0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
Agung Triayudi, Wahyu Oktri Widyarto, Lia Kamelia, Iksal, Sumiati
texts
eye 0
favorite 0
comment 0
Implementation of data mining, machine learning, and statistical data from educational department commonly known as educational data mining. Most of school systems require a teacher to teach a number of students at one time. Exam are regularly being use as a method to measure student’s achievement, which is difficult to understand because examination cannot be done easily. The other hand, programming classes makes source code editing and UNIX commands able to easily detect and store...
Topics: Dropout prediction, Educational data mining k-means, Outlier detection, UNIX commands
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
Sharipuddin, Benni Purnama, Kurniabudi, Eko Arip Winanto, Deris Stiawan, Darmawijoyo Hanapi, Mohd. Yazid Idris, Rahmat Budiarto
texts
eye 0
favorite 0
comment 0
The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify data with high accuracy. In this research, we proposed deep learning to intrusion detection system identification methods in heterogeneous networks to increase detection accuracy. In this paper, we provide an overview of the proposed algorithm, with an...
Topics: Deep learning, Features extraction, Heterogeneous, Intrusion detection system, Principal component...
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
Imane Sadgali, Nawal Sael, Faouzia Benabbou
texts
eye 0
favorite 0
comment 0
Now days, the analysis of the behavior of cardholders is one of the important fields in electronic payment. This kind of analysis helps to extract behavioral and transaction profile patterns that can help financial systems to better protect their customers. In this paper, we propose an intelligent machine learning (ML) system for rules generation. It is based on a hybrid approach using rough set theory for feature selection, fuzzy logic and association rules for rules generation. A score...
Topics: Behavior score, Credit card fraud, Fraud detection, Rules extraction, Transaction scoring
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
Emotion detection is a very exhausting job and needs a complicated process, moreover, these processes also require the proper data training and appropriate algorithm. The process involves the experimental research in psychological experiment and classification methods. This paper describes a method on detection emotion using Galvanic Skin Response (GSR) data. We used the Positive and Negative Affect Schedule (PANAS) method to get a good data training. Furthermore, Support Vector Machine and a...
Topics: Classification, Emotion detection, Experimental research, Galvanic skin response, Support vector...
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
image
eye 0
favorite 0
comment 0
Cancer is more curable when detected early! Early diagnosis of cancer focuses on detecting symptomatic patients as early as possible so they have the best chance for successful treatment and help to save lives! Consult the experts Now! Contact Us: +91 9637439163 visit: www.pratikpatil.co.in
Topics: cancer Detection, Cancer Specialist
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
Telecommunication industry requires high capacity networks with high data rates which are achieved through utilization of Multiple-Input-Multiple-Output (MIMO) communication along with Orthogonal Frequency Division Multiplexing (OFDM) system. Still, the communication channel suffers from noise, interference or distortion due to hardware design limitations, and channel environment, and to combat these challenges, and achieve enhanced performance; various error control techniques are implemented...
Topics: Conventional codes, Equalizers, Error detection and correction, Redundant residue number system,...
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
Nguyen Van Son, Le Thanh Huong, Nguyen Chi Thanh
texts
eye 0
favorite 0
comment 0
Finding plagiarism strings between two given documents are the main task of the plagiarism detection problem. Traditional approaches based on string matching are not very useful in cases of similar semantic plagiarism. Deep learning approaches solve this problem by measuring the semantic similarity between pairs of sentences. However, these approaches still face the following challenging points. First, it is impossible to solve cases where only part of a sentence belongs to a plagiarism...
Topics: Deep learning, Feature extraction, Multi-layer long short-term memory, Plagiarism detection,...
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
Susanto, Dimas Dwi Budiarjo, Aria Hendrawan, Prind Triajeng Pungkasanti
texts
eye 0
favorite 0
comment 0
Indonesia is a country with a high population, especially in big cities. The road always crowded with various types of vehicles. Sometimes the growth of vehicles is not matched by road construction. During peak hours, too many vehicles can cause traffic jams on the road. The road is needed to be widened to accommodate the number of vehicles that pass each day. In order for road widening to be precise at locations that frequently occur in traffic jams, data on the number and classification of...
Topics: Artificial intelligence, Convolutional neural network, Object detection
0
0.0
Aug 18, 2022
08/22
Aug 18, 2022
by
Mallikarjun Anandhalli, Vishwanth P. Baligar, Pavana Baligar, Pooja Deepsir, Mithali Iti
texts
eye 0
favorite 0
comment 0
The detection of object with respect to vehicle and tracking is the most needed step in computer research area as there is wide investment being made form intelligent traffic management. Due to changes in vision or scenes, detection and tracking of vehicle under different drastic conditions has become most challenging process because of the illumination, shadows. To overcome this, we propose a method which uses tensorflow fused with corner points of the vehicles for detection of vehicle and...
Topics: CNN, Corner points, TensorFlow, Tracking, Vehicle detection
0
0.0
Aug 17, 2022
08/22
Aug 17, 2022
texts
eye 0
favorite 0
comment 0
The traditional over-voltage breakdown detection method ignores the suppression of the inrush current of over-voltage breakdown, resulting in low over-voltage signal detection accuracy and a large detection deviation. As a result, a method is proposed for detecting and analyzing the ageing over-voltage breakdown of high voltage shunt capacitor banks. The breakdown model of aged components of the container group is built to determine the breakdown time of the container's overvoltage. Based on...
Topics: Voltage, Mallet algorithm, Detection method
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Alasdair J (alasdairj)
data
eye 0
favorite 0
comment 0
Here's a case for a D1 Mini + SEN0395 mmWave DFRobot occupancy sensor. There's extra depth at the back because I also included a BH1750 lux sensor - the front of the case is thin enough to allow for light level monitoring (although lux levels will obviously be lower) Print flat side down for both models, 25% infill makes the base weighty enough that it doesn't move around too much. Can always put some sticky feet on.
Topics: dfrobot, presence_detection, presence, stl, mmwave, thingiverse, occupancy_monitor, WeMos_D1_Mini,...
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Torsten Schledorn (Patzomat)
data
eye 0
favorite 0
comment 0
Stabilisator für den originalen Filament Sensor von Anycubic für den Kobra Drucker. Hier der Link dazu: https://de.anycubic.com/products/modul-zur-materialbrucherkennung-fur-anycubic-kobra?_pos=1&_sid=b97b87c0e&_ss=r Durch den Stabilisator bleibt der Sensor in seiner Position (auch wenn das vermutlich von Anycubic so nicht vorgesehen ist), bleibt aber trotzdem drehbar gelagert und wird nicht festgeklemmt. Ausserdem sieht es etwas edler aus.
Topics: 3D Printer Accessories, Anycubic, Detection, Break, stl, thingiverse, Runout, sensor, Kobra,...
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Anita Ramachandran, Adarsh Ramesh, Aditya Sukhlecha, Avtansh Pandey, Anupama Karuppiah
texts
eye 0
favorite 0
comment 0
The application of machine learning techniques to detect and classify falls is a prominent area of research in the domain of intelligent assisted living systems. Machine learning (ML) based solutions for fall detection systems built on wearable devices use various sources of information such inertial motion units (IMU), vital signs, acoustic or channel state information parameters. Most existing research rely on only one of these sources; however, a need to do more experimenation to observe the...
Topics: Ensemble techniques, Fall detection, Machine learning, Wearable devices
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Stefanus Kieu Tao Hwa, Abdullah Bade, Mohd Hanafi Ahmad Hijazi, Mohammad Saffree Jeffree
texts
eye 0
favorite 0
comment 0
Tuberculosis (TB) is a disease that causes death if not treated early. Ensemble deep learning can aid early TB detection. Previous work trained the ensemble classifiers on images with similar features only. An ensemble requires a diversity of errors to perform well, which is achieved using either different classification techniques or feature sets. This paper focuses on the latter, where TB detection using deep learning and contrast-enhanced canny edge detected (CEED-Canny) x-ray images is...
Topics: Canny edge detector, Deep learning, Ensemble classifiers, Medical image analysis, Tuberculosis...
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Aliyu M. Abdu, Musa M. Mokji, Usman U. Sheikh
texts
eye 0
favorite 0
comment 0
Image-based plant disease detection is among the essential activities in precision agriculture for observing incidence and measuring the severity of variability in crops. 70% to 80% of the variabilities are attributed to diseases caused by pathogens, and 60% to 70% appear on the leaves in comparison to the stem and fruits. This work provides a comparative analysis through the model implementation of the two renowned machine learning models, the support vector machine (SVM) and deep learning...
Topics: Deep learning, Image processing, Machine learning, Plant disease detection, SVM
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Abdulrahman Jassam Mohammed, Muhanad Hameed Arif, and Ali Adil Ali
texts
eye 0
favorite 0
comment 0
Massive information has been transmitted through complicated network connections around the world. Thus, providing a protected information system has fully consideration of many private and governmental institutes to prevent the attackers. The attackers block the users to access a particular network service by sending a large amount of fake traffics. Therefore, this article demonstrates two-classification models for accurate intrusion detection system (IDS). The first model develops the...
Topics: Artificial neural network, DDoS attacks, Intrusion detection system, Multilayer perceptron
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Alaeddine Boukhalfa, Nabil Hmina, Habiba Chaoui
texts
eye 0
favorite 0
comment 0
Currently, information technology is used in all the life domains. Many devices and equipment produce data and transfer them across the network. These transfers are not always secured and can contain new menaces and attacks invisible by the current security tools. Moreover, the large amount and variety of the exchanged data make the identification of the intrusions more difficult in terms of detection time. To solve these issues, we suggest in this paper, a new approach based on storing the...
Topics: Big data, Intrusion detection, Machine learning, Parallel processing
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Moneer Ali Lilo, Maath Jasem Mahammad
texts
eye 0
favorite 0
comment 0
This paper presents the wireless system for fault detection and monitoring based on fuzzy logic technique. Wireless applications are utilized to identify, classify, and monitor faults in the real time to protect machines from damage. Two schemes were tested; first scheme fault collected X-Y-Z-axes mode while the second scheme collected Y-axis mode, which is utilized to protect the induction motor (IM) from vibrations fault. The vibration signals were processed in the central computer to reduce...
Topics: Fault detection, Fuzzy logic, Real time processing, Signals processing, Wireless sensor
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
A. Naresh Kumar, P. Sridhar, T. Anil Kumar, T. Ravi Babu, V. Chandra Jagan Mohan
texts
eye 0
favorite 0
comment 0
Evolving faults are starting in one phase of circuit and spreading to other phases after some time. There has not been a suitable method for locating evolving faults in double circuit transmission line until now. In this paper, a novel method for locating different types of evolving faults occurring in double circuit transmission line is proposed by considering adaptive neuro-fuzzy inference system. The fundamental current and voltage magnitudes are specified as inputs to the proposed method....
Topics: Detection time, Double circuit transmission line, Error, Evolving faults, Fault location
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Julius Yong Wu Jien, Aslina Baharum, Shaliza Hayati A. Wahab, Nordin Saad, Muhammad Omar, Noorsidi Aizuddin Mat Noor
texts
eye 0
favorite 0
comment 0
Face recognition is the use of biometric innovations that can see or validate a person by seeing and investigating designs depending on the shape of the individual. Face recognition is used largely for the purpose of well-being, despite the fact that passion for different areas of use is growing. Overall, face recognition innovations are worth considering because they have the potential for broad legal jurisdiction and different business applications. It is widely used in many spaces. How it...
Topics: Age detection, Convolutional neural network, Image processing, Prediction
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Youness Choubik, Abdelhak Mahmoudi, Mohammed Majid Himmi, Lahcen El Moudnib
texts
eye 0
favorite 0
comment 0
In this work we implemented STA/LTA trigger algorithm, which is widely used in seismic detection, using Hadoop MapReduce. This implementation allows to find out how effective it is in this type of tasks as well as to accelerate the detection process by reducing the processing time. We tested our implementation on a seismological dataset of 14 broadband seismic stations and compare it with the traditional one. The results show that MapReduce decreased the processing time by 34% compared to the...
Topics: Big data, Hadoop, MapReduce, Seismic detection, STA/LTA
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Putra Wanda, Marselina Endah Hiswati, Huang J. Jie
texts
eye 0
favorite 0
comment 0
Manual analysis for malicious prediction in Online Social Networks (OSN) is time-consuming and costly. With growing users within the environment, it becomes one of the main obstacles. Currently, many research communities have proposed learning techniques to automate security tasks, including anomalous detection, malicious link prediction, and intrusion detection in OSN. Deep learning is a growing algorithm that gains a big success in computer vision problems. In this paper, we propose a novel...
Topics: Deep Learning, Malicious Detection, Online Social Network, Privacy-Preserving, Security Model
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Noor Asyikin Sulaiman, Md Pauzi Abdullah, Hayati Abdullah, Muhammad Noorazlan Shah Zainudin, Azdiana Md Yusop
texts
eye 0
favorite 0
comment 0
Air conditioning system is a complex system and consumes the most energy in a building. Any fault in the system operation such as cooling tower fan faulty, compressor failure, and damper stuck, etc. could lead to energy wastage and reduction in the system’s coefficient of performance (COP). Due to the complexity of the air conditioning system, detecting those faults is hard as it requires exhaustive inspections. This paper consists of two parts; i) to investigate the impact of different...
Topics: Air conditioning system, Fault detection, Machine learning
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
El Meziati Marouane, Ziyati Elhoussaine
texts
eye 0
favorite 0
comment 0
Recent research studies on outlier detection have focused on examining the nearest neighbor structure of a data object to measure its outlierness degree. Moreover, popular outlier detection methods require the pairwise comparison of objects to compute the nearest neighbors. This quadratic problem is not scalable to large data sets, making multidimensional outlier detection for big data still an open challenge. In this article, we present a new approach for outlier detection, based on highly...
Topics: Big data, Clustering, Fuzzy neighborhood, Map Reduce, Outlier detection, Rough set, Time complexity
0
0.0
Aug 16, 2022
08/22
Aug 16, 2022
by
Stefanus Kieu Tao Hwa, Mohd Hanafi Ahmad Hijazi, Abdullah Bade, Razali Yaakob, Mohammad Saffree Jeffree
texts
eye 0
favorite 0
comment 0
Tuberculosis (TB) is a disease caused by Mycobacterium Tuberculosis. Detection of TB at an early stage reduces mortality. Early stage TB is usually diagnosed using chest x-ray inspection. Since TB and lung cancer mimic each other, it is a challenge for the radiologist to avoid misdiagnosis. This paper presents an ensemble deep learning for TB detection using chest x-ray and Canny edge detected images. This method introduces a new type of feature for the TB detection classifiers, thereby...
Topics: Canny edge detector, Deep learning, Ensemble, Medical image analysis, Tuberculosis detection
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
Amirul Sadikin Md Afendi, Marina Yusoff
texts
eye 0
favorite 0
comment 0
This paper presents a review of anomalous sound event detection (SED) approaches. SED is becoming more applicable for real-world appliactaions such as security, fire determination or olther emergency alarms. Despite many research outcome previously, further research is required to reduce false positives and improve accurracy. SED approaches are comprehensively organized by methods covering system pipeline components of acoustic descriptors, classification engine, and decision finalization...
Topics: Acoustic Features, Audio Processing, Pattern Recognition, Sound Event Detection
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
Human pupil eye detection is a significant stage in iris segmentation which is representing one of the most important steps in iris recognition. In this paper, we present a new method of highly accurate pupil detection. This method is consisting of many steps to detect the boundary of the pupil. First, the read eye image (R, G, B), then determine the work area which is consist of many steps to detect the boundary of the pupil. The determination of the work area contains many circles which are...
Topics: Binary image, Circular hough transform, Color difference, Iris detection, Pupil area
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
Panoramic X-Ray produces the most common oral digital radiographic image that it used in dentistry practice. The image can further improve accuracy compared to analog one. This study aims to establish proximal caries edge on enhancement images so they can be easily recognized. The images were obtained from the Department of Radiology, General Hospital of M. Djamil Padang Indonesia. Total file of images to be tested were 101. Firstly, the images are analyzed by dentists who practiced at Segment...
Topics: Algorithm, Edge detection, Edge enhancement, Molar teeth, Proximal caries
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
One of the key components of the Internet of Things (IoT) is the Wireless Sensor Network (WSN). WSN is an effective and efficient technology. It consists of senor nodes; smart devices that allows data collection and pre-processing wirelessly from real world. However, issues related to power consumption and computational performance still persist in classical wireless nodes since power is not always available in application like pipeline monitoring. Moreover, they could not be usually suitable...
Topics: Wireless Sensor Network, Internet of Things, Node Design, Leak Detection, Water Pipeline Monitoring
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
Duraid Y. Mohammed, Khamis A. Al-Karawi, Philip J. Duncan, Francis F. Li
texts
eye 0
favorite 0
comment 0
In the field of audio classification, audio signals may be broadly divided into three classes: speech, music and events. Most studies, however, neglect that real audio soundtracks can have any combination of these classes simultaneously. This can result in information loss, thus compromising the knowledge discovery. In this study, a novel feature, “Entrocy”, is proposed for the detection of music in both pure form and overlapping with the other audio classes. Entrocy is defined as the...
Topics: Audio content analysis, Audio indexing, Entropy, Music detection, Real world audio classification
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
Malware is an application that is harmful to your forensic information. Basically, malware analyses is the process of analysing the behaviours of malicious code and then create signatures to detect and defend against it.Malware, such as Trojan horse, Worms and Spyware severely threatens the forensic security. This research observed that although malware and its variants may vary a lot from content signatures, they share some behaviour features at a higher level which are more precise in...
Topics: Analysis tools, Cyber crimes, Forensic intelligence, Malware detection
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
Parinith R. Iyer, Shrutheesh Raman Iyer, Raghavendran Ramesh, Anala .M .R, K. N. Subramanya
texts
eye 0
favorite 0
comment 0
The ever-increasing sale of vehicles and the steady increase in population density in metropolitan cities have raised many growing concerns, most importantly commute time, air and noise pollution levels. Traffic congestion can be alleviated by opting adaptive traffic light systems, instead of fixed-time traffic signals. In this paper, a system is proposed which can detect, classify and count vehicles passing through any traffic junction using a single camera (as opposed to multi-sensor...
Topics: Intelligent transportation systems, Neural network, Object detection/classification and count,...
0
0.0
Aug 15, 2022
08/22
Aug 15, 2022
by
S. Jayalakshmi, R. Aswini
texts
eye 0
favorite 0
comment 0
Optimization algorithms are search methods to find an optimal solution to a problem with a set of constraints. Bio-Inspired Algorithms (BIAs) are based on biological behavior to solve a real world problem. BIA with optimization technique is to improve the overall performance of BIA. The aim of this paper is to introduce a novel optimization algorithm which is inspired by natural stinging behavior of honey bee to find the optimal solution. This algorithm performs both monitor and sting if any...
Topics: Anomaly detection, Bio-Inspired Algorithms, Host intrusion detection system, Index...
0
0.0
Aug 14, 2022
08/22
Aug 14, 2022
by
Kyle Hailey (BBQSNAKE)
data
eye 0
favorite 0
comment 0
I just bought the official filament runout sensor for my Ender 3 and wasn't cray about the mounting system. It requires some major disassembly. So instead, like Victor Bared, I decided to have it as a free floating sensor. This is just a back for the sensor. If you haven't checked out Victor's channel I would suggest it.
Topics: plate, 3D Printer Accessories, run out, Creality, detector, Ender_3, stl, back, official,...
0
0.0
Aug 13, 2022
08/22
Aug 13, 2022
by
Florestan H (hailerflo1)
data
eye 0
favorite 0
comment 0
This is a case for a HC-SR501 motionsensor with Wemos D1 mini. There are two types of cases. The smaller one without a DHT11. Once the case is assembled it will snap into place. You can open it by pushing into the two extra holes at the back. In case you get false readings from the motionsensor, you may want to place an aluminum sheet between the motionsensor and the arduino. This will stop the interference between the HC-SR501 and the wifi antenna of the D1. Make sure to isolate the aluminum...
Topics: mqtt, temperature_sensor, arduino, dht11, smarthome, detection, case, humidity_sensor, dht,...
0
0.0
Aug 12, 2022
08/22
Aug 12, 2022
by
Robert N. Davis
texts
eye 0
favorite 0
comment 0
MALWARE : Detection , Assessment , and Control Guide
Topic: malware_detection_assessment_control
0
0.0
Aug 12, 2022
08/22
Aug 12, 2022
by
Robert N. Davis
texts
eye 0
favorite 0
comment 0
MALWARE : Detection , Assessment and Control Guide
Topic: malware_detection_assessment_control
0
0.0
Aug 12, 2022
08/22
Aug 12, 2022
by
Jose-Joel Gonzalez-Barbosa, Karen Lizbeth Flores-Rodrıguez, Francisco Javier Ornelas-Rodrıguez, Felipe Trujillo-Romero, Erick Alejandro Gonzalez-Barbosa, Juan B. Hurtado-Ramos
texts
eye 0
favorite 0
comment 0
Despite autonomous navigation is one of the most proliferate applications of three-dimensional (3D) point clouds and imagery both techniques can potentially have many other applications. This work explores urban digitization tools applied to 3D geometry to perform urban tasks. We focus exclusively on compiling scientific research that merges mobile laser scanning (MLS) and imagery from vision systems. The major contribution of this review is to show the evolution of MLS combined with imagery in...
Topics: 3D point clouds, Imagery, LiDAR, Mobile data acquisition systems, Road elements segmentation, Road...
0
0.0
Aug 12, 2022
08/22
Aug 12, 2022
by
Handy Wicaksono, Ivan Surya Hutomo
texts
eye 0
favorite 0
comment 0
This research aimed to integrate a face recognition capability in a smart door prototype. By using a camera - based face recognition, the house owner does not need to make physical contact to open the door. Avoid physical contact is important due to the coro navirus disease 2019 (COVID19) pandemic. Raspberry Pi 3B was used as the main controller, while a servo motor was utilized as a locking door actuator. The program was developed using Node -...
Topics: Digital assistant, Face detection, Face recognition, Raspberry, Smart door lock
0
0.0
Aug 12, 2022
08/22
Aug 12, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
The accurate determination of the load harmonic current is one of the important factors, it decides to effect of harmonic filtering and reactive power compensation for Hybrid Active Power Filter. The p-q harmonic detection method has been widely used in determining the harmonic currents of Hybrid Active Power Filter. However, when using this method, the dynamic response of Hybrid Active Power Filter in the transient period will have a large transient time and overshoot whenever the load changes...
Topics: Fuzzy logic, Harmonic detection, Harmonic filter, Hybrid active power filter, P-q theory
Is it possible to tell what someone is really thinking? How can you tell if someone is lying to you? On this episode, Dr. David J. Lieberman discussed his new book, Mindreader.
Topics: science, mindreader, lie detection, psychology, groks
Source: Groks Science Radio Show and Podcast
0
0.0
Aug 10, 2022
08/22
Aug 10, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely,...
Topics: Content inspection, Data leakage detection, Dynamic programming Intrusion detection system,...
0
0.0
Aug 10, 2022
08/22
Aug 10, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
In this paper, the problem of robust Fault Detection (FD) for continuous time switched system is tackled using a hybrid approach by combination of a switching observer and Bond Graph (BG) method. The main criteria of an FD system including the fault sensitivity and disturbance attenuation level in the presence of parametric uncertainties are considered in the proposed FD system. In the first stage, an optimal switching observer based on state space representation of the BG model is designed in...
Topics: Switching system, Robust fault detection, Fault sensitivity, Disturbance attenuation, Bond Graph
0
0.0
Aug 10, 2022
08/22
Aug 10, 2022
by
Peyman Mohammadzadeh germi , Mohsen Najarbashi
texts
eye 0
favorite 0
comment 0
To produce important investment decisions, investors require financial records and economic information. However, most companies manipulate investors and financial institutions by inflating their financial statements. Fraudulent Financial Activities exist in any monetary or financial transaction scenario, whether physical or electronic. A challenging problem that arises in this domain is the issue that affects and troubles individuals and institutions. This problem has attracted more attention...
Topics: Anomaly identification and classification, Squirrel optimization algorithm, data mining for...
0
0.0
Aug 10, 2022
08/22
Aug 10, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 0
favorite 0
comment 0
Presently renewable energies have taken a special place in the world and most of the Distributed Generations (DGs) used in the interconnected power system are utilized, renewable energy resources. Due to the DG‟s advantages, including use of renewable energy such as, clean nature, does not pollute environment and having endless nature the use of these renewable resources to produce electrical energy in the world are increasing in day to day life. One problem with such Distributed generators...
Topics: Boost converter, Islanding detection, Maximum power point tracking (MPPT), Multilevel inverter,...
2
2.0
Aug 9, 2022
08/22
Aug 9, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 2
favorite 0
comment 0
Edge detection is the first step in image recognition systems in a digital image processing. An effective way to resolve many information from an image such depth, curves and its surface is by analyzing its edges, because that can elucidate these characteristic when color, texture, shade or light changes slightly. Thiscan lead to misconception image or vision as it based on faulty method. This work presentsa new fuzzy logic method with an implemention. The objective of this method is to improve...
Topics: Edge detection, Fuzzy divergence, Fuzzy logic, Image processing, Thresholding
0
0.0
Aug 8, 2022
08/22
Aug 8, 2022
by
Bunn, G. C. (Geoffrey C.)
texts
eye 0
favorite 0
comment 0
viii, 246 p. : 24 cm
Topics: Lie detectors and detection -- History, Lie detectors and detection -- United States -- History
4
4.0
Aug 8, 2022
08/22
Aug 8, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 4
favorite 0
comment 0
The objective of this paper is to introduce an effective and efficient way of traffic signal light control to optimize the traffic signal duration across each lanes and thereby, to minimize or completely eliminate traffic congestion. This paper introduces a new approach to resolve the traffic congestion problem at junctions by making use of decision trees. The vehicle count in the real time traffic video is determined by Image Processing technique. This information is fed to the decision tree...
Topics: Background subtraction, Decision tree, Object detection, Traffic congestion, Vehicle count
5
5.0
Aug 8, 2022
08/22
Aug 8, 2022
by
International Journal of Electrical and Computer Engineering (IJECE)
texts
eye 5
favorite 0
comment 0
The detection of moving objects in a video sequence is an essential step in almost all the systems of vision by computer. However, because of the dynamic change in natural scenes, the detection of movement becomes a more difficult task. In this work, we propose a new method for the detection moving objects that is robust to shadows, noise and illumination changes. For this purpose, the detection phase of the proposed method is an adaptation of the MOG approach where the foreground is extracted...
Topics: HSV, MOG, Object detection, Shadow removal
Abstract Objective: Timely diagnosis is crucial for successful treatment of infections. Contemporary diagnostics of clinically significant infections relies on a variety of laboratory-based tests. However, the routine microbiological methods, per se are not always confirmatory for the accurate diagnosis in some cases with a significant time delay. Rapid detection of causative agents using nanopore-based metagenomic sequencing is reported in a case of suspected tuberculosis not confirmed using...
Topics: Rapid pathogen detection, Peritoneal tuberculosis, Brucellosis, Real-time nanopore sequencing,...