Hasil untuk "Computer engineering. Computer hardware"

Menampilkan 20 dari ~8521205 hasil · dari CrossRef, Semantic Scholar, DOAJ

JSON API
DOAJ Open Access 2026
Microendovascular Neural Recording from Cortical and Deep Vessels with High Precision and Minimal Invasiveness

Takamitsu Iwata, Hajime Nakamura, Takafumi Uemura et al.

Intravascular electroencephalography (ivEEG) with microintravascular electrodes enhances neural monitoring, functional mapping, and brain–computer interfaces (BCIs), offering a minimally invasive approach to assess cortical activities; however, this approach remains unrealized. Current ivEEG methods using electrode‐attached stents are limited to recording from large vessels, such as the superior sagittal sinus (SSS), restricting access to cortical regions essential for precise BCI control, such as those for hand and mouth movements. Here, ivEEG signals from small and soft cortical veins (CV‐ivEEGs) in eight pigs using microintravascular electrodes are recorded, achieving higher resting‐state signal power and greater spatial resolution of somatosensory evoked potentials (SEPs) compared to SSS‐based ivEEG. Additionally, ivEEG recorded from deep veins clearly captures visual evoked potentials. Furthermore, comparisons between CV‐ivEEG and electrocorticography (ECoG) using epidural and subdural electrodes in two pigs demonstrate that CV‐ivEEG captures cortical SEPs comparable to ECoG. Targeted electrical stimulation via cortical vein electrodes induces specific contralateral muscle contractions in five anesthetized pigs, confirming selective motor‐region stimulation with minimal invasiveness. The findings suggest that ivEEG with microintravascular electrodes is capable of accessing diverse cortical areas and capturing localized neural activity with high signal fidelity for minimally invasive cortical mapping and BCI.

Computer engineering. Computer hardware, Control engineering systems. Automatic machinery (General)
CrossRef Open Access 2025
OpenRSSI: Zero-Drift Motion Capture Using Consumer-Grade UWB Hardware

Theresa Chen

This paper presents OpenRSSI, a novel motion capture system that leverages ultra-wideband (UWB) radio signal strength indicators combined with inertial measurement units (IMUs) to achieve high-precision tracking without the positional drift common in pure inertial systems. Our approach utilizes an adaptive sensor fusion algorithm that dynamically adjusts to environmental conditions and movement patterns, providing robust tracking across varied use cases.

DOAJ Open Access 2024
A circuit area optimization of MK-3 S-box

Yanjun Li, Weiguo Zhang, Yiping Lin et al.

Abstract In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified the irreducible polynomials over $$\mathbb {F}_{2^n}$$ F 2 n into three kinds. Then we compared the logic gates required for multiplication over the finite field constructed by the three types of irreducible polynomials. According to the comparison result, we constructed the composite fields, $$\mathbb {F}_{(2^4)^2}$$ F ( 2 4 ) 2 and $$\mathbb {F}_{(2^8)^2}$$ F ( 2 8 ) 2 . Based on the isomorphism of finite fields, the operations over $$\mathbb {F}_{2^{16}}$$ F 2 16 can be conducted over $$\mathbb {F}_{(2^8)^2}$$ F ( 2 8 ) 2 . Similarly, elements over $$\mathbb {F}_{2^8}$$ F 2 8 can be mapped to the corresponding elements over $$\mathbb {F}_{(2^4)^2}$$ F ( 2 4 ) 2 . Next, the SAT solver was used to optimize the operations over smaller field $$\mathbb {F}_{2^4}$$ F 2 4 . At last, the architecture of the optimized MK-3 S-box was worked out. Compared with the implementation proposed by the original designer, the circuit area of the MK-3 S-box in this paper is reduced by at least 55.9%.

Computer engineering. Computer hardware, Electronic computers. Computer science
DOAJ Open Access 2023
Business Process Engineering of Opening a Simpedes Saving Account Using Value-Added and Flow Analysis Methods

Vinny Putri Rezeki, Fitria Fitria

The level of competition and demands for higher business quality encourage the company to develop in all sectors to achieve company goals, including the banking sector, which has main business processes, one of which is serving customers in the account opening process. Therefore, this study conducted a business process analysis to open a Simpedes savings account and then build a more optimal business process improvement engineering. Business process engineering by conducting business process analysis using the BPMN standard, value-added analysis, flow analysis, and simulation using the Bizagi Modeler software. Based on the simulation at Level 2-Time Analysis, the existing business process takes 52 minutes to complete 22 activities. Meanwhile, business process improvement only takes 19 minutes for 16 account opening activities. According to the accumulated calculations, the simulation results on the Level 3-Resource Analysis business process improvement with the implementation of writing pad procurement and the raw material utilization will increase by 13,23%. The costs incurred at the beginning will be significant but have long-term benefits so that the results of business process engineering show better improvements in terms of time and cost that companies can use as business process optimization recommendations.

Electronic computers. Computer science, Computer engineering. Computer hardware
DOAJ Open Access 2023
Materials and challenges of 3D printing of emerging memory devices

Iulia Salaoru, Swapnodoot Ganguly, Dave Morris et al.

The continuous development of the semiconductor industry to meet the increasing demand of modern electronic devices which can enhance computing capabilities is attributed to the exploration of efficient, simple, high-speed operation and multistate information storage capacity of electronic devices called memory devices. Nowadays, one of the main challenges the industry faces is limitations in manufacturing as the current fabrication pathway is complex and relies on the use of rigid substrates that do not match with the needs of industry for flexible, bendable electronics. 3D printing has a huge potential to address this challenge and to completely replace the current fabrication pathways and protocols. In this paper, the materials and the 3D printing technologies that have been explored to fabricate an emerging flexible, bendable memory device will be presented.

Electric apparatus and materials. Electric circuits. Electric networks, Computer engineering. Computer hardware
DOAJ Open Access 2023
A Voice-Based Personal Assistant for Mental Health in Kreol Morisien

B. Gobin-Rahimbux, N. Gooda Sahib, N. Peerthy et al.

Voice-based smart personal assistants (VSPAs) are applications that recognize speech-based input and perform a task. In many domains, VSPA can play an important role as it mimics an interaction with another human. For low-resource languages, developing a VSPA can be challenging due to the lack of available audio datasets. In this work, a VSPA in Kreol Morisien (KM), the native language of Mauritius, is proposed to support users with mental health issues. Seven conversational flows were considered, and two speech recognition models were developed using CMUSphinx and DeepSpeech, respectively. A comparative user evaluation was conducted with 17 participants who were requested to speak 151 sentences of varying lengths in KM. It was observed that DeepSpeech was more accurate with a word error rate (WER) of 18% compared to CMUSphinx at 24%, that is, DeepSpeech fully recognized 76 sentences compared to CMUSphinx where only 57 sentences were fully recognized. However, DeepSpeech could not fully recognize any 7-word sentences, and thus, it was concluded that the contributions of DeepSpeech to automatic speech recognition in KM should be further explored. Nevertheless, this research is a stepping stone towards developing more VSPA to support various activities among the Mauritian population.

Computer engineering. Computer hardware
DOAJ Open Access 2022
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network

Jian Liu, Junjie Yan, Jun Jiang et al.

Abstract The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of compromise (IOCs), e.g., malware hash or URL (uniform resource locator) of command and control server. The actionable CTI, integrated into intrusion detection systems, can not only prioritize the most urgent threats based on the campaign stages of attack vectors (i.e., IOCs) but also take appropriate mitigation measures based on contextual information of the alerts. However, the dramatic growth in the number of cybersecurity reports makes it nearly impossible for security professionals to find an efficient way to use these massive amounts of threat intelligence. In this paper, we propose a trigger-enhanced actionable CTI discovery system (TriCTI) to portray a relationship between IOCs and campaign stages and generate actionable CTI from cybersecurity reports through natural language processing (NLP) technology. Specifically, we introduce the “campaign trigger” for an effective explanation of the campaign stages to improve the performance of the classification model. The campaign trigger phrases are the keywords in the sentence that imply the campaign stage. The trained final trigger vectors have similar space representations with the keywords in the unseen sentence and will help correct classification by increasing the weight of the keywords. We also meticulously devise a data augmentation specifically for cybersecurity training sets to cope with the challenge of the scarcity of annotation data sets. Compared with state-of-the-art text classification models, such as BERT, the trigger-enhanced classification model has better performance with accuracy (86.99%) and F1 score (87.02%). We run TriCTI on more than 29k cybersecurity reports, from which we automatically and efficiently collect 113,543 actionable CTI. In particular, we verify the actionability of discovered CTI by using large-scale field data from VirusTotal (VT). The results demonstrate that the threat intelligence provided by VT lacks a part of the threat context for IOCs, such as the Actions on Objectives campaign stage. As a comparison, our proposed method can completely identify the actionable CTI in all campaign stages. Accordingly, cyber threats can be identified and resisted at any campaign stage with the discovered actionable CTI.

Computer engineering. Computer hardware, Electronic computers. Computer science
DOAJ Open Access 2022
System for Analysis and Prediction of Trends in Cryptocurrency Market

Shaad Iqbal Ansari, Vani H Y

In this article forecasting of daily closing price series of Bitcoin, Ripple, Dash, Litecoin and Ethereum crypto currencies, using data on prices (open, low, high), market capital and volumes using prior days is focused. The value conduct of cryptographic forms of money remains to a great extent neglected, giving new chances to scientists and business analysts to feature the likenesses and contrasts with standard monetary costs. Hence the paper is focused on this area. he results are compared with various benchmarks. Predictions are done using statistical techniques and machine learning algorithms. A simple linear regression (SLR) model that uses only a single-variable sequence of closing prices for forecasting, and a multiple linear regression (MLR) model that uses a multivariate sequence of prices and quantities at the same time. The simple linear regression (SLR) model for univariate serial forecasting uses only closing prices. Mean Absolute Percentage Error (MAPE) and relative Root Mean Square Error (relative RMSE) performance measures are considered. The accuracy achieved by the ARIMA model on our dataset is the highest, followed by Multivariable Linear Regression and LSTM.

Computer engineering. Computer hardware, Industrial engineering. Management engineering
DOAJ Open Access 2021
A Survey from Real-Time to Near Real-Time Applications in Fog Computing Environments

Eliza Gomes, Felipe Costa, Carlos De Rolt et al.

In this article, we present a comprehensive survey on time-sensitive applications implemented in fog computing environments. The goal is to research what applications are being implemented in fog computing architectures and how the temporal requirements of these applications are being addressed. We also carried out a comprehensive analysis of the articles surveyed and separate them into categories, according to a pattern found in them. Our research is important for the area of real-time systems since the concept of systems that respond in real time has presented various understandings and concepts. This variability of concept has been due to the growing requirements for fast data communication and processing. Therefore, we present different concepts of real-time and near real-time systems found in the literature and currently accepted by the academic-scientific community. Finally, we conduct an analytical discussion of the characteristics and proposal of articles.

Computer engineering. Computer hardware, Electronic computers. Computer science
DOAJ Open Access 2021
Sistema para el control de acceso centralizado en los laboratorios productivos de la Universidad de las Ciencias Informáticas

Omar Mar Cornelio, Barbara Bron Fonseca

En un entorno de desarrollo de software mediante líneas productivas, se requiere de un alto control sobre el acceso a los resultados obtenidos por los proyectos y a la información manejada por estos, ya que es considerada patrimonio de la institución. Para garantizar el control efectivo sobre el acceso a información sensible de proyectos, es necesario un control de acceso físico riguroso, siendo este el objetivo principal que rige la presente investigación. En la Universidad de las Ciencias Informáticas, UCI, se controla el acceso físico a los laboratorios productivos por el personal técnico, mediante listado previamente impreso. Sin embargo, la mala gestión de la información genera brechas en la seguridad. Para dar respuesta a la problemática antes planteado se propone una solución a partir de la informatización del proceso de acceso físico a las áreas productivas, para lo cual se implementó un sistema informático codificado mediante PHP sobre el framework CodeIgniter y el gestor de base de datos PostgreSQL. El sistema dota al personal técnico de una herramienta para el control y supervisión de recursos humanos y ofrece además un conjunto de reportes con datos estratégicos para fundamentar la toma de decisiones por parte de los directivos, identificando los horarios picos de acceso, así como los lugares de mayor concurrencia y consecuentemente más vulnerables.

Computer engineering. Computer hardware
DOAJ Open Access 2021
Mathematical Modelling in Crop Production to Predict Crop Yields

Marzhan Anuarbekovna Sadenova, Nail Alikuly Beisekenov, Marzhan Y. Rakhymberdina et al.

In this study, for remote recognition of crops of agroecosystems in Kazakhstan by methods of comparative and historical analogy with the active use of mathematical modelling, the yield indicator of agricultural crops was determined, their dynamic characteristics were studied to predict productivity. The parameters of the dynamic-statistical biomass model were determined separately for each region of the Republic of Kazakhstan based on training data for 21 y (2000 – 2021). The correlation coefficient between the calculated yield values and the official statistics is 0.84. According to the results of cross-validation, the correlation coefficient between the actual and predicted yield of spring wheat was ~ 0.70, which indicates a sufficient resistance of the model to the variability of meteorological conditions for the formation of the crop.

Chemical engineering, Computer engineering. Computer hardware
DOAJ Open Access 2020
La soberanía tecnológica de la gestión de las tecnologías de la información y la Política Tecnológica

José Manuel Santos Alonso

El desarrollo científico y tecnológico de un país puede definirse como el proceso de acumulación de capacidades y actitudes de la sociedad para generar, asimilar, adaptar, perfeccionar, apropiar y aplicar conocimientos y sus correspondientes tecnologías. En este contexto y el de los documentos resultantes del VII Congreso del Partido, refrendados por el Parlamento cubano en el    2017, se destaca la importancia de la aplicación de la ciencia y la innovación al sector productivo y social. En consecuencia y por indicación del Grupo de Trabajo que da seguimiento a estos documentos y bajo la conducción del Ministerio de Ciencia Tecnología y Medio Ambiente (CITMA) se han venido elaborando un conjunto de políticas, que han de servir de base a posterior documentación reglamentaria en la esfera de la ciencia y la tecnología, entre ellas la Política Tecnológica. Por otra parte, las tecnologías de la información (TI), incluyendo en ello a la industria de software, constituyen un negocio clave para el país, y según el Lineamiento 108 sustentado en un sistema de ciberseguridad que proteja nuestra soberanía tecnológica”. También se aborda el tema de la soberanía tecnológica en el Eje temático Potencial productivo, tecnológico y humano, en el Objetivo general 3 y el Objetivo específico 9. El trabajo, a partir de la participación del autor en la elaboración de la Política Tecnológica, refleja las propuestas de incorporación a la mismas de los elementos relacionados con la soberanía tecnológica, su definición, componentes y dimensiones, en particular la dimensión relacionada con la documentación normativo-regulatoria, su carencia e importancia para la gestión de las tecnologías de la información con soberanía tecnológica.

Computer engineering. Computer hardware
DOAJ Open Access 2020
Kontrol Suhu Rice Cooker dengan Metode Fuzzy Logic Sebagai Slow Cooker dan Memanaskan Makanan Menggunakan Aplikasi Android

Farlie Angriawan, Ratna Aisuwarya, Rian Ferdian

There is many electronic equipment that can facilitate the work in cooking. Some of these electronic equipment uses a large amount of electricity. For example in the use of electronic cooking tools such as microwaves, slow cookers and rice cookers. All three cooking utensils have more similar uses, namely in cooking and heating food. Therefore, it is combined into a rice cooker by using temperature control in the porridge cooking mode and setting the time for heating the food. In order to add the slow cooker feature to the rice cooker, the fuzzy logic method is used to control temperature and set the heating time on the microwave feature. On the use of a rice cooker, an Android application is made to select the desired cooking method. The results obtained are the features of slow cooker cooking porridge that is cooked for 2 hours the temperature will be stable at 60 minutes with an average temperature of ± 90.8 ° C, cooking porridge for 4 hours the temperature will be stable at 50 minutes with an average of average temperature ± 81.9 ° C, the cooking porridge for 6 hours the temperature will be stable in the 45th minute with an average temperature of ± 72.4 ° C. While in the microwave feature the results obtained for the length of time required to heat food, the more food heat to be produced.

Computer software, Computer engineering. Computer hardware
DOAJ Open Access 2020
Design of Grid-tied Hybrid Diesel-Renewable Energy Systems Using Power Pinch Analysis

Syn Yee Tay, Nor Erniza Mohammad Rozali, Sharifah Rafidah Wan Alwi et al.

Diesel power systems have been widely applied for energy supply generation. This power scheme however requires periodical maintenance and contributes to the emissions of greenhouse gases. These challenges may be mitigated by integrating existing diesel station with renewable energy (RE) technologies into a hybrid system. Integration of diesel plants with RE systems has been mostly implemented using software and mathematical programming approaches, where the focus of the study is mainly on grid-independent hybrid system. Grid-connected hybrid systems have the potential to supply electricity at a lower cost in comparison to the standalone hybrid power systems. This work aims to design a system that integrates diesel plant with RE technologies into grid-tied hybrid system using insight-based Power Pinch Analysis (PoPA) method. The interactions between diesel generator, RE sources and the grid in meeting the load demands were considered in the methodology development. Various load sharing scenarios between the multiple generation sources were assessed to establish the optimal system operation. Economic assessment was performed to ensure the trade-off between the costs of generation sources and grid electricity cost can be maximized. Based on the demonstrated Illustrative Case Study, load sharing based on peak/off peak period contributes to the lowest net present cost of MYR 32,813,708, hence is deduced as the optimal on-grid hybrid diesel RE system.

Chemical engineering, Computer engineering. Computer hardware
DOAJ Open Access 2019
Implementation of Mobile Solutions in Romania's Education System

Rares-Constantin CIOBANU

In the light of the technology development nowadays, the society and more specific, the education area is facing new challenges in meeting the learners' demands. The continuously changing expectations and the ubiquity of the mobile devices in everyday life has led to the apparition of a new modern learning method, the m-learning, whose theoretical approaches will be further analysed, followed by an examination of the advantages and disadvantages for the mobile learners. This paper also investigates the implementation status of mobile solutions on the Romania`s education systems.

Computer engineering. Computer hardware, Bibliography. Library science. Information resources
S2 Open Access 2017
A neuromorphic approach to image processing and machine vision

Arvind Subramaniam

Neuromorphic engineering is essentially the development of artificial systems, such as electronic analog circuits that employ information representations found in biological nervous systems. Despite being faster and more accurate than the human brain, computers lag behind in recognition capability. However, it is envisioned that the advancement in neuromorphics, pertaining to the fields of computer vision and image processing will provide a considerable improvement in the way computers can interpret and analyze information. In this paper, we explore the implementation of visual tasks such as image segmentation, visual attention and object recognition. Moreover, the concept of anisotropic diffusion has been examined followed by a novel approach employing memristors to execute image segmentation. Additionally, we have discussed the role of neuromorphic vision sensors in artificial visual systems and the protocol involved in order to enable asynchronous transmission of signals. Moreover, two widely accepted algorithms that are used to emulate the process of object recognition and visual attention have also been discussed. Throughout the span of this paper, we have emphasized on the employment of non-volatile memory devices such as memristors to realize artificial visual systems. Finally, we discuss about hardware accelerators and wish to represent a case in point for arguing that progress in computer vision may benefit directly from progress in non-volatile memory technology.

12 sitasi en Computer Science
S2 Open Access 2016
Benchmarking Spike-Based Visual Recognition: A Dataset and Evaluation

Qian Liu, Garibaldi Pineda-García, Evangelos Stromatias et al.

Today, increasing attention is being paid to research into spike-based neural computation both to gain a better understanding of the brain and to explore biologically-inspired computation. Within this field, the primate visual pathway and its hierarchical organization have been extensively studied. Spiking Neural Networks (SNNs), inspired by the understanding of observed biological structure and function, have been successfully applied to visual recognition and classification tasks. In addition, implementations on neuromorphic hardware have enabled large-scale networks to run in (or even faster than) real time, making spike-based neural vision processing accessible on mobile robots. Neuromorphic sensors such as silicon retinas are able to feed such mobile systems with real-time visual stimuli. A new set of vision benchmarks for spike-based neural processing are now needed to measure progress quantitatively within this rapidly advancing field. We propose that a large dataset of spike-based visual stimuli is needed to provide meaningful comparisons between different systems, and a corresponding evaluation methodology is also required to measure the performance of SNN models and their hardware implementations. In this paper we first propose an initial NE (Neuromorphic Engineering) dataset based on standard computer vision benchmarksand that uses digits from the MNIST database. This dataset is compatible with the state of current research on spike-based image recognition. The corresponding spike trains are produced using a range of techniques: rate-based Poisson spike generation, rank order encoding, and recorded output from a silicon retina with both flashing and oscillating input stimuli. In addition, a complementary evaluation methodology is presented to assess both model-level and hardware-level performance. Finally, we demonstrate the use of the dataset and the evaluation methodology using two SNN models to validate the performance of the models and their hardware implementations. With this dataset we hope to (1) promote meaningful comparison between algorithms in the field of neural computation, (2) allow comparison with conventional image recognition methods, (3) provide an assessment of the state of the art in spike-based visual recognition, and (4) help researchers identify future directions and advance the field.

35 sitasi en Medicine, Computer Science
DOAJ Open Access 2017
Gatewaying theWireless Sensor Networks

Ming Zhu, Zhaoshu Tang, Wenlong Yue et al.

With the dev elopmen t of Internet of Things (IoT), bridging wireless sensor netw orks (WSNs) with other netw orks has become importan t. We divide bridging solutions into tw o categ ories: the hardw are solutions and the middlew are solutions. The hardw are solutions have both low pow er short distance wireless interf aces and other types of transmission interf aces, e.g. GPRS, 3G/4G, via hardw are implemen tations, which is more stable and applicable for the depl oyed sensor netw orks. In the middlew are solutions, the whole system processes appropria te protocol conversion, and independence of hardw are, making it easier to be reused in dieren t applica tions and netw orks. This paper brief y presen ts the implemen tation details and key poin ts of each solution. Particular ly, we deriv e the most appropria te situa tion for each solution from our comparisons and discussions in terms of evaluation applied to dieren t criteria.

Computer engineering. Computer hardware, Systems engineering
DOAJ Open Access 2017
Computable Region Filling Method Based on Quadrilateral Mesh Split

XU Raoshan,YUAN Weihang,SUN Zhengxing

This paper proposes a computable filling method,aiming at the problem of deformable filling under certain shape constraint conditions.Quadrilateral mesh split of the target area and filling template is done.Integer planning is presented under constraint conditions such as template connecting,boundary,rotation,minimum deformation,etc.Discrete splicing in filling area is realized using filling template.Through the global optimization,model deformation is iterated,so as to achieve the desired filling effect.Experimental results show that the proposed filling method has no direct relationship with the constraints in domain coverage ratio of target area and edge fitting degree,and it can better achieve region filling under the specified constraints.

Computer engineering. Computer hardware, Computer software

Halaman 46 dari 426061