An alarm is an audio or visual signal to alert people of a problem, danger or something undesirable. Some alarm systems are used for security purposes during producing warning signal in form of sound, light or send alarm ...
Transitional country economy vastly relies on the port logistics service industry. In Bahrain, Khalifa Bin Salman Port immensely contributed throughout the economic zone where information systems thoroughly engaged in ...
Agriculture plays a pivotal role in the growth of any nation.
Nowadays, with the advancements of information
technologies, big data are generated and executed using
faster computing techniques. machine learning ...
Network intrusion activities started since the network topologies become available for public, the target devices were computers, servers, switches, routers and so on, but with the fever of smartphones spreading among the ...
The Iraqi education sector has faced obstacles for decades due to the multiple past crises, and recently social tensions and political demonstrations that led to students' reluctance to join the university in late 2019. ...
In this paper, the new BIST approach to test interconnect faults, based on the boundary scan architecture, is presented. The new algorithm is implemented by the MATLAB code, whose analysis is based on the random manner to ...
Despite the immense educational challenges during the Covid-19 outbreak, the role of ICT in education proved highly beneficial. The use of web-based Learning and Digital Library dependency remarkably increased, resulting ...
Nazri, Nur Maisarah; Fauzi, Shukor; Gining, Ray Adderley; Razak, Tajul Rosli; Jamaluddin, Muhammad(2021-07-09)
Visual impairment is a condition that distresses the structure and functions of the visual system. Many people believed blindness to be anything from seeing light to none at all. In the context of visual impairment, many ...
One of the main concerns posed to power generation operations is the problem of economic dispatch. This problem can be resolved by means of minimizing fuel costs and satisfying system constraints in order to generate ...
Shanthamalar, J. Jeslin; Ramani, R. Geetha(2021-05-02)
Glaucoma is one of the second leading causes of blindness behind cataracts and this sight-stealing disease affected 4.5 million people worldwide was estimated by World Health Organization. Glaucoma is a group of related ...
Mazari, Ahmed Cherif; Djeffal, Abdelhamid(2021-05-02)
In this paper, we examine the feasibility of building Information retrieval test collections based on two combined methods, the pooling strategy and the Naïve-Bayes machine-learning algorithm. Within the proposed approach, ...
Segmentation of ECG to obtain significant and relevant features has been a significant and inevitable step in achieving dimensionality reduction in automated heart disease diagnosis systems. Reduction in mortality due to ...
Human Pose Estimation (HPE) is a relatively new and significant computer vision field and its applications. HPE is the process of estimating the location of the human body joints from the image or video. The correct estimate ...
Determining of an Access Point (AP) placement is one of the most challenging problems in building a wireless network, especially for indoor environments. A network designer must understand precisely the factor that can ...
Intelligent video surveillance systems based on Internet of Things (IoT) technology have proven to be major primary components for security in many areas, such as smart cities. These systems are important because they ...
Traveling is one of the human psychological needs. Many choices and lack of information about desired tourist attractions are some of the obstacles in fulfilling the need. One of the technologies to overcome these obstacles ...
Al-Sammak, A-Imam; Jameel, Ahmed J.; Alaiwi, Ayman(2021-04-22)
In this paper, a graphical technique for analyzing single sideband (SSB) modulation is presented instead of the standard mathematical analysis. This makes it easy to understand and visualize by undergraduate students ...
Contract net protocol is widely used in multi-agent systems because of its high extensibility and flexibility in a dynamic environment. However, many shortages exist while applying the traditional contract net protocol in ...
Chappa, H. K.; Thakur, T.; Kumar, L. V. Suresh; Kumar, Y. V. Pavan; Pradeep, D. John; Reddy, Ch. Pradeep; Ariwa, Ezendu(2021-08-05)
Real-time voltage instability detection in the renewable integrated grid is proposed in this work. The present work is the augmented version of preclusive voltage instability detection index (SQLVIDI), in the companionship ...
Kumar, L.V. Suresh; Ananth, D.V.N.; Kumar, Y. V. Pavan; Pradeep, D. John; Reddy, Ch. Pradeep; Ariwa, Ezendu(2021-04-22)
The load change in a synchronous generator (SG) based power generation system is common which will mainly influence the change in voltage, power flows, frequency, load angle and burden of transmission lines and transformer ...