A chaotic system is a highly volatile system characterized by its sensitive dependence on initial conditions and outside factors. Chaotic systems are prevalent throughout the world today: in weather patterns, disease ...
详细信息
This article presents a method for indirectly measuring the moisture content of paddy using a cylindrical capacitive sensor combined with Charge Integrator Circuits. The moisture measurement device operates based on t...
详细信息
ISBN:
(数字)9798331543952
ISBN:
(纸本)9798331543969
This article presents a method for indirectly measuring the moisture content of paddy using a cylindrical capacitive sensor combined with Charge Integrator Circuits. The moisture measurement device operates based on the principle of the dielectric constant of paddy, which changes according to the moisture content within them. The system consists of a moisture detection section utilizing a cylindrical capacitor, a signal generator operating at a frequency of 500 Hz with a microcontroller, a signal conditioning circuit converting the signal to voltage, and a processing unit. Testing was conducted with paddy at five different moisture levels, demonstrating the ability to accurately determine the moisture content of the rice. When compared to the commercially available PM-450TH moisture meter, the results showed a linear response across the measurement range, with an R 2 value of 0.9824 and an average error of 2.6%. This technology has the potential for further development and application to other types of seeds in the future.
Dear Editor,Pyruvate dehydrogenase complex(PDHc) is a large multienzyme assembly(Mr = 4–10 million Daltons) consisting of three essential components: pyruvate dehydrogenase(E1p), dihydrolipoyl transacetylase(E2p), an...
详细信息
Dear Editor,Pyruvate dehydrogenase complex(PDHc) is a large multienzyme assembly(Mr = 4–10 million Daltons) consisting of three essential components: pyruvate dehydrogenase(E1p), dihydrolipoyl transacetylase(E2p), and dihydrolipoyl dehydrogenase(E3). These three enzymes perform distinct functions sequentially to catalyze the oxidative decarboxylation of pyruvate with formation of nicotinamide adenine dinucleotide(NADH) and acetyl-coenzyme A(Patel and Roche, 1990).
Wheelchair basketball for people with disabilities is a niche market with limited attention and resources due to its smaller scale. We utilize the characteristics of VR technology, combining wearable devices with phys...
详细信息
The increasing prevalence of deep hoaxes, such as fake news and phishing schemes, poses a significant threat to cybersecurity, undermining trust and spreading misinformation. In Indonesia, surveys indicate that more t...
详细信息
Nowadays,quality improvement and increased accessibility to patient data,at a reasonable cost,are highly challenging tasks in healthcare *** of Things(IoT)and Cloud Computing(CC)architectures are utilized in the devel...
详细信息
Nowadays,quality improvement and increased accessibility to patient data,at a reasonable cost,are highly challenging tasks in healthcare *** of Things(IoT)and Cloud Computing(CC)architectures are utilized in the development of smart healthcare *** entities can support real-time applications by exploiting massive volumes of data,produced by wearable sensor *** advent of evolutionary computation algorithms andDeep Learning(DL)models has gained significant attention in healthcare diagnosis,especially in decision making *** cancer is the deadliest disease which affects people across the *** skin lesion classification model has a highly important application due to its fine-grained variability in the presence of skin *** current research article presents a new skin lesion diagnosis model i.e.,Deep Learning with Evolutionary Algorithm based Image Segmentation(DL-EAIS)for IoT and cloud-based smart healthcare ***,the dermoscopic images are captured using IoT devices,which are then transmitted to cloud servers for further ***,Backtracking Search optimization Algorithm(BSA)with Entropy-Based Thresholding(EBT)i.e.,BSA-EBT technique is applied in image *** by,Shallow Convolutional Neural Network(SCNN)model is utilized as a feature *** addition,Deep-Kernel Extreme LearningMachine(D-KELM)model is employed as a classification model to determine the class labels of dermoscopic *** extensive set of simulations was conducted to validate the performance of the presented method using benchmark *** experimental outcome infers that the proposed model demonstrated optimal performance over the compared techniques under diverse measures.
To protect privacy, Park et al. proposed a blockchain-enabled privacy-preserving scheme (BPPS) to achieve demand response in the smart grid environment. Park et al. claimed that their scheme could resist various attac...
详细信息
ISBN:
(数字)9798350394924
ISBN:
(纸本)9798350394931
To protect privacy, Park et al. proposed a blockchain-enabled privacy-preserving scheme (BPPS) to achieve demand response in the smart grid environment. Park et al. claimed that their scheme could resist various attacks and ensure both of privacy and data integrity. However, with thorough analysis of their scheme, we find that it suffers from three flaws.
The increasing integration of Internet of Things (IoT) devices in Wireless Local Area Networks (WLANs) necessitates robust and efficient authentication mechanisms. While existing IoT authentication protocols address c...
详细信息
The rapid advancement of AI has led to the rise of Audio Deepfakes (AD), which pose serious ethical and security concerns by accurately mimicking human speech. This research addresses the urgent need for effective AD ...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
The rapid advancement of AI has led to the rise of Audio Deepfakes (AD), which pose serious ethical and security concerns by accurately mimicking human speech. This research addresses the urgent need for effective AD detection, with a focus on gender bias that can reduce the effectiveness of detection models. We examined how gender affects the performance of both Machine Learning (Support Vector Machine, Random Forest, Logistic Regression, XGBoost) and Deep Learning (Deep Neural Networks, Convolutional Neural Networks) models using the GBAD dataset. Our findings show that models trained on female audio outperform those trained on male audio, likely due to the expressive nature of female voice features and high-pitched artifacts in FAKE audio. This highlights the need for more robust, gender-sensitive detection systems. Future work should focus on developing adaptive models to reduce gender bias, improving security, and creating lightweight models for wider public use.
Price and quality level of products are two important decisions of any business. This paper provides equilibrium solutions for these decisions of two players for a cybersecurity ecosystem, including a solution provide...
详细信息
暂无评论