst error bits for optimal data transfer. As a result, for EG-LDPC codes, a hybrid soft bit...
Topics: EG-LDPC codes, Hybrid SBF algorithm, LDPC decoder, Medical applications, Signal transmission
Journals
by Akram El Hamdouni, Abdelali Tajmouati, Jamal Zbitou, Hamid Bennis, Ahmed Errkik, Larbi El Abdellaoui, Mohamed Latrach
texts

eye 24

favorite 0

comment 0

In this study a validated antenna into simulation and through measurement has been described and analyzed. The coplanar waveguide (CPW) technique has been chosen to feed the radiating patch while the two ground planes have been partially designed in the top side of the substrate. The fractal geometry, applied to the circular radiator, has been obtained by merging the circular and rectangular shapes. The fiberglass FR-4, with a single side of 35μm copper thickness, has been used to achieve the...
Topics: CPW, FCC, Fractal geometry, Radiation pattern, Return loss, UWB
Journals
by Omar Faruqe, Rumana Akhter, Md Tawfiq Amin
texts

eye 27

favorite 0

comment 0

This paper presents a wideband varactorless voltage controlled oscillator (VCO) based on tunable active inductor in 90 nm CMOS process which yields a tuning range of 1.22 GHz to 3.7 GHz having a tuning scope of 100.5%. The designed VCO can be used for wideband wireless applications. The proposed VCO consumes a very low power (1.05~2.5) mW with the change of tuning voltages (0.3~0.9) V and provides a differential output power of (1.17~-5.13) dBm. The VCO exhibits phase noise of -80.50 dBc/Hz @...
Topics: Active inductor, Figure of merit, Phase noise, Tuning range, VCO
Journals
by Emmanuel O. Asani, Adebayo Omotosho, Paul A. Danquah, Joyce A. Ayoola, Peace O. Ayegba, Olumide B. Longe
texts

eye 8

favorite 0

comment 0

Over the years, electronic mail (e-mail) has been the target of several malicious attacks. Phishing is one of the most recognizable forms of manipulation aimed at e-mail users and usually, employs social engineering to trick innocent users into supplying sensitive information into an imposter website. Attacks from phishing emails can result in the exposure of confidential information, financial loss, data misuse, and others. This paper presents the implementation of a maximum entropy (ME)...
Topics: Classification, Parsimonous features, Phishing, Social engineering
Journals
by Nguyen Minh Hai, Thanh The Van, Tran Van Lang
texts

eye 4

favorite 0

comment 0

Semantic extraction for images is an urgent problem and is applied in many different semantic retrieval systems. In this paper, a semantic-based image retrieval (SBIR) system is proposed based on the combination of growth partitioning tree (GP-Tree), which was built in the authors’ previous work, with a self-organizing map (SOM) network and neighbor graph (called SgGP-Tree) to improve accuracy. For each query image, a similar set of images is retrieved on the SgGP-Tree, and a set of visual...
Topics: data mining, image retrieval, ontology, SBIR, similar image
Journals
texts

eye 8

favorite 0

comment 0

With the huge advance in artificial intelligence and the rapid development of intelligent swarm algorithms, the exploration of facility layout problem (FLP) with its non-deterministic polynomial-time (NP-Hard) nature has gained much more attention. The squirrel search algorithm is one of the swarm algorithms that is known for its effective gliding feature that provides cheap exploration of lengthy distances. In this work, Msqrl algorithm is presented as a modification of squirrel search...
Topics: combinatorial optimization, facility layout planning, squirrel search algorithm, swarm intelligence
Journals
by Alaa Wagih Abdul Qader, Israa Ezzat Salem, Haider Rasheed Abdulshaheed
texts

eye 37

favorite 0

comment 0

IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software...
Topics: Authentication integrity, Hash functions, Validation
Journals
by Badr Nasiri, Ahmed Errkik, Jamal Zbitou
texts

eye 29

favorite 0

comment 0

In this paper, we present a new antenna for radio frequency identification (RFID) tag operating in the Moroccan ultra high frequency (UHF) band around 868 MHz, this antenna is designed on a flexible plastic substrate of relative permittivity 3 and low tangential losses which is 0.002. The proposed tag is designed to identify clothing in supermarkets. The tag antenna has a miniature size of 38 mm in length and 26 mm in width. This miniature size was obtained by using two rectangular split ring...
Topics: Antenna, Clothing identification, Metamaterial, RFID, Tag antenna
Journals
texts

eye 23

favorite 0

comment 0

Normally, the collected EEG signals from the human scalp cortex by using the non-invasive EEG collection methods were contaminated with artifacts, like an eye electrical activity, leading to increases in the challenges in analyzing the electroencephalogram for obtaining useful clinical information. In this paper, we do a comparison of using two decomposing methods (DWT and EMD) with CCA technique or High Pass Filter, for the elimination of eye artifacts from EEG. The eye artifacts (EOG) signals...
Topics: CCA, DWT, EEG, EMD, EOG, H.P.F.
Journals
by Yasir Hashim, Mohammed Nazmus Shakib
texts

eye 25

favorite 0

comment 0

This paper reviews the fabrication technologies of silicon nanowire transistors (SiNWTs) and rapidly development in this area, as this paper presents various types of SiNWT structures, development of SiNWT properties and different applications until nowadays. This research provides a good comparison among fabrication technologies of SiNWTs depending on a new factor DIF, this factor depends on the size of channel and power consumption in channel. As a result of this comparison, the best...
Topics: AFM, IC, Nanolithography, SiNWT, Transistor
Journals
by Muhammad Nuruddin Ar Rabbani, Andriazis Dahono, Arwindra Rizqiawan, Pekik Argo Dahono
texts

eye 5

favorite 0

comment 0

Bidirectional DC-DC converters with very low ripple contents in the input and output sides are desirable in many applications. This paper proposes a new family of bidirectional DC-DC converters with very low input and output ripples that is derived from the conventional Cuk DC-DC converter. At first, a new family of single-phase DC-DC converter is derived. Then, extension of this family into the multiphase ones is presented. Output voltage expressions of the proposed DC-DC converters are...
Topics: Cuk converter, DC-DC converter, multiphase, ripple, topology
Journals
by Suhad Muhajer Kareem, Abdul Monem S. Rahma
texts

eye 51

favorite 0

comment 0

Blowfish is a block cypher algorithm used in many applications to enhance security, but it includes several drawbacks. For example, the mix between the key and data is limited. This paper presents a new modification to the Blowfish algorithm to overcome such problems realised through a multi-state operation instead of an XOR. Our proposed algorithm uses three keys in the encryption and decryption processes instead of one for controlling the variable block bits sizes (1, 2, 4, and 8) bits and...
Topics: Blowfish algorithm, Encryption security, Multi-level keys, Symmetric block cipher
Journals
texts

eye 30

favorite 0

comment 0

This paper introduces a new design of a cross-coupled microstrip bandpass filter (MBPF) based on hairpin defected ground structure (DGS) resonators using accurate coupling matrix (CM) technique for microwave communication systems. The article presents the equivalent circuit of the suggested MBPF based on the DGS equivalent circuit model derived from the equivalent inductance and capacitance that occurs despite the presence of the slots disrupting the current in the ground layer. The paper...
Topics: Coupling matrix (CM), Cross coupling (CC), Hairpin-defected ground structure (Hairpin-DGS),...
Journals
texts

eye 35

favorite 0

comment 0

Compressive sensing (CS) is a new attractive technique adopted for linear time varying channel estimation. orthogonal frequency division multiplexing (OFDM) was proposed to be used in 4G and 5G which supports high data rate requirements. Different pilot aided channel estimation techniques were proposed to better track the channel conditions, which consumes bandwidth, thus, considerable data rate reduced. In order to estimate the channel with minimum number of pilots, compressive sensing CS was...
Topics: Channel estimation, Compressive sensing, LTV channel, OFDM
Journals
by F. Ouberri, A. Tajmouati, J. Zbitou, I. Zahraoui, M. Latrach
texts

eye 13

favorite 0

comment 0

This paper presents a new circular polarized micro-strip antenna with a pentagonal shape radiator. The proposed antenna is designed to operate in the industrial scientific medical (ISM) band at the frequency of 2.45GHz for Wireless applications. The antenna consists of a radiating pentagon patch with appropriate dimensions on the upper side of a dielectric substrate and a defective ground structure (DGS) on the other side. The pentagon patch is fed through a 50Ω microstrip line. The structure...
Topics: Circular polarization, Defected ground structure, ISM band, Micro-strip antenna, Pentagonal shape,...
Journals
texts

eye 6

favorite 0

comment 0

Full ferning is the peak of the formation of a salt crystallization line pattern shaped like a fern tree in a woman’s saliva at the time of ovulation. The main problem in this study is how to detect the shape of the salivary ferning line patterns that are transparent, irregular and the surface lighting is uneven. This study aims to detect transparent and irregular lines on the salivary ferning surface using a comparison of 15 pre-trained convolutional neural network models. To detect...
Topics: Deep learning, Fern-like lines, Frangi filter, ResNet34, Salivary ferning
Journals
by Amjad Y. Hindi
texts

eye 24

favorite 0

comment 0

Cryptography is one of the paramount and most vital data treatment processes, it allows us to be secure in our electronic transactions. The process of cryptography protects our valuable data such as private account numbers and transaction amounts, electronic signatures replace handwritten signatures or credit card authorizations, and public-key encryption provides confidentiality. The objective of data encryption is to keep digital data confidentiality save as it is stored on computer systems...
Topics: AES, Decoder, DES, Digital image, Encoder, Hight, Histogram, LED, Speedup
Journals
by Fatima Ouberri, Abdelali Tajmouati, Noha Chahboun, Larbi El Abdellaoui, Mohamed Latrach
texts

eye 10

favorite 0

comment 0

The requirement for applications operating at a variety of frequencies in a unified wireless device has greatly enhanced in recent years. For this purpose, multi-functional wireless components are essential. This paper presents a new design of a wideband circularly-polarized microstrip antenna array with defected ground structure (DGS). A previous design was introduced which cover the C-band at 5.8 GHz and operates in the industrial scientific medical (ISM) band for wireless communication...
Topics: Array antenna, Circular polarization, DGS, ISM band, Wideband, Wireless power transmission
Journals
by Puput Dani Prasetyo Adi, Akio Kitagawa
texts

eye 37

favorite 0

comment 0

LoRa is a Radio Frequency module that can send packet data up to 3 km in FSPL.LoRa has 3 different Frequency Radios i.e, 915 MHz, 868 MHz, and 433 MHz. LoRa testing is based on different distances, BME280 provides Barometric Pressure, Temperature, and Humidity data. An analysis from the results of the Received Signal Strength to the distance (m) to the farthest point to prove and provide QoS data from LoRa 915 MHz. Sensor nodes are built using ADR and Automatic sleep mode algorithms....
Topics: Barometric, BME280, IoT, LoRa, Pressure, Temperature
Journals
by D. S. Shylu, P. Sam Paul, D. Jackuline Moni, J. Arolin Monica Helan
texts

eye 24

favorite 0

comment 0

In low-power VLSI design applications non-linearity and harmonics are a major dominant factor which affects the performance of the ADC. To avoid this, the new architecture of voltage-controlled oscillator (VCO) was required to solve the non-linearity issues and harmonic distortion. In this work, a 12-bit, 200MS/s low power delta-sigma analog to digital converter (ADC) VCO based quantizer was designed using switched capacitor technique. The proposed technique uses frequency to current conversion...
Topics: Amplifier Continuous-time (CT), Delta-sigma (ΔΣ), Loop filter, Switch capacitor circuits,...
Journals
by Oluwole A. Adegbola, Ismail A. Adeyemo, Folasade A. Semire, Segun I. Popoola, Aderemi A. Atayero
texts

eye 25

favorite 0

comment 0

In content-based image retrieval (CBIR) system, one approach of image representation is to employ combination of low-level visual features cascaded together into a flat vector. While this presents more descriptive information, it however poses serious challenges in terms of high dimensionality and high computational cost of feature extraction algorithms to deployment of CBIR on platforms (devices) with limited computational and storage resources. Hence, in this work a feature dimensionality...
Topics: Content-based image retrieval system, Feature dimensionality reduction, Low-level visual feature,...
Journals
by Olalekan Ogunbiyi, Oludare Y. Ogundepo, Madugu I. Sani, Cornelius Thomas, Benjamin J. Olufeagba
texts

eye 23

favorite 0

comment 0

Electricity generation at the hydropower stations in Nigeria has been below the expected value. While the hydro stations have a capacity to generate up to 2,380 MW, the daily average energy generated in 2017 was estimated at around 846 MW. A factor responsible for this is the lack of a proper control system to manage the transfer of resources between the cascaded Kainji-Jebba Hydropower stations operating in tandem. This paper addressed the optimal regulation of the operating head of the Jebba...
Topics: Constraints, Inflow, Optimal control, Operating head, Pontryagain
Journals
by Van Hai Pham, Quoc Hung Nguyen, Thanh Trung Le, Thi Xuan Dao Nguyen, Thi Thuy Kieu Phan
texts

eye 6

favorite 0

comment 0

In conventional monitoring of human behavior in forest protection, deep learning approaches can be detected human behavior significantly since thousands of visitors’ forest protection is abnormal and normal behaviors coming to national or rural forests. This paper has presented a new approach using a deep learning model integrated with a knowledge graph for the surveillance monitoring system to be activated to confirm human behavior in a real-time video together with its tracking human...
Topics: deep learning, forest protection, human action recognition, identifying human behavior, video...
Journals
by Belal Ayyoub, Bilal Zahran, Mahdi A. Nisirat, Farouq M. S. Al-Taweel, Mohammad Al Khawaldah
texts

eye 32

favorite 0

comment 0

Automation of several payment processes from start to end is a challenging task, particularly when multiple payments from online and offline billers are involved. In this paper, we introduced a new aggregator system to combine all billing system types, in which it is possible to pay invoices electronically. The proposed aggregator system was designed to be employed in a cloud-based billers hub (CBBH) developed by the central banks. Furthermore, many applications can be realized such as; deposit...
Topics: Bill payment, Cloud computing, Electronic bill presentment and payment, Internet billing system
Journals
by Rana Bader, Basem Alokush, Mohammad Abdallah, Khalil Awad, Amir Ngah
texts

eye 24

favorite 0

comment 0

Many organization, programmers, and researchers need to debug, test and make maintenance for a segment of their source code to improve their system. Program slicing is one of the best techniques to do so. There are many slicing techniques available to solve such problems such as static slicing, dynamic slicing, and amorphous slicing. In our paper, we decided to develop a tool that supports many slicing techniques. Our proposed tool provides new flexible ways to process simple segments of Java...
Topics: Direct and indirect dependency, Forward and backward slicing, Static slicing
Journals
by Shihab A. Shawkat‎‎, Israa Al-Barazanchi
texts

eye 8

favorite 0

comment 0

Data security and protection is one of the most common technologies used in the field of computer  ‎ science. This is because of its great importance in all fields related to daily life, whether political,  ‎ economic, and other aspects change. In this research paper, a new intelligent system  ‎ that  ‎ concentrates on image  ‎ and text encryption and decryption is proposed.  ‎ Furthermore,  ‎ the image recognition rate is increased. In this paper,  ‎ the Rivest Shamir...
Topics: DCT techniques fourth, information security second, encryption, MSE, PSNR, RSA3k, XOR
Journals
by Ibrahim Alhamrouni, Mohamed Salem, Awang Jusoh, Tole Sutikno
texts

eye 3

favorite 0

comment 0

Energy consumption by sector in Malaysia is rising significantly, especially for residential and commercial sectors, and is expected to continue to increase in the upcoming years. The existing power generated from a proton-exchange membrane fuel cell (PEMFC) system may be insufficient to sustain peak load demands during peak periods in stationary residential applications. The presence of an ultra-capacitor (UC) bank would be beneficial as a support as it can supply a large burst of power. The...
Topics: energy demands, energy efficiency, PEM fuel cell, PEMFC, stationary applications, ultra-capacitor
Journals
texts

eye 43

favorite 0

comment 0

Emergence of cloud computing as the inevitable IT computing paradigm, the perception of the compute reference model and building of services has evolved into new dimensions. Serverless computing is an execution model in which the cloud service provider dynamically manages the allocation of compute resources of the server. The consumer is billed for the actual volume of resources consumed by them, instead paying for the pre-purchased units of compute capacity. This model evolved as a way to...
Topics: AWS lambda, Cloud computing, FaaS, Google cloud function, Microsoft Azure function, Serverless...
Journals
texts

eye 23

favorite 0

comment 0

Our lives, nowadays, are digital. We, as humans, are using software applications in all our life aspects to meet our daily objectives and fulfill our needs. Software solutions that comprise mobile apps are widely spread, users can select from hundreds of available software solutions that fit their needs. Accordingly, user needs are becoming intricate and the software organizations are competing high to satisfy user requirements and the desires for better quality. This competition is not about...
Topics: Evaluation theory, SQuaRE standards, User experience framework, User needs experience, UX...
Journals
by Liliana, Ji-Hun Chae, Joon-Jae Lee, Byung-Gook Lee
texts

eye 26

favorite 0

comment 0

Many VR-based medical purposes applications have been developed to help patients with mobility decrease caused by accidents, diseases, or other injuries to do physical treatment efficiently. VR-based applications were considered more effective helper for individual physical treatment because of their low-cost equipment and flexibility in time and space, less assistance of a physical therapist. A challenge in developing a VR-based physical treatment was understanding the body part movement...
Topics: 2D image gesture representation, Binary image learning, Density-based CNN, Hand gesture...
Journals
by Israa Ezzat Salem, Haider Rasheed Abdulshaheed, Hassan Muwafaq Gheni
texts

eye 5

favorite 0

comment 0

Telemedicine platforms have emerged as one of the most harnessed studies in recent years, especially after the spread of pandemics. Due to the epidemic, telemedicine distribution to rural or isolated areas has become an urgent need. However, there are several obstacles to providing remote medical care, the most significant of which is protecting patient data while sustaining the speed of communication between the patient and the medical staff. The significant of this study is to provides a...
Topics: Diffie Hellman encryption, IoT chaotic cryptographic, IoT system, lightweight crypto, telemedicine...
Journals
by Ahmed Hashim Mohammed, Rawaa Mohammed Abdul Hussein
texts

eye 9

favorite 0

comment 0

Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based...
Topics: AES-CBC, electronic health, internet of thing blockchain, security services
Journals
by Vian S. Al-Doori, Emad H. Al-Hemiary
texts

eye 31

favorite 0

comment 0

Index modulation is one of the promising techniques for future communications systems due to many improvement over the classical orthogonal frequency division multiplexing systems such as single RF chain, increased throughput for the same modulation order, achieved tradeoff between the efficiencies of the power and the spectral, and elimination of inter-channel interference. Many forms of index modulation researches exist where symbols are conveyed in antennas, subcarriers, time slots, and the...
Topics: Index modulation, MISO-OFDM-SM, OFDM, Spatial modulation (SM)
Journals
by Yousra Abdul Alsahib S. Aldeen, Haider Mohammed Abdulhadi
texts

eye 3

favorite 0

comment 0

New advance and integrated technologies have changed the traditional systems and convert these systems into more intelligent, feasible and cost effective systems. In all data communications domain, data gathering is one of the significant task performed by using any techniques, tools and devices. Wireless sensor networks (WSN) also gained popularity in various fields where the sensor node sensed the information by using sink or gateway nodes and further send to central units for decision...
Topics: clustering, data delivery, energy, network, network lifetime, node, WSN
Journals
texts

eye 5

favorite 0

comment 0

Latent Dirichlet allocation (LDA) is an important probabilistic generative model and has usually used in many domains such as text mining, retrieving information, or natural language processing domains. The posterior inference is the important problem in deciding the quality of the LDA model, but it is usually non-deterministic polynomial (NP)-hard and often intractable, especially in the worst case. For individual texts, some proposed methods such as variational Bayesian (VB), collapsed...
Topics: latent dirichlet allocation, posterior inference, stochastic optimization, topic models
Journals
by Pongsatorn Sungboonlue, Satisa Thanakaew, Kittisak Rangseepanya, Teramate Tangpatong, Thitirat Siriborvornratanakul
texts

eye 5

favorite 0

comment 0

User interface (UI) and user experience (UX) design is fundamental to the stickiness of any application. Food delivery is no exception. With the food delivery business sector on the rise during the coronavirus disease 2019 (COVID-19) pandemic, it is necessary for any newcomers in the market to at least match the must-have feature lists of the major players. However, Robinhood, despite having a niche in societal responsibility, is still a food delivery app that is found to lack some of the...
Topics: HCI design and evaluation methods, human-centered computing, Human-computer interaction, usability...
Journals
by Ratul Sikder, Md Shohel Khan, Md Shohrab Hossain, Wazir Zada Khan
texts

eye 25

favorite 0

comment 0

Android OS is the most popular mobile OS for the past few years. Vulnerabilities arise with respect to the increasing functionality of Android OS, impolitic app development practices of developers, end-user incautious and interestingly remediation for the vulnerabilities has been introduced frequently as well. To mitigate security risk factor Google has been updated, deprecated and restricted many system level APIs for 3 rd party developers. Considering the consequences, this paper provides a...
Topics: Android security, Developers guideline, System permission, User privacy, Vulnerability
Journals
by Mohamed A. Torad, Belgacem Bouallegue, Abdelmoty M. Ahmed
texts

eye 11

favorite 0

comment 0

The objective of this work is to take a step further in this direction by incorporating voice control and artificial intelligence (AI) into internet of things (IoT)-based smart home systems to create more efficient automated smart home systems. Accordingly, a home automation system proposal is presented, in which the related functions can be controlled by voice commands using an android or web application via a chat form. The user issues a voice command, which is deciphered by natural language...
Topics: arduino, AI, chat form, IoT, NLP, raspberry pi
ASEE Engineering Case Library
ASEE Engineering Case Library
collection
275
ITEMS
65,860
VIEWS
collection

eye 65,860

This is the American Society for Engineering Education (ASEE) Engineering Case Library (ECL). The cases are accounts of real engineering work written for use in engineering education.The Engineering Case Program originated at Stanford University in 1964 with the support of the National Science Foundation. The library has been maintained by Rose-Hulman Institute of Technology and Carleton University. It continues under the sponsorship of the Design in Engineering Education Division (DEED) of the...
Topics: engineering education, case study, engineering history
Journals
by Jwan Jamal Ali, Narjis Mezaal Shati, Methaq Talib Gaata
texts

eye 33

favorite 0

comment 0

Automated detection of abnormal activity assumes a significant task in surveillance applications. This paper presents an intelligent framework video surveillance to detect abnormal human activity in an academic environment that takes into account the security and emergency aspects by focusing on three abnormal activities (falling, boxing and waving). This framework designed to consist of the two essential processes: the first one is a tracking system that can follow targets with identify sets...
Topics: Anomaly detection, Motion object detection, Real-time processing, Tracking, Video surveillance
Journals
by Rammah A. Alahnomi, Z. Zakaria, Zulkalnain Mohd Yussof, Tole Sutikno, H. Sariera, Amyrul Azuan Mohd Bahar
texts

eye 34

favorite 0

comment 0

The topic of microwave sensors in enclosures is one of the most active areas in material characterization research today due to its wide applications in various industries. Surprisingly, a microwave sensor technology has been comprehensively investigated and there is an industry demand for an accurate instrument of material characterization such as food industry, quality control, chemical composition analysis and bio-sensing. These accurate instruments have the ability to understand the...
Topics: Materials characterization, Microsensors, Microwave resonators, T-resonator
Journals
by Mohd Hatta Jopri, Abdul Rahim Abdullah, Rony Karim, Srete Nikolovski, Tole Sutikno, Mustafa Manap
texts

eye 29

favorite 0

comment 0

This paper introduces the accurate identification of harmonic sources in the power distribution system using time-frequency distribution (TFD) analysis, which is S-transform. The S-transform is a very applicable method to represent signals parameters in time-frequency representation (TFR) such as TFR impedance (ZTFR) and the main advantages of S-transform itcan provide better frequency resolution for low frequency components and also offers better time resolution for high-frequency components....
Topics: Harmonic source identification, Power distribution system, Spectral impedance, S-transform...
Journals
by Moch Arief Soeleman, Aris Nurhindarto, Muslih, Karis W., Muljono, Farikh Al Zami, R. Anggi Pramunendar
texts

eye 27

favorite 0

comment 0

Moving object detection becomes the important task in the video surveilance system. Defining the threshold automatically is challenging to differentiate the moving object from the background within a video. This study proposes gaussian mixture model (GMM) as a threshold strategy in moving object detection. The performance of the proposed method is compared to the Otsu algorithm and gray threshold as the baseline method using mean square error (MSE) and Peak Signal Noise Ratio (PSNR). The...
Topics: Detection, Gaussian mixture model, Moving object, Otsu, Threshold
Journals
texts

eye 0

favorite 0

comment 0

In any other place in the world, people crave for protection during dark times (Night). Either it is man or women. Everyone is scared of being alone where dark looks like a haunting one to everyone. Where people are going MAD towards women during at that point. So, I am contributing this project to all the women who are hustling hard to get their independence and freedom. These DRONES helps them to keep secure and do all the patrol or Police work during nights.
Topics: Women safety, Flight controller, Camera, Machine learning, Deep learning
Journals
by Kunal Badapanda, Debani Prasad Mishra, Surender Reddy Salkuti
texts

eye 14

favorite 0

comment 0

Unsupervised machine learning is one of the accepted platforms for applying a broad data analytics challenge that involves the way to identify secret trends, unexplained associations, and other significant data from a wide dispersed dataset. The precise yield estimate for the various crops involved in the planning is a critical problem for agricultural planning. To achieve realistic and effective solutions to this problem, data mining techniques are an essential approach. Applying distplot...
Topics: Big data, Distplot, Elbow method, Kernel density estimate, K-means, Principal component analysis
Journals
by Hapsoro Agung Nugroho, Haryas Subyantara Wicaksana, Hariyanto, Rista H. Virgianto
texts

eye 30

favorite 0

comment 0

Micro-electro-mechanical-system accelerometer is able to detect acceleration signal caused by earthquake. Such type of accelerometer is also used by smartphones. There are few algorithms that can be used to recognize the type of acceleration signal from smartphone. This study aims to find signal recognition algorithm in order to consider the most proper algorithm for earthquake signal detection. The initial stage of designing the recognizer is data collection for each type of signal...
Topics: Accelerometer, Earthquakes, Human activity, K-NN algorithm, Signal recognition
The Wireless Sensors Network (WSN) is these days generally used to fabricate choice emotionally supportive networks to survive numerous issues. One of the most intriguing fields having an expanding need of choice emotionally supportive networks is accuracy farming Precision Agriculture (PA). This paper presents WSN as the most effective way to take care of the rural issues connected with cultivating assets enhancement, dynamic help, and land observing. This approach gives constant data with...
Topics: Precision agriculture, Water compost, Numerous issues
Journals
texts

eye 9

favorite 0

comment 0

Internet of things (IoT) architecture needs to adapt autonomously to the environment and operational to maintain their supreme services. One common problem in the IoT architecture is to manage the reliability of data services, such as sensors’ data, that only sending data to the collector via gateway. If there is a disruption of services, then it is not easy to manage the system reliability. To this, an adaptive environment which is based on software reconfiguration creates a great challenge...
Topics: Adaptive, Concept drift, Internet of things, Software architecture, Software product line
Journals
by Ahmad Hasan, Sam Motakabber, Mohamed Hadi Habaebi, Farhat Anwar
texts

eye 0

favorite 0

comment 0

Filtered orthogonal frequency division multiplexing (F-OFDM), a technology which is being considered as a promising platform for beyond 4G era is expected to help deliver the new features at millimeter wave in the new 5 th  generation of cellular communication. Some of its key features notably better spectral utilization, enhanced throughput and immunity to interference can be enabling for the new cellular standards. These features of filtered OFDM comes with strict requirements of filter...
Topics: 5G, channel estimation, channel state information, millimeter wave, MIMO, OFDM
Journals
texts

eye 11

favorite 0

comment 0

The paper demonstrates an enhancement in the mobile robot’s performance during trajectory tracking with static obstacles. An adaptive artificial neural network (ANN) control methodology with online tuning evolutionary slice genetic algorithm is used for the motion control of the nonlinear dynamics mobile robot system. This paper aims at locating the optimal path from the starting point to the target point and designing an ANN trajectory tracking control methodology. The algorithm is simulated...
Topics: mobile robot, neural network controller, path planning, slice genetic algorithm, tajectory tracking
Journals
texts

eye 0

favorite 0

comment 0

Globally, cervical cancer caused 604,127 new cases and 341,831 deaths in 2020, according to the global cancer observatory. In addition, the number of cervical cancer patients who have no symptoms has grown recently. Therefore, giving patients early notice of the possibility of cervical cancer is a useful task since it would enable them to have a clear understanding of their health state. The use of artificial intelligence (AI), particularly in machine learning, in this work is continually...
Topics: cervical cancer diagnosis, class weighting, logit model, machine learning, oversampling, prediction...