Electrical and Computer Engineering (ECE) Research Papers (original) (raw)
2025, International Journal of Scientific Research in Computer Science, Engineering and Information Technology
In this Research paper, we have discussed a proposed system that can be a visionary eye for a blind person. A common goal in computer vision research is to build machines that can replicate the human vision system. For example, to... more
In this Research paper, we have discussed a proposed system that can be a visionary eye for a blind person. A common goal in computer vision research is to build machines that can replicate the human vision system. For example, to recognize and describe objects/scenes. People who are blind to overcome their real daily visual challenges. To develop a machine that can work by the vocal and graphical assistive answer. A machine can work on voice assistant and take the image taken by a person and after an image processing and extract the result after neural networks. And it all happens in real-time.
2025, Journal of Big Data
The k-means, one of the most widely used clustering algorithm, is not only faster in computation but also produces comparatively better clusters. However, it has two major downsides, first it is sensitive to initialize k value and... more
The k-means, one of the most widely used clustering algorithm, is not only faster in computation but also produces comparatively better clusters. However, it has two major downsides, first it is sensitive to initialize k value and secondly, especially for larger datasets, the number of iterations could be very large, making it computationally hard. In order to address these issues, we proposed a scalable and cost-effective algorithm, called R-k-means, which provides an optimized solution for better clustering large scale high-dimensional datasets. The algorithm first selects O(R) initial points then reselect O(l) better initial points, using distance probability from dataset. These points are then again clustered into k initial points. An empirical study in a controlled environment was conducted using both simulated and real datasets. Experimental results showed that the proposed approach outperformed as compared to the previous approaches when the size of data increases with increa...
2025
Many households indulge in different forms of electricity theft and illegal tampering of electric metering devices. These lead to distribution system faults and overload as well as loss of revenue by the distribution companies,this paper... more
Many households indulge in different forms of electricity theft and illegal tampering of electric metering devices. These lead to distribution system faults and overload as well as loss of revenue by the distribution companies,this paper envisages the utilization of the global system for mobile communication (GSM) into the prepaid energy meter for increased generation of revenue in developing countries like Nigeria. The proposed meter is set to carry a unique identification number such as the consumer's phone number which may be encrypted into the memory of the microcontroller. Electricity theft is being detected as the GSM module sends message to the distribution company. Revenue generated can be increased through the use of the proposed meter as unaccountability by utility workers and billing irregularities are eliminated. The results obtained from the simulation shows that immediately an illegal load is connected to the utility system either within the residential meter jurisdiction or otherwise stated, the GSM module alerts the utility company no matter how small the illegal load is.
2025, Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej
2025, Budapest International Research and Critics Institute (BIRCI-Journal) : Humanities and Social Sciences
In the present paper an attempt has been made to analyze spatio-temporal changes in cropping pattern and cropping intensity in agriculture of Jammu and Kashmir. Data were obtained from Statistical of Jammu and Kashmir. Copping pattern and... more
In the present paper an attempt has been made to analyze spatio-temporal changes in cropping pattern and cropping intensity in agriculture of Jammu and Kashmir. Data were obtained from Statistical of Jammu and Kashmir. Copping pattern and cropping intensity have been presented in the percentage forms. Results of the study reveal that cropping pattern is much diverse with high level of cropping intensity in agriculture of the state. It has been found that maize is still most cultivated crop in the state, covering an area of 27.4 % to total cropped area during 2010-11. Wheat has been found second most cultivated crop with increasing trend of area. The area under rice and pulses crop has decreased rapidly over the period. Cropping intensity has also continuously increased from 119.70% in 1965-66 to 155.79 % in 2010-11. The highest cropping intensity has been recorded in samba (212.63%) whereas lowest registered in Kupwara (100%) district of the state.
2025, Rairo-operations Research
introduced the concept of Roman 𝑘-domination in graphs. For a fixed positive integer 𝑘, a function 𝑓 : 𝑉 (𝐺) → {0, 1, 2} is a Roman 𝑘-dominating function on 𝐺 if every vertex valued 0 under 𝑓 is adjacent to at least 𝑘 vertices valued 2... more
introduced the concept of Roman 𝑘-domination in graphs. For a fixed positive integer 𝑘, a function 𝑓 : 𝑉 (𝐺) → {0, 1, 2} is a Roman 𝑘-dominating function on 𝐺 if every vertex valued 0 under 𝑓 is adjacent to at least 𝑘 vertices valued 2 under 𝑓 . In this paper, inspired by the concept of alliances in graphs, we revisit the concept of Roman 𝑘-domination by not-fixing 𝑘. We prove upper bounds for the new variant in cactus graphs and characterize cactus graph achieving equality for the given bound. We also present a probabilistic upper bound for this variant.
2025, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
Breast Cancer is still a serious health threat to women, both physically and psychologically. Fortunately, treatments involving complete breast removal are rarely needed today, as better treatment options are available. Mammography can... more
Breast Cancer is still a serious health threat to women, both physically and psychologically. Fortunately, treatments involving complete breast removal are rarely needed today, as better treatment options are available. Mammography can show changes in the breast up to two years before a physician can feel them. Computer-aided detection and diagnosis is considered to be one of the most promising approaches that may improve the efficiency of mammography. Furthermore, there is a strong correlation between the presence of calcifications and the occurrence of breast cancer. In this paper we present a new technique to detect calcifications in mammogram images. The main objective is to support radiologists with automatic detection methods applied to medical images. Motivated by the fact that calcifications, when compared to the rest of the image, exhibit irregular characteristics, a technique based on Bayesian surprise is used. Tests were performed using INBreast, a recent fully annotated database, composed of full field digital mammograms. Comparison both with a recently proposed state of the art method and other common image techniques showed the superiority of our method. False positives are, however, still an issue and further studies focused on their reduction while maintaining a high sensitivity are planned.
2025, International Journal of Research in Engineering and Technology
Magnetic levitation or maglev technology is a technique which is used to lift the objects with the help of magnetic fields. Pressure of the magnetic field is used to supress the effect of gravitational and other forces. As wind is a form... more
Magnetic levitation or maglev technology is a technique which is used to lift the objects with the help of magnetic fields. Pressure of the magnetic field is used to supress the effect of gravitational and other forces. As wind is a form of renewable source of energy, it can be used to generate electricity by converting kinetic energy into electric energy with the help of wind turbine. The advantage of a maglev windmill over a conventional one is, mechanical friction is totally eliminated as the rotor is floating in the air due to levitation.
2025, International journal of engineering research and technology
The main goal of this paper is to develop a multilevel converter topology to be useful in photovoltaic system applications. Although many topologies are introduced rapidly using a bunch of switches and isolated dc sources, having a... more
The main goal of this paper is to develop a multilevel converter topology to be useful in photovoltaic system applications. Although many topologies are introduced rapidly using a bunch of switches and isolated dc sources, having a single-dc-source multilevel inverter is still a matter of controversy. In fact, each isolated dc source means a bulky transformer and a rectifier that have their own losses and costs forcing the industries to avoid entering in this topic conveniently. On the other hand, multilevel inverters topologies with single-dc-source require associated controllers to regulate the dc capacitors voltages in order to have multilevel voltage waveform at the output. Thus, a complex controller wouldn't interest investors properly. Consequently, developing a singledc-source multilevel inverter topology along with a light and reliable voltage control is still a challenging topic to replace the 2-level inverters in the market effectively. This work investigates modern topology of multilevel converters, which are suitable to be used in high power photovoltaic applications with the main target on achieving lower total harmonic distortion and better efficiency. Multilevel converters offer several advantages compared to conventional types. Multilevel converters provide high quality output while using the low switching frequency. It affects the switching losses, size of semiconductor switches and harmonic filters. This research investigates various topologies of multilevel converter for high power photovoltaic applications. All topologies are simulated using MATLAB/SIMULINK in the same operating conditions. Finally, the more suitable multilevel topology is chosen with reference to the simulation results.
2025
PHRs grant patients access to a wide range of health information sources, best medical practices and health knowledge. In patient centric secure sharing, patients will create, manage and control their personal health data from one place... more
PHRs grant patients access to a wide range of health information sources, best medical practices and health knowledge. In patient centric secure sharing, patients will create, manage and control their personal health data from one place using the web. Prior to storing the records in cloud server, they are encrypted using encryption algorithm which ensures the patient’s full control over their PHR. In addition to PHR (Medical history, current exams), personal files, insurance details and sensitive information can also be stored and shared. Patients only decide which set of users can access which set of files. All the files stored in clouds which are semi-trusted servers, are in the encrypted form and are confidential to other users. We make use of Attribute Based encryption (ABE) to encrypt the files. In this scheme, users are categorized into personal and professional domains which greatly reduce the key management complexity. There is a structured way to access the files for person...
2025, International Journal of Knowledge and Systems Science
Recently, information is being used to enhance supporting technologies in conference management systems, which greatly improves the efficiency of conference organizing affairs and promotes extensive communication and cooperation between... more
Recently, information is being used to enhance supporting technologies in conference management systems, which greatly improves the efficiency of conference organizing affairs and promotes extensive communication and cooperation between researchers. The on-line conferencing ba (OLCB) serves as a conference management system and provides an environment for knowledge creation. CorMap analysis is a technique for qualitative meta-synthesis, which can carry out series mining from qualitative data. The early OLCB system pushes the visualized results of CorMap analysis to users by images. In this paper, the authors introduce an interactive CorMap analysis to enhance the OLCB system, which enables users to conduct the conference mining process directly and acquire more clear and structured information. The working process of interactive CorMap analysis is shown with the application of the 7th International Workshop on Meta-synthesis and Complex Systems (MCS’2007).
2025
With Open source virtualization software like VMware Player and Virtualbox, it is easy to install and run Virtual machines (VMs) in a home desktop computer. Endian Firewall provides a service called VPN (Virtual Private Network); it... more
With Open source virtualization software like VMware Player and Virtualbox, it is easy to install and run Virtual machines (VMs) in a home desktop computer. Endian Firewall provides a service called VPN (Virtual Private Network); it offers a secure communication between two different networks by using internet connection. In this chapter, we will install an Endian Firewall Community OS in one of the virtual machines (VM) and network it with the other VM for creating a firewall/router/ proxy/VPN.
2025, Journal of Computer and System Sciences
In some cases people are interested in certain kinds of networks and want them to be of small size. Usually these kinds of networks are defined by certain requirements on the connectivity between their inputs and outputs. One trick that... more
In some cases people are interested in certain kinds of networks and want them to be of small size. Usually these kinds of networks are defined by certain requirements on the connectivity between their inputs and outputs. One trick that sometimes yields the desired networks is counting argument. One considers a certain family of graphs of size n and counts how many of these graphs do not satisfy the requirements (the bad ones). In case the number of bad ones is smaller than the number of graphs in the family, the existence of a good graph (the desired network) is established. In fact, in many of the cases one shows that most of the graphs in the family are good. (The fraction of bad graphs tends to zero as n grows.) The weakness of this approach is that it is nonconstructive: although one knows that many of these graphs are good, he cannot construct one such graph. An (n, m, k) concentrator is a directed acyclic graph (dag) with n inputs, m < n outputs, and at most kn edges, such that for every subset of m inputs there are m vertex disjoint paths going from these m inputs to the outputs. An (n, k) superconentrator (s.c.) is a dag with n inputs, n outputs and at most kn edges, such that for every 1 < r < it and any two sets of r inputs and r outputs there are r vertex disjoint paths connecting the two sets. A family of linear concentrators [superconcentrators] of density k is a set of (n, m, k + o(l)) concentrators [(n, k + o(l)) s.c.'s] for 1 <m < n<cn [for I<n<oo]. In (61 Pinsker constructed a family of linear concentrators of density 29. His construction uses counting argument. Valiant [9] used Pinsker's linear concentrators to construct a family of linear s.c.'s of density 238. By doing so he disproved a conjecture that superconcentrators require more than a linear number of edges p. 450, research problem 12.371. Pippenger [7] has discovered a direct way to construct a family of linear s.c.'s of density 39. His construction used a certain type of graphs. the existence of which is
2025, Journal of Intelligent Information Systems
Fact checking is an essential challenge when combating fake news. Identifying documents that agree or disagree with a particular statement (claim) is a core task in this process. In this context, stance detection aims at identifying the... more
Fact checking is an essential challenge when combating fake news. Identifying documents that agree or disagree with a particular statement (claim) is a core task in this process. In this context, stance detection aims at identifying the position (stance) of a document towards a claim. Most approaches address this task through classification models that do not consider the highly imbalanced class distribution. Therefore, they are particularly ineffective in detecting the minority classes (for instance, 'disagree'), even though such instances are crucial for tasks such as fact-checking by providing evidence for detecting false claims. In this paper, we exploit the hierarchical nature of stance classes which allows us to propose a modular pipeline of cascading binary classifiers, enabling performance tuning on a per step and class basis. We implement our approach through a combination of neural and traditional classification models that highlight the misclassification costs of minority classes. Evaluation results demonstrate state-of-the-art performance of our approach and its ability to significantly improve the classification performance of the important 'disagree' class.
2025, Artificial Neural Networks in Real-Life Applications
This chapter proposes an application of two techniques of artificial intelligence in a civil engineering area: the artificial neural networks (ANN) and the evolutionary computation (EC). In this chapter, it is shown how these two... more
This chapter proposes an application of two techniques of artificial intelligence in a civil engineering area: the artificial neural networks (ANN) and the evolutionary computation (EC). In this chapter, it is shown how these two techniques can work together in order to solve a problem in hydrology. This problem consists on modeling the effect of rain on the runoff flow in a typical urban basin. The ultimate goal is to design a real-time alarm system for floods or subsidence warning in various types of urban basins. A case study is included as an example.
2025, Advances in computer and electrical engineering book series
2025
A novel fifth order Chebyshev stepped impedance low pass filter is designed, simulated and fabricated. Parameters of circuit are extracted from the EM design equations and then values are optimized. Defected ground structures (DGS) have... more
A novel fifth order Chebyshev stepped impedance low pass filter is designed, simulated and fabricated. Parameters of circuit are extracted from the EM design equations and then values are optimized. Defected ground structures (DGS) have been developed to enhance different characteristics like wide stop band, frequency response, flat pass band and minimum ripples etc. of many microwave devices. In this paper we designed and fabricated fifth order low pass filter and the characteristic of this low pass filter is improved when this filter is designed with dumbbell Shaped Slot Defected Ground Structure (DGS). The response of the filter is analyzed with respect to variation in dimension of the GS unit. The variation of dimensions of defects studied with their corresponding change in capacitance, inductance as well as frequency response. The defects dimensions are modeled with respect to the frequency. Chebyshev stepped impedance five pole DGS is adopted to increase the bandwidth of stopb...
2025
We present Computational Emergence Theory (CET)—a mathematically rigorous framework wherein physical reality emerges from self-organizing computational processes on infinite graph spaces, with fundamental laws arising as ergodic... more
We present Computational Emergence Theory (CET)—a mathematically rigorous framework wherein physical reality emerges from self-organizing computational processes on infinite graph spaces, with fundamental laws arising as ergodic attractors in rule space. Unlike previous approaches, CET resolves four persistent problems: (1) the measure problem via novel σ-finite constructions on infinite configuration spaces, (2) emergence paradoxes through bootstrap consistency conditions, (3) conceptual
circularity in timeless formulations, and (4) computational irreducibility via attractor dynamics.
2025, Ijrar.org
This research paper presents the design and implementation of a Flutter-based Bill Payment Application, which provides users with a seamless and secure platform for managing and paying their bills. The application is developed using... more
This research paper presents the design and implementation of a Flutter-based Bill Payment Application, which provides users with a seamless and secure platform for managing and paying their bills. The application is developed using Flutter for a cross-platform mobile experience, Firebase for user authentication and data storage, and Razorpay for secure payment processing. The system architecture is designed to ensure scalability, security, and user-friendliness, making it suitable for a wide range of users. This paper discusses the system architecture, functionality, integration of external services, and security measures employed. Performance evaluation demonstrates the application's efficiency and reliability. The proposed solution is highly adaptable and can be easily extended to support additional payment providers and features.
2025
The field of artificial intelligence (AI) is advancing rapidly, and nowhere is this more evident than in natural language processing (NLP). From virtual assistants and chatbots to translation systems and search engines, NLP plays a... more
The field of artificial intelligence (AI) is advancing rapidly, and nowhere is this more evident than in natural language processing (NLP). From virtual assistants and chatbots to translation systems and search engines, NLP plays a central role in how machines understand and generate human language. This book, Natural Language Processing: Classical to Modern, is written to provide a clear, focused, and practical introduction to the core concepts and tools that underpin this exciting area.
My journey began with a degree in Applied Mathematics over twenty years ago. Early in my career, I worked as a statistical data analyst on various software projects. Over time, I transitioned into data mining and then into data science. Along the way, I discovered how essential a strong foundation in linguistic theory, algorithms, and statistical reasoning is—particularly for building effective NLP systems.
2025
Sistem pakar merupakan bagian dari kecerdasan buatan yang dirancang untuk meniru cara berpikir seorang ahli dalam menyelesaikan permasalahan tertentu. Dalam praktiknya, sistem ini kerap berhadapan dengan kondisi informasi yang tidak... more
Sistem pakar merupakan bagian dari kecerdasan buatan yang dirancang untuk meniru cara berpikir seorang ahli dalam menyelesaikan permasalahan tertentu. Dalam praktiknya, sistem ini kerap berhadapan dengan kondisi informasi yang tidak sepenuhnya tersedia, bersifat kabur, atau bahkan mengandung ketidakpastian. Untuk mengatasi situasi tersebut, dibutuhkan metode penalaran yang mampu menyesuaikan diri dengan ketidakpastian yang ada. Tiga pendekatan umum yang digunakan antara lain adalah Teorema Bayes yang berbasis probabilitas, metode faktor kepastian sebagai pendekatan semi-probabilistik, dan logika fuzzy yang mengelola nilai keanggotaan dalam rentang kontinu. Ketiganya memiliki keunggulan dan keterbatasan masing-masing, serta telah banyak diterapkan dalam bidang sistem pakar, seperti pada aplikasi diagnosa penyakit. Dengan pendekatan ini, sistem pakar dapat bekerja secara lebih adaptif dan menyerupai cara pengambilan keputusan manusia.
2025, Journal of Power of Technologies
The objective of this paper is time and frequency response analysis of single quadrant and two-quadrant power amplifiers by using MATLAB SIMULINK, PSPICE and PSIM based software used in the electromagnetic levitation system. The power... more
The objective of this paper is time and frequency response analysis of single quadrant and two-quadrant power amplifiers by using MATLAB SIMULINK, PSPICE and PSIM based software used in the electromagnetic levitation system. The power amplifier plays a key role in controlling the electromagnetic levitation system, controlling the current as well as the force between electromagnet and rail. Here the power amplifier is used to convert a fixed DC voltage to an adjustable DC output voltage. Different kinds of power amplifiers have been proposed for the electromagnetic levitation system. In this paper, only buck and asymmetrical converters are simulated in the simulation software. The exciting current of the electromagnet is controlled by the power amplifier, which controls the air gap and force between actuator and rail in a closed loop manner. PSPICE is an analog and digital circuit simulation software. PSIM is a general-purpose analog and digital electronic circuit simulator. It is al...
2025
The Internet of Things (IoT) is a latest concept of relating physical computing devices or any other objects to internet and can communicate with each other. Each object is provided with unique identifiers and the ability to transfer data... more
The Internet of Things (IoT) is a latest concept of relating physical computing devices or any other objects to internet and can communicate with each other. Each object is provided with unique identifiers and the ability to transfer data over internet network without human intervention and machine interaction. The project targets on a simple microcontroller, Node MCU with connection to the wireless weather monitoring system, WiFi-WeMos ESP8266 which monitor weather condition using three sensors such as temperature, rain and carbon monoxide sensor. It then displays all data in the Blynk application. The project have been developed by using Node MCU Microcontroller, WiFi-WeMos ESP8266, DHT 11 temperature and humidity sensor, rain sensor and MQ-7 Carbon monoxide sensor. It is suitable for monitoring weather in any place and any time.
2025
In order to manage the increasing complexity and heterogeneity of the distributed embedded systems, the system level performance evaluation must be performed at an early design phase using abstract models of the platforms and... more
In order to manage the increasing complexity and heterogeneity of the distributed embedded systems, the system level performance evaluation must be performed at an early design phase using abstract models of the platforms and applications. Thus, the system level performance simulation techniques for embedded systems play a key role in the architectural exploration phase. The salient performance evaluation methodologies are developed around some key concepts and employ a variety of modelling styles, models of computation and programming languages for performance modelling of embedded systems. The aspects of a performance evaluation methodology might limit it to certain domain(s) of embedded systems and therefore must be investigated. In order to span different domains of distributed systems, a methodology must provide the models for technologies, such as communication protocols and middleware technologies, which are employed in different domains of distributed embedded systems. Once ...
2025
Genetic algorithms (GAs) and Particle Swarm Optimization (PSO) are commonly used to solve many optimization and synthesis problems. An important issue facing the user is the selection of their parameters, such as crossover and mutation... more
Genetic algorithms (GAs) and Particle Swarm Optimization (PSO) are commonly used to solve many optimization and synthesis problems. An important issue facing the user is the selection of their parameters, such as crossover and mutation strategies and rates in GAs, or the population size and boundary conditions in PSO. This paper shows an exhaustive process to obtain those parameters and demonstrates that PSO is more efficient than the real-valued GA when both are applied to linear array synthesis. PSO, with less computational burden and generally fewer lines of code than GAs, turns out to be a more efficent algorithm for the design problem analyzed.
2025
Paralysis is the result of a block in the information pathway between the brain and the limbs. Patients losing bodily control in this way are unable to move as they need to and are, therefore, unable to look after their own needs. The... more
Paralysis is the result of a block in the information pathway between the brain and the limbs. Patients losing bodily control in this way are unable to move as they need to and are, therefore, unable to look after their own needs. The goal of this paper is to design a functioning quadrotor drone that will respond to a patient’s brain activity and accordingly enables them to have normal daily functions. We have designed an innovative brain computer interface (BCI) system to control the drone using only the power of thought. The drone has been designed and built using commercial components. An Emotiv EPOC headset was used to gather brain activity and communicate it to the computer which uses Emotiv software and a translation program to convert the signal pattern into a command that is able to be read by an OpenPicus FlyPort module installed on the quadrotor drone. Due to the non-linear nature of the quadrotor, an innovative control law was derived using the Fuzzy Proportional Derivati...
2025, International Journal of Computer and Electrical Engineering
This paper describes the signature scheme in which an individual can sign a document or messages on behalf of entire group. Here, a dynamic group blind signature scheme has been proposed, which is an extension of [L n R] and [B] Group... more
This paper describes the signature scheme in which an individual can sign a document or messages on behalf of entire group. Here, a dynamic group blind signature scheme has been proposed, which is an extension of [L n R] and [B] Group Blind signature scheme. Proposed blind signature scheme has two separate authorities; an issuer, for issuing the membership certificate to group members and an opener, who can open the identity of a signature's originator in the case of a dispute. This scheme is based on the concept of PKI (public key infrastructure) environment and three key requirements i.e., Traceability, Anonymity and Non-Frameability. The problem of revocation of identity in group signatures has also solved in this paper. Before that many constructions have been proposed, however, a recurrent problem concerning with the revocation of group members, remained the same. Therefore, an efficient revocation algorithm is used to revoke the members and prevent frauds at the time of signing a document in future. Also the security of group keys is the major concern of this research.
2025, International Journal of Computer and Electrical Engineering
This research paper has presented a data hiding technique for binary document images. Entropy measure method is used to minimize the perceptual distortion due to embedding. The watermark extraction is a blind system because neither the... more
This research paper has presented a data hiding technique for binary document images. Entropy measure method is used to minimize the perceptual distortion due to embedding. The watermark extraction is a blind system because neither the original image nor the watermark is required for extraction. The document image is similar to any other image. The proposed method discovers the specific regions where minimum distortion delay exists due to embedding. For embedding, the blocks that exist in the area of small font sizes are selected. Experimental results show that marked documents have excellent visual quality and less computational complexity.
2025
CampusERP is an implementation of an ERP System, which will be used primarily in educational institutes such as Engineering Colleges. There will be both Web and Flutter Application for Centralized Management of Educational Institutes.... more
CampusERP is an implementation of an ERP System, which will be used primarily in educational institutes such as Engineering Colleges. There will be both Web and Flutter Application for Centralized Management of Educational Institutes. Main Goal of the project is to digitize day to day activities of an Educational Institute, further reducing load on teaching as well as non-teaching staff. This project will have primarily two main Users that would be Teacher and Student. The complete system revolves around these two users. Every module that is available in this project is some way or other beneficial to these two types of users. This project has two main modules that is Student Central Platform and Teacher Central Platform which act as base for all the other modules present.
2025, Applied Sciences
When discussing Cultural Heritage (CH), the risk of causing damage is inherently linked to the artifact itself due to several factors: age, perishable materials, manufacturing techniques, and, at times, inadequate preservation conditions... more
When discussing Cultural Heritage (CH), the risk of causing damage is inherently linked to the artifact itself due to several factors: age, perishable materials, manufacturing techniques, and, at times, inadequate preservation conditions or previous interventions. Thorough study and diagnostics are essential before any intervention, whether for preventive, routine maintenance or major restoration. Given the symbolic, socio-cultural, and economic value of CH artifacts, non-invasive (NI), non-destructive (ND), or As Low As Reasonably Achievable (ALARA) approaches—capable of delivering efficient and long-lasting results—are preferred whenever possible. Electromagnetic (EM) techniques are unrivaled in this context. Over the past 20 years, radiography, tomography, fluorescence, spectroscopy, and ionizing radiation have seen increasing and successful applications in CH monitoring and preservation. This has
led to the frequent customization of standard instruments to meet specific diagnostic needs. Simultaneously, the integration of terahertz (THz) technology has emerged as a promising advancement, enhancing capabilities in artifact analysis. Furthermore, Artificial Intelligence
(AI), particularly its subsets—Machine Learning (ML) and Deep Learning (DL)—is playing an increasingly vital role in data interpretation and in optimizing conservation strategies. This paper provides a comprehensive and practical review of the key achievements in the application
of EM techniques to CH over the past two decades. It focuses on identifying established best practices, outlining emerging needs, and highlighting unresolved challenges, offering a forward-looking perspective for the future development and application of these technologies
in preserving tangible cultural heritage for generations to come.
2025, IEEE EXPLORE
Deep learning is a robust framework for solving complex prediction and forecasting problems from multiple fields, such as weather sciences. Due to the abundance and higher resolution of data available, cloud-based deep learning offers a... more
Deep learning is a robust framework for solving complex prediction and forecasting problems from multiple fields, such as weather sciences. Due to the abundance and higher resolution of data available, cloud-based deep learning offers a compelling approach for achieving promising gains in accuracy and efficiency regarding weather forecasting. A more pressing priority in the face of worsening weather events requires faster and more reliable forecasting. Deep learning in the cloud is implemented by training deep neural networks on large datasets stored in a public or private cloud and subsequently using these pre-trained models to predict new data. This encourages using large-scale computational resources, such as those necessary to tackle the heavy data needed for precise meteorological forecasts. Such deep learning models have the flexibility and scalability required to adapt and tune them for specific weather patterns, which can then run on a cloud, enabling readiness as demanded. In this work, 3, x, y present a scalable deep learning-based approach to extendedrange temperature prediction on high-performance cloud resources. We use the model to train on historical weather data combined with real-time observed weather from various sources.
2025, Memoria Investigaciones en Ingeniería
espanolEl ingreso del estado de multiples contactos mecanicos a un Sistema Embebido, asi como el caso de un numero alto de salidas a traves de leds indicadores, configuran un desafio importante para los sistemas embebidos, dada la... more
espanolEl ingreso del estado de multiples contactos mecanicos a un Sistema Embebido, asi como el caso de un numero alto de salidas a traves de leds indicadores, configuran un desafio importante para los sistemas embebidos, dada la cantidad limitada de puertos de Entrada/Salida (E/S) de los Microcontroladores. Por otra parte, si bien eliminar el rebote mecanico de un contacto cuyo estado debe ingresar al sistema es razonablemente simple, ello se complica cuando se trata de multiples contactos, cuyos tiempos de estabilizacion son en general diferentes entre si. Existen diversos metodos para E/S con multiples contactos. El objetivo de este trabajo es reunir, analizar y explicar los mismos de manera integrada, para luego proponer una variante novedosa que integra multiples entradas y salidas empleando tres puertos. Se presentan y discuten dos metodos para evitar los efectos del rebote mecanico de multiples contactos. Por ultimo se propone un esquema de cableado modular para el caso de q...
2025
Resumen.-El ingreso del estado de múltiples contactos mecánicos a un Sistema Embebido, así como el caso de un número alto de salidas a través de leds indicadores, configuran un desafío importante para los sistemas embebidos, dada la... more
Resumen.-El ingreso del estado de múltiples contactos mecánicos a un Sistema Embebido, así como el caso de un número alto de salidas a través de leds indicadores, configuran un desafío importante para los sistemas embebidos, dada la cantidad limitada de puertos de Entrada/Salida (E/S) de los Microcontroladores. Por otra parte, si bien eliminar el rebote mecánico de un contacto cuyo estado debe ingresar al sistema es razonablemente simple, ello se complica cuando se trata de múltiples contactos, cuyos tiempos de estabilización son en general diferentes entre sí. Existen diversos métodos para E/S con múltiples contactos. El objetivo de este trabajo es reunir, analizar y explicar los mismos de manera integrada, para luego proponer una variante novedosa que integra múltiples entradas y salidas empleando tres puertos. Se presentan y discuten dos métodos para evitar los efectos del rebote mecánico de múltiples contactos. Por último se propone un esquema de cableado modular para el caso de que los contactos pudieran estar distribuidos en diversas localizaciones a lo largo de una planta.
2025, Memoria Investigaciones en Ingeniería
Resumen.-El ingreso del estado de múltiples contactos mecánicos a un Sistema Embebido, así como el caso de un número alto de salidas a través de leds indicadores, configuran un desafío importante para los sistemas embebidos, dada la... more
Resumen.-El ingreso del estado de múltiples contactos mecánicos a un Sistema Embebido, así como el caso de un número alto de salidas a través de leds indicadores, configuran un desafío importante para los sistemas embebidos, dada la cantidad limitada de puertos de Entrada/Salida (E/S) de los Microcontroladores. Por otra parte, si bien eliminar el rebote mecánico de un contacto cuyo estado debe ingresar al sistema es razonablemente simple, ello se complica cuando se trata de múltiples contactos, cuyos tiempos de estabilización son en general diferentes entre sí. Existen diversos métodos para E/S con múltiples contactos. El objetivo de este trabajo es reunir, analizar y explicar los mismos de manera integrada, para luego proponer una variante novedosa que integra múltiples entradas y salidas empleando tres puertos. Se presentan y discuten dos métodos para evitar los efectos del rebote mecánico de múltiples contactos. Por último se propone un esquema de cableado modular para el caso de que los contactos pudieran estar distribuidos en diversas localizaciones a lo largo de una planta.
2025, International Journal of Scientific Research in Computer Science, Engineering and Information Technology
The enhancement of information technology extensively changes the communication system in society. The information is rapidly shared through the internet or other electronic message delivery system without proper security measures. The... more
The enhancement of information technology extensively changes the communication system in society. The information is rapidly shared through the internet or other electronic message delivery system without proper security measures. The IPR (Intellectual Property Right) of digital content or digital multimedia has to face the main challenge with the fear of distortion of the contents. Steganography and Cryptography are two widely used techniques for online digital contains authentication. Here we are using both of them together to make it more powerful with the help of simple Arithmetic and Binary operations and embed the same in the frequency domain using the wavelet function. Mainly target to provide a secure text information transmission with cryptex and stegano approach with high payload. The standard metric Peak Signal to Noise Ratio (PSNR) and MSE or Mean Squared Error measures the robustness of the proposed method.
2025, International Journal of Computer and Electrical Engineering
Position data acquisition system is described in this paper. The system is based on Magellan Sport Trak GPS, PIC 16F628A microcontroller and personal computer (PC). Position data (latitude and longitude) is extracted from the RMC sentence... more
Position data acquisition system is described in this paper. The system is based on Magellan Sport Trak GPS, PIC 16F628A microcontroller and personal computer (PC). Position data (latitude and longitude) is extracted from the RMC sentence of the NMEA protocol of the GPS receiver. The extracted data is displayed on personal computer using HyperTerminal communication. The real time received characters can be saved in computer using capture text command in HyperTerminal and retrieved later.
2025
— Inter-cloud is an approach that facilitates scalable resource provisioning across multiple cloud infrastructures. In this paper, we focus on the performance optimization of Infrastructure as a Service (IaaS) using the meta-scheduling... more
— Inter-cloud is an approach that facilitates scalable resource provisioning across multiple cloud infrastructures. In this paper, we focus on the performance optimization of Infrastructure as a Service (IaaS) using the meta-scheduling paradigm to achieve an improved job scheduling across multiple clouds. We propose a novel inter-cloud job scheduling framework and implement policies to optimize performance of participating clouds. The framework, named as Inter-Cloud Meta-Scheduling (ICMS), is based on a novel message exchange mechanism to allow optimization of job scheduling metrics. The resulting system offers improved flexibility, robustness and decentralization. We implemented a toolkit named “Simulating the Inter-Cloud ” (SimIC) to perform the design and implementation of different inter-cloud entities and policies in the ICMS framework. An experimental analysis is produced for job executions in inter-cloud and a performance is presented for a number of parameters such as job ex...
2025, Innovative Methods, User-Friendly Tools, Coding, and Design Approaches in People-Oriented Programming
In 2011, the author published an article that looked at the state of the art in novice programming environments. At the time, there had been an increase in the number of programming environments that were freely available for use by... more
In 2011, the author published an article that looked at the state of the art in novice programming environments. At the time, there had been an increase in the number of programming environments that were freely available for use by novice programmers, particularly children and young people. What was interesting was that they offered a relatively sophisticated set of development and support features within motivating and engaging environments, where programming could be seen as a means to a creative end, rather than an end in itself. Furthermore, these environments incorporated support for the social and collaborative aspects of learning. The article considered five environments—Scratch, Alice, Looking Glass, Greenfoot, and Flip—examining their characteristics and investigating the opportunities they might offer to educators and learners alike. It also considered the broader implications of such environments for both teaching and research. In this chapter, the author revisits the sa...
2025, Artificial Intelligence Review
The advancement of Artificial Intelligence (AI) and Machine Learning (ML) has profound implications for both the utility and security of our digital interactions. This paper investigates the transformative role of Generative AI in Social... more
The advancement of Artificial Intelligence (AI) and Machine Learning (ML) has profound implications for both the utility and security of our digital interactions. This paper investigates the transformative role of Generative AI in Social Engineering (SE) attacks. We conduct a systematic review of social engineering and AI capabilities and use a theory of social engineering to identify three pillars where Generative AI amplifies the impact of SE attacks: Realistic Content Creation, Advanced Targeting and Personalization, and Automated Attack Infrastructure. We integrate these elements into a conceptual model designed to investigate the complex nature of AI-driven SE attacks-the Generative AI Social Engineering Framework. We further explore human implications and potential countermeasures to mitigate these risks. Our study aims to foster a deeper understanding of the risks, human implications, and countermeasures associated with this emerging paradigm, thereby contributing to a more secure and trustworthy human-computer interaction.
2025
We present novel and easy-to-evaluate expressions for the error rate performance of cooperative dual-hop relaying with maximal ratio combining operating over independent generalized-K fading channels. For this system, it is hard to obtain... more
We present novel and easy-to-evaluate expressions for the error rate performance of cooperative dual-hop relaying with maximal ratio combining operating over independent generalized-K fading channels. For this system, it is hard to obtain a closed-form expression for the moment generating function (MGF) of the end-to-end signal-to-noise ratio (SNR) at the destination, even for the case of a single dual-hop relay link. Therefore, we employ two different upper bound approximations for the output SNR, of which one is based on the minimum SNR of the two hops for each dual-hop relay link and the other is based on the geometric mean of the SNRs of the two hops. Lower bounds for the symbol and bit error rates for a variety of digital modulations can then be evaluated using the MGF-based approach. The final expressions are useful in the performance evaluation of amplify-and-forward relaying in a generalized composite radio environment.
2025
The received signal in many wireless communication systems comprises of the sum of waves with random amplitudes and random phases. In general, the composite signal consists of correlated nonidentical Gaussian quadrature components due to... more
The received signal in many wireless communication systems comprises of the sum of waves with random amplitudes and random phases. In general, the composite signal consists of correlated nonidentical Gaussian quadrature components due to the central limit theorem (CLT). However, in the presence of a small number of random waves, the CLT may not always hold and the quadrature components may not be Gaussian distributed. In this paper, we assume that the fading environment is such that the quadrature components follow a correlated bivariate Student-t joint distribution. Then, we derive the envelope distribution of the received signal and obtain new expressions for the exact and high signal-to-noise (SNR) approximate average BER for binary modulations. It also turns out that the derived envelope pdf approaches the Rayleigh and Hoyt distributions as limiting cases. Using the derived envelope pdf, we investigate the effect of correlated nonidentical quadratures on the error rate performance of digital communication systems.
2025
ABSTRAK Makalah ini menyajikan perancangan robot berbasis mikrokontriller Atmegta 328 dan sensor gas MQ-6. Perancangan ini ditujukan untuk mengatahui terjadinya kebocoran gas ditempat yang sulit dijangkau. Hasil pengujian data di dapatkan... more
ABSTRAK Makalah ini menyajikan perancangan robot berbasis mikrokontriller Atmegta 328 dan sensor gas MQ-6. Perancangan ini ditujukan untuk mengatahui terjadinya kebocoran gas ditempat yang sulit dijangkau. Hasil pengujian data di dapatkan bahwa hasil pengukuran sensor gas yang didapat dari jarak 5cm kadar gasnya 480 ppm dan jarak 70cm 75 ppm untuk gas ISO Butane. Kata kunci : robot, sensor gas, kontrol jarak jauh, 1. PENDAHULUAN Perkembangan zaman yang semakin lama semakin maju membuat banyak teknologi-teknologi baru bermunculan untuk memenuhi kebutuhan pribadi maupun kebutuhan umum serta kebutuhan di dunia industri saat ini.Banyak perusahaan, instansi, perkumpulan yang berpikir untuk menciptakan teknologi tersebut, sehingga teknologi tersebut dapat dimanfaatkan dan di pergunakan untuk mempermudah pekerjaan kita sehari-sehari.Salah satu jenis robot dengan kemampuan khusus yang belakangan ini banyak menarik minat para ahli untuk dikembangkan adalah robot mobil.Kemampuan dari robot mo...
2025, International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Natural Language Processing (NLP) has experienced essential transformations thanks to machine learning (ML) technical implementations. This research discusses the integrated nature of NLP and ML through data driven methodologies that led... more
Natural Language Processing (NLP) has experienced essential transformations thanks to machine learning (ML) technical implementations. This research discusses the integrated nature of NLP and ML through data driven methodologies that led to radical evolution in text classification and sentiment analysis and machine translation and question-answering systems. Deep learning architectures, particularly transformers like BERT, GPT, and T5, which utilize extensive datasets and contextual embeddings, have largely replaced traditional rule-based methods. This study examines crucial ML approaches, such as supervised, unsupervised, and reinforcement learning, and assesses their influence on NLP performance metrics. Additionally, the paper explores current trends, including prompt engineering, fine-tuning of large language models, and ethical issues in AI-powered NLP applications. By consolidating recent developments, this investigation aims to offer perspectives on the future direction of ML in NLP and its potential impact across various industries and real-world applications. The applications are Email filters, Smart assistants, Search results, Predictive text, Language translation, Digital phone calls, Data analysis, Text analytics.
2025
this paper presents a programmable digital finite impulse response (FIR) filter for low-power applications. A 10tap programmable FIR filter was implemented and fabricated in CMOS 0.25m technology based on the proposed architectural and... more
this paper presents a programmable digital finite impulse response (FIR) filter for low-power applications. A 10tap programmable FIR filter was implemented and fabricated in CMOS 0.25m technology based on the proposed architectural and circuit-level techniques. The chip‟s core contains approximately 130 K transistors and occupies 9.93 mm2 areas. The architecture is based on a computation sharing multiplier (CSHM) which specifically add and shift operation. Efficient circuit-level techniques, namely a new carry-select adder using fast all one finding logic used to improve and 16 percent shorter delay than the original dual ripple-carry carry-select adder. And conditional capture flip-flop (CCFF), are also used to further improve power and performance.
2025, International Journal of Computer and Electrical Engineering
This paper presents the development and implementation of a low cost attitude estimation module where an extended Kalman filter is used for real time processing of signals obtained from an inertial Micro-Electro-Mechanical System (MEMS)... more
This paper presents the development and implementation of a low cost attitude estimation module where an extended Kalman filter is used for real time processing of signals obtained from an inertial Micro-Electro-Mechanical System (MEMS) sensor module to estimate the attitude of an object in space. MATLAB/Simulink Embedded tools are used to design, compile, and download directly into the target. An update rate of 100Hz can be achieved using a Microchip 16 bit dsPIC microcontroller.
2025, International Journal of Computer and Electrical Engineering
This paper presents the development and implementation of a low cost attitude estimation module where an extended Kalman filter is used for real time processing of signals obtained from an inertial Micro-Electro-Mechanical System (MEMS)... more
This paper presents the development and implementation of a low cost attitude estimation module where an extended Kalman filter is used for real time processing of signals obtained from an inertial Micro-Electro-Mechanical System (MEMS) sensor module to estimate the attitude of an object in space. MATLAB/Simulink Embedded tools are used to design, compile, and download directly into the target. An update rate of 100Hz can be achieved using a Microchip 16 bit dsPIC microcontroller.
2025, Universidad de Santander
The intriguing field of Natural Language Processing (NLP) is a captivating Artificial Intelligence (AI) segment that explores text, speech, and translation intricacies. The number of internet users communicating in regional languages is... more
The intriguing field of Natural Language Processing (NLP) is a captivating Artificial Intelligence (AI) segment that explores text, speech, and translation intricacies. The number of internet users communicating in regional languages is soaring each day. Consequently, NLP enthusiasts have turned their attention to local dialects; among these, Gujarati stands out. Gujarati is an Indo-Aryan tongue native to the vibrant Indian state of Gujarat and is passionately spoken by its people. Approximately 62 million individuals around the globe articulate in Gujarati, positioning it as the 26th most widely spoken language in the world. Yet, Gujarati is considered the youngest and least-resourced Indian language within the NLP landscape. However, few groundbreaking advancements have emerged in the Gujarati NLP (GNLP) field. E.g., WordNet, Morphological, Stemmer, optical character recognition (OCR), Speech Recognition, Parts of Speech, Machine Translation, etc. Many researchers have been working with a rule-based approach for GNLP. After that, only a few researchers have attempted the machine learning, deep learning, and reinforcement learning approaches. This paper focuses on a critical survey of existing GNLP research, covering research papers from 1999 to August 2024 in this study. This survey predicts GNLP study until 2030 with the use of available data. This study explores gaps in present studies and offers suggestions for the newly active research field of GNLP. Through this paper, one can develop a deep Learningbased GNLP system to achieve greater accuracy.
2025
In this paper, the application of Artificial Neural Network (ANN) with back-propagation algorithm and weighted Fourier method are used for the synthesis of antenna arrays. The neural networks facilitate the modelling of antenna arrays by... more
In this paper, the application of Artificial Neural Network (ANN) with back-propagation algorithm and weighted Fourier method are used for the synthesis of antenna arrays. The neural networks facilitate the modelling of antenna arrays by estimating the phases. The most important synthesis problem is to find the weights of the linear antenna array elements that are optimum to provide the radiation pattern with maximum reduction in the sidelobe level. This technique is used to prove its effectiveness in improving the performance of the antenna array. To achieve this goal, antenna array for Wi-Fi IEEE 802.11a with frequency at 2.4GHz to 2.5GHz is implemented using Hybrid Fourier-Neural Networks method. To verify the validity of the technique, several illustrative examples of uniform excited array patterns with the main beam are placed in the direction of the useful signal. The neural network synthesis method not only allows to establish important analytical equations for the synthesis ...
2025, Discrimination of Normal and Pathological Brain MRI Using Color Moments and Random Subspace Ensemble Classifier
The vital role of medical imaging in the automatic and efficient diagnosis and treatment in a short frame of time cannot be ignored. There are many imaging techniques for the diagnostic purpose of the human brain with each technique... more
The vital role of medical imaging in the automatic and efficient diagnosis and treatment in a short frame of time cannot be ignored. There are many imaging techniques for the diagnostic purpose of the human brain with each technique having its own advantages and disadvantages. One of the most important imaging modalities for diagnosis and treatment of brain diseases is Magnetic Resonance Imaging (MRI). In our work, we have used MRI for the classification of the brain into normal or abnormal due to its capability of going into much finer details of the brain's soft tissues. With the advancement of technologies, new algorithms and techniques are developed for automatic discrimination of the normal human brain from abnormal. In this paper, Random Subspace (RS) ensemble classifier that uses K-Nearest Neighbors as base classifier has been used to classify the human brain MRI into normal and abnormal. Total of nine features are extracted from the red, green and blue channel of color MRI, which are then entered into random subspace classifier for classification. The results have been compared with the state of art techniques and the proposed algorithm has been proved to be very simple and efficient with an accuracy of 98.64%.
2025, International Journal of Computer and Electrical Engineering
In Thailand, nowadays, the planted area, climate and rainfall are changed rapidly effect to unstable of Thai rice production. The decision-making processes often require reliable rice response models. Local governor and farmer need simple... more
In Thailand, nowadays, the planted area, climate and rainfall are changed rapidly effect to unstable of Thai rice production. The decision-making processes often require reliable rice response models. Local governor and farmer need simple and accurate estimation techniques to predict rice yield in the planning process. This study aims to develop the decision support system using Artificial Neural Networks (ANN) by adjust the value of parameters and study about 9 Algorithms training. In predicting rice productions which its study found that each values that was adjusted making high predicting like appropriate number of hidden nodes to model equals to 9, learning rate effects the speed of appropriate learning to the model equals to 0.5, and appropriate momentum to model was 0.5. CGB Algorithm has coefficient decision higher than using regression variable technique by Stepwise multiple method curve of ANN and stepwise multiple regression method was 4,293.70 and 40,160.00, respectively.