Browse Items (27 total)

25744-67734-1-PB.pdf
Over time, there has been a continuous surge in the demand for electrical energy, necessitating the development of larger and more intricate electrical power networks. These extensive networks pose a significant challenge, primarily in the form of…

24854-67770-1-PB.pdf
Numerous technologies and systems, including autonomous vehicles, surveillance systems, and robotic applications, rely on the capability to accurately detect pedestrians to ensure their safety. As the demand for real-time object detection continues…

25593-67741-1-PB.pdf
Due to the development of wireless communications, there has been a growth in the use of IoT devices and sensor nodes. A potential power source for powering equipment in remote or inaccessible locations is necessary. This research investigates the…

25630-67744-1-PB.pdf
In this article, the direct current (DC) motor control approach is presented using the sand cat swarm optimization (SCSO) method to obtain the best proportional integral derivative (PID) parameters. DC motors are popular equipment. In addition, DC…

25286-67769-1-PB.pdf
We produce the green phosphor Ca14-xEuxMg2[SiO4]8 (CEMSO) to be a part of the white light emitting diodes (WLEDs), short for diodes that generate white illumination. It has wide emission spectra, reaching highest value as 505 nm when excited at the…

25758-67779-1-PB.pdf
This study introduces a novel e-voting system utilizing blockchain technology to address the challenges inherent to traditional voting methods. Traditional systems often suffer from inaccuracies, susceptibility to manipulation, and elevated costs.…

25753-67771-1-PB.pdf
Trojan Horse is a major threat that has grown with the spread of the digital world. Data gathered through the study of memory can provide valuable insights into the Trojan Horse’s behavior patterns. Because of this, memory analysis techniques are one…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2