Search Results - "2023 International Conference on Engineering and Emerging Technologies (ICEET)"

Refine Results
  1. 1

    Implementation of a Complex \mathrm}-C Filter with one Type of \mathrm} Cell by Delshadpour, Siamak

    “…In this paper, a technique to implement a complex \mathrm{g}_{\mathrm{m}} -C filter using "one type of gm cell" is presented. This technique simplifies the…”
    Get full text
    Conference Proceeding
  2. 2

    Invited Speakers by Li, Wei

    “…Thermal radiation represents a ubiquitous aspect of nature. Any object at finite temperatures emits thermal radiation due to thermally induced motion of…”
    Get full text
    Conference Proceeding
  3. 3

    Impedance-Based Online Stability Monitoring and Control of VSC-Based Power Systems by Vahabzadeh, Taleb, Ebrahimi, Seyyedmilad, Jatskevich, Juri

    “…This paper proposes an impedance-based online stability monitoring and control method for VSC-based power systems. Specifically, the impedance model of the…”
    Get full text
    Conference Proceeding
  4. 4

    Mobile Integration for Sakai LMS and Class Schedule Platform at an Higher Education Institution by Oliveira, Pedro Filipe, Matos, Paulo

    “…In the age of mobile technology, the demand for seamless access to educational resources has become essential. This work presents a project the integration of…”
    Get full text
    Conference Proceeding
  5. 5

    A Real-time Data Analysis Approach for Predicting COVID-19 Outcomes using Heterogeneous Ensemble Learning by Azam, Muhammad, Yousaf, Adnan, Zafar, Fatima, Munir, Muhammad Saad, Saeed, Muhammad Imran

    “…COVID-19, caused by the SARS-CoV-2 virus, has resulted in over 5.3 million deaths worldwide, significantly impacting global demographics and causing severe…”
    Get full text
    Conference Proceeding
  6. 6

    Novel Low Power System Design for Aviation Industrial Data Logger by Hassan, Esteve

    “…This paper is intended to describe the design process, planning, and development of a new Data Logger System (DLS) that can be potentially used in acquiring…”
    Get full text
    Conference Proceeding
  7. 7

    A Semi-Supervised Approach for Multi-Domain Classification by Garg, Anirudh, Singh, Kartikey, Mundra, Radhika

    “…This research paper presents an innovative approach for addressing the classification of data originating from multiple domains when there is a scarcity of…”
    Get full text
    Conference Proceeding
  8. 8

    Platform for Optimizing Photovoltaic Consumption by Oliveira, Pedro Filipe, Matos, Paulo

    “…This project aims to support the development and optimization of Intelligent Environments by simulating and analyzing user behaviors within these environments…”
    Get full text
    Conference Proceeding
  9. 9

    MIndex: an algorithm to predict the rebalancing of the ASX Index by Gheno, Gloria

    “…Forecasting stock additions and removals within the ASX 200 index holds significant implications for investors, enabling them to proactively adjust their…”
    Get full text
    Conference Proceeding
  10. 10

    Stabilized Platform Control Unit Modelling and Control for Drilling Rotary Steerable System by Asad, Adeel, Geng, Yanfeng, Yousaf, Adnan, Wang, Weiliang

    “…A Permanent Magnetic Synchronous Motor (PMSM) is integrated within stabilized platform of Rotary Steerable System (RSS) drilling drive. By controlling the…”
    Get full text
    Conference Proceeding
  11. 11

    Forward Kinematic Analysis of a Pick-and-Place Robot for Industrial Applications by Khan, Sikandar

    “…Pick and place robots are used in many industrial applications, i.e. packaging, bin picking and inspection. They are available in different joint…”
    Get full text
    Conference Proceeding
  12. 12

    FPGA-Based Implementation of Enhanced ZUC Stream Cipher Based on Dynamic S-Box by Madani, Mahdi, El Assad, Safwan, Tanougast, Camel, Vella, Mark Joseph, Bourennane, El-Bay, Deforges, Olivier

    “…ZUC algorithm is a word-oriented stream cipher designed by the Data Assurance and Communication Security Research Center of the Chinese Academy of Sciences and…”
    Get full text
    Conference Proceeding
  13. 13

    Comprehensive Monitoring of Large-Scale 5G Technology Development by Rhaiem, Mehdi, Pulizzotto, Davide, Ramdani, Anas, Beaudry, Catherine

    “…Technology analysis and scouting is of great importance for appropriate management and development of innovation. It helps understand market trends and decide…”
    Get full text
    Conference Proceeding
  14. 14

    Design of Hybrid Renewable Energy System for a Selected Location in Pakistan by Sohail, Shayan, Abid, Muhammad Husnain, Malik, Muhammad Ali Ijaz, Fazil, Arsalan, Ur Rehman, Saif, Ikram, Adeel

    “…The purpose of the current study is to constitute a structure for developing rural energy systems by evaluating the techno-economic viability of prospective…”
    Get full text
    Conference Proceeding
  15. 15

    Bitcoin Mining Could Revolutionize Grid Computing and Unconventional Computing by Heinonen, Henri Tapani, Semenov, Alexander

    “…Volunteer computing became popular during the late 1990s with software like SETI@home. In the early days of bitcoin mining, CPUs and GPUs were used similarly…”
    Get full text
    Conference Proceeding
  16. 16

    Optimizing Atomic Layer Deposition Using a Hybrid of Machine Learning Methods by DiBenedetto, Anthony, Abuomar, Osama, Yanguas-Gil, Angel, Elam, Jeffrey W.

    “…Atomic layer deposition (ALD) is a crucial technique in semiconductor miniaturization and high-precision applications. The quality of ALD processes directly…”
    Get full text
    Conference Proceeding
  17. 17

    Intrusion Detection System (IDS) of Multiclassification IoT by using Pipelining and an Efficient Machine Learning by Hazim, Layth Rafea, Jasim, Abdulrahman Ahmed, Ata, Oguz, Ilyas, Muhammad

    “…The Internet of Things (IoT) has quickly advanced and been incorporated into many different fields. With the use of IoT technology, gadgets can receive,…”
    Get full text
    Conference Proceeding
  18. 18

    Comparative Analysis of Graph Representation Techniques for Code Vulnerability Detection by Elahee, Muhammad Irfan Elahee bin Mohd Illzam, Yong, Kelvin Sheng Chek, Then, Patrick Hang Hui, Yong, Sim Kwan

    “…The surge in software development and products that use software have intensified the risk of software vulnerabilities. The difficulty of maintaining code…”
    Get full text
    Conference Proceeding
  19. 19

    How to Process, Model and Apply Heterogeneous Data Obtained from the IoT by Dineva, Kristina, Atanasova, Tatiana, Balabanov, Todor, Parvanov, Dimitar

    “…Now, IoT systems generate massive amounts of data in diverse formats and shapes. Integrating information flows is essential for scientific, technical, and…”
    Get full text
    Conference Proceeding
  20. 20

    Design of Dual-Band Bandpass Filter for Effective Filtering in a Next-Generation Handheld Wireless Devices by Faraj Mursal, Salim Nasar, Rehman, Muhammad Abdul, Alwadie, Abdullah S, Rahman, Saifur, Irfan, Muhammad, Mushtaq, Zohaib, Jan, Sana Ullah

    “…This paper presents the design and characterization of a dual-band bandpass filter (BPF) that utilizes multiple open and short-circuit stubs. The filter's…”
    Get full text
    Conference Proceeding