The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since several years, the concept of the “Smart City” has been meeting a large concern throughout the world. Through smart city implementation, cities aim at improving the efficiency and security of their urban infrastructures as well as the quality of life of citizens. The Smart City concept is based on collection and analysis of data concerning the urban built environment (buildings and infrastructures)...
The challenge in Zero energy building (ZEB) design is to find the best combination of design strategies that would face the energy performance problems of a particular building. This paper outlines the methodology and the cost-effectiveness potential for optimizing the design of net-zero energy building (NZEB) in a cold climate region in Lebanon; Cedars. Specifically, the non-sorting genetic algorithm...
File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use Peer-to-Peer (P2P) protocols via applications such as BitTorrent. However, BitTorrent is an open file sharing service that allows files to be shared widely without the consent, or control, of the original publisher of the work. Such a fact is undesirable...
One of the objectives for a smart city is by applying the fast car retrieval system, which requires the tracking of a vehicle LP (License Plate) using a detection sensor system. ALPR (automatic license plate recognition) system is important through different walks of life, such as: security, access control, and law enforcement in traffic violation systems. In a previous work [1], multiple closed-set...
Tracking and navigation applications i.e. the use of systems to track someone's location, has applications in many fields including the recreational. The main objective of this paper is to achieve a better service in tracking and monitoring large groups during crowded events, like Hajj rituals in Mecca, with advanced methods like WIFI direct (ad-hoc). Our system connects group members to each other...
Artificial intelligence is a combination of two artificial words + intelligence. In this article this combination was created by the realization of a robot (figure 1) guided remotely by a simple red color of the laser via Bluetooth. The latter is equipped with a weapon controlled by the touch of the finger. This system works thanks to a control table (figure 2) allowing taking advantage of this double...
Two kinds of RF power combiner are studied. Matched Wilkinson combiner shows very good linearity but low power efficiency. Unmatched Wilkinson combiner used at the output of class-B amplifiers can be optimized in order to obtain the same good linearity of a matched Wilkinson combiner but better efficiency. Careful attention has to pay to the amplifier impedance to stop instability that may create...
The process of evaluating property is not an easy task. It requires various professional GIS, and topological engineers' skills. Much work and research has been done in this field. Existing applications have many limitations such as plotting on static maps, being tied to specific countries and areas. Also some of them are hard to be integrated with Google Maps, use Legacy APIs, and are implemented...
Quantifying vulnerability and security levels for smart grid diversified link of networks have been a challenging task for a long period of time. Security experts and network administrators used to act based on their proficiencies and practices to mitigate network attacks rather than objective metrics and models. This paper uses the Markov Chain Model [1] to evaluate quantitatively the vulnerabilities...
In the context of a society where digital information exchange is developing, it's essential to be able to take advantage of secured system in order to protect personal and confidential data, assure the security of financial & commercial transactions, arrangement of contracts without the need of hard copies. Encryption technologies, nowadays, are well-known for being essential tools of security...
Vehicle Ad-Hoc Networks was developed in order to improve the safety and comfort while driving a car. Thereby, IEEE 802.11p and IEEE 1609.4 are used for this purpose. However, these protocols showed some limitations, and this is showed through the low probability of successful transmission for safety messages and through the low throughput achieved for service messages. This paper proposes new mechanism,...
The Internet of Things (IoT) presents opportunities to address a variety of systemic, metabolic healthcare issues. Cardiovascular disease and diabetes are among the greatest contributors to premature death worldwide. Wireless wearable continuous monitoring systems (CMS) such as ECG sensors connected to the Internet of Things can greatly decrease the risk of death related to cardiac issues by providing...
This paper presents a microwave system for measuring the cardiopulmonary activity performed in two ways: by using single antenna and by using two antennas. This system generates a continuous wave signal at 20 GHz toward the target and then measure the reflected signal. The target is the person's chest set placed at a distance of 1 m. The VNA measures the phase variation between the emitted and received...
EEG signal contains some specific patterns that predict neuro-developmental impairments of a premature newborn. Extracting these patterns from a set of EEG records provides a dataset to be used in machine learning in order to implement an intelligent classification system that predict prognosis of the baby. In a previous work we proved that Inter-burst intervals (IBI) found in the EEG records predicts...
This paper suggests a novel water-based cellular phone antenna construction for reducing the electromagnetic wave radiation coming from mobile antenna toward human head. The antenna is based on a PIFA structure operating at 1.8 GHz. The Specific Absorption Rate (SAR) is decreased by reducing the current density on the human head. The reduction of SAR is carried out by introducing a U-edge made of...
Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
We propose a radio frequency (RF) sensor built on a fabric textile substrate for pulmonary edema monitoring. The 37-port RF sensor is designed and optimized to operate at 60 MHz with a low input power of 1 mW. By applying the least squares (LS) method, an equation was obtained for dielectric constant estimation using the transmission coefficient of each RF sensor port. The simulated errors are estimated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.