Mental disorders are a big problem for society because they affect the well-being and lifestyle this issue has created the need for engaging treatment approaches in the mental health care area such as those applicatio...
详细信息
ISBN:
(纸本)9798350398977
Mental disorders are a big problem for society because they affect the well-being and lifestyle this issue has created the need for engaging treatment approaches in the mental health care area such as those applications based on serious games and brain-computer interfaces. this paper shows obtained results for applying the first phases of the software development life cycle to ensure the right design and implementation of a system named CogniDron-EEG. this system aims to be a tool for cognitive training for both healthy subjects who seek to exercise their cognitive functions and children with Deficit Attention and Hyperactivity Disorder.
Frequency-locked loops (FLLs) represent a viable way of generating a range of frequencies from a single reference frequency by using a negative feedback electronic control system that compares the frequency of a contr...
详细信息
ISBN:
(数字)9798350386998
ISBN:
(纸本)9798350387001
Frequency-locked loops (FLLs) represent a viable way of generating a range of frequencies from a single reference frequency by using a negative feedback electronic control system that compares the frequency of a controlled oscillator to the reference one. A digital synthesizable FLL is designed in 130 nm CMOS technology for a target frequency of up to 640 MHz. It employs a wide-tuning range digitally controlled oscillator (DCO) assembled from tri-state inverters in the form of a matrix. the FLL can optionally use a bang-bang or a soft-programmable standard proportional-integral-derivative (PID) controller to regulate the feedback loop. Its design practically minimizes metastability occurrence. the proposed digital FLL occupies
$\mathbf{100} \boldsymbol{\mu}\mathbf{m} \times \mathbf{330}\boldsymbol{\mu}\mathbf{m}$
and consumes 3.5 mW in typical operating conditions. the reference clock is 16 MHz, and the output oscillation frequency is set to 640 MHz, while the achieved frequency resolution is 2.8 MHz.
the enterprise patch management system is highly dependent upon a central management server and typically suffers a single point of failure. this study suggests a hyperledger fabric blockchain-based distributed patch-...
详细信息
the processing power of CPUs is increasing day by day, but systems often struggle to fully utilize this power due to the bottleneck of file access time from the disk. Over the years, various techniques have been devis...
详细信息
ISBN:
(数字)9798350350357
ISBN:
(纸本)9798350350364
the processing power of CPUs is increasing day by day, but systems often struggle to fully utilize this power due to the bottleneck of file access time from the disk. Over the years, various techniques have been devised to reduce I/O latency while considering various file parameters. Our survey paper aims to shed light on these techniques, efficiently comparing them and highlighting the benefits and drawbacks of each approach. For our evaluation, we have considered various file parameters, such as access time, file size, directory structure, and kernel execution flow. We have combined these parameters with a range of supervised and unsupervised machine learning algorithms, including Decision Tree, ABLE, RNN, GNN, CART, XGBoost, CNN, and more. this survey aims to highlight the use of ML/AI algorithms in the intelligent detection of file access and I/O patterns to optimize the performance of modern applications.
According to the reliability requirement of the Flight Control computer for Unmanned Aerial Vehicle (UAV), a design scheme is proposed to ensure its reliability by using tri-redundancy technology. Further, by selectin...
详细信息
In a recent information system, effective management of secure information plays an important role in maintaining the system securely. To ensure the safe operation of a system, secure information in the system should ...
详细信息
CAD software and other computer-aided engineering (CAE) technologies can be used to create digital patterns for clothing. this technology speeds up the production, rendering, and grading of patterns as well as the dig...
详细信息
CAD software and other computer-aided engineering (CAE) technologies can be used to create digital patterns for clothing. this technology speeds up the production, rendering, and grading of patterns as well as the digitization and storage of hard-copy patterns [2]. It also replaces traditional design. On the other hand, because it is possible to graphically portray the developed garment without the necessity for a prototype, three-dimensional (3D) representation of the developed CAD designthrough digital visualization encourages quicker evaluation of the product's fit performance. However, one area that requires research is how to apply these technologies to create a digital twin of the country's significant and historical national costume, which is essential to be preserved digitally because it represents the nation's culture and *** creating a digital twin of the terno dress worn during the 1940s, this study verified the efficacy of digital technology IR 4.0 in the conservation of Philippine National Wear. the virtual fit validation of the digitized terno dress confirms that the generated digital pattern fits closely on the avatar's body on the bust, waist, arms, and hips, as evidenced by the garment fit map of the constructed digital prototype. In fact 100% of the respondents concurred that the silhouette of the traditional terno dress was replicated using the digitalization process. However, only 50% of respondents gave the garment a 5 for fit because as they undertook their basic duties, such as sitting or moving their hands, the shoulder area of the dress began to flare up, causing them some little discomfort. But overall findings indicated that respondents were satisfied. thus, the digitization technique used in the study could reproduce the traditional terno dress. As a result, it can be concluded that digital prototyping employing computer-aided engineering tools can successfully reengineer national traditional wear
Unified Modeling Language (UML) is not a design method but rather a graphic language to represent and communicate the different aspects of an information system. Among the most important research areas in information ...
详细信息
As we all know, satellite communication has the advantages of wide coverage, large communication capacity, etc. compared to terrestrial communication, and is not easily affected by geographical natural disasters. But ...
详细信息
Withthe growing demands of portable electronic devices, wireless technologies are getting more attention. the Internet of things (IoT) promises to provide smart communication between devices, resulting in the exposur...
详细信息
ISBN:
(数字)9798350377866
ISBN:
(纸本)9798350377873
Withthe growing demands of portable electronic devices, wireless technologies are getting more attention. the Internet of things (IoT) promises to provide smart communication between devices, resulting in the exposure of confiden-tial information over the entire radio link. As a result, the requirement for lightweight security techniques is becoming more challenging. Recently, IoT devices have been integrated with intel-ligent reflecting surfaces (IRSs)-enabled non-orthogonal multiple access (NOMA) networks for improved performance in terms of massive connectivity, spectral efficiency, low communication latency, and enhanced security for future wireless IoT networks. In this article, IRS-aided multiple-input-single-output (MISO) NOMA is used in a small IoT network to provide light-weight physical layer security (PLS) through transmit beamforming and artificial noise (AN). Monte Carlo simulations are performed to analyze the performance of the intended IoT devices and Eve in terms of their bit error rate (BER) evaluations. the results show that in a proposed IoT network, the performance of intended IoT devices improves by using transmit beamforming, whereas Eve's performance remains the same. By introducing AN, the performance of intended IoT devices remains almost the same, whereas the performance of Eve degrades significantly. the results verify improvements in securing IoT networks using light-weight physical layer security techniques without introducing any delay or requiring computational complexity.
暂无评论