44 research outputs found
Internet and Biometric Web Based Business Management Decision Support
Internet and Biometric Web Based Business Management Decision Support
MICROBE
MOOC material prepared under
IO1/A5 Development of the MICROBE personalized MOOCs content and teaching materials
Prepared by:
A. Kaklauskas, A. Banaitis, I. Ubarte
Vilnius Gediminas Technical University, Lithuania
Project No: 2020-1-LT01-KA203-07810
Advances in Artificial Intelligence: Models, Optimization, and Machine Learning
The present book contains all the articles accepted and published in the Special Issue “Advances in Artificial Intelligence: Models, Optimization, and Machine Learning” of the MDPI Mathematics journal, which covers a wide range of topics connected to the theory and applications of artificial intelligence and its subfields. These topics include, among others, deep learning and classic machine learning algorithms, neural modelling, architectures and learning algorithms, biologically inspired optimization algorithms, algorithms for autonomous driving, probabilistic models and Bayesian reasoning, intelligent agents and multiagent systems. We hope that the scientific results presented in this book will serve as valuable sources of documentation and inspiration for anyone willing to pursue research in artificial intelligence, machine learning and their widespread applications
Advances on Smart Cities and Smart Buildings
Modern cities are facing the challenge of combining competitiveness at the global city scale and sustainable urban development to become smart cities. A smart city is a high-tech, intensive and advanced city that connects people, information, and city elements using new technologies in order to create a sustainable, greener city; competitive and innovative commerce; and an increased quality of life. This Special Issue collects the recent advancements in smart cities and covers different topics and aspects
A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems
Biometrics is one of the very popular techniques in user identification for accessing institutions and logging into attendance systems. Currently, some of the existing biometric techniques such as the use of fingerprints are unpopular due to COVID-19 challenges. This paper identifies the components of a framework for secure contactless access authentication. The researcher selected 50 journals from Google scholar which were used to analyze the various components used in a secure contactless access authentication framework. The methodology used for research was based on the scientific approach of research methodology that mainly includes data collection from the 50 selected journals, analysis of the data and assessment of results. The following components were identified: database, sensor camera, feature extraction methods, matching and decision algorithm. Out of the considered journals the most used is CASIA database at 40%, CCD Sensor camera with 56%, Gabor feature extraction method at 44%, Hamming distance for matching at 100% and PCA at 100% was used for decision making. These findings will assist the researcher in providing a guide on the best suitable components. Various researchers have proposed an improvement in the current security systems due to integrity and security problems
Triple Helix as a Strategic Tool to Fast-Track Climate Change Adaptation in Rural Kenya: Case Study of Marsabit County
AbstractThe lack of affordable, clean, and reliable energy in Africa's rural areas forces people to resort to poor quality energy source, which is detrimental to the people's health and prevents the economic development of communities. Moreover, access to safe water and food security are concerns closely linked to health issues and children malnourishment. Recent climate change due to global warming has worsened the already critical situation.Electricity is well known to be an enabler of development as it allows the use of modern devices thus enabling the development of not only income-generating activities but also water pumping and food processing and conservation that can promote socioeconomic growth. However, all of this is difficult to achieve due to the lack of investors, local skills, awareness by the community, and often also government regulations.All the above mentioned barriers to the uptake of electricity in rural Kenya could be solved by the coordinated effort of government, private sector, and academia, also referred to as Triple Helix, in which each entity may partially take the other's role. This chapter discretizes the above and shows how a specific county (Marsabit) has benefited from this triple intervention. Existing government policies and actions and programs led by nongovernmental organizations (NGOs) and international agencies are reviewed, highlighting the current interconnection and gaps in promoting integrated actions toward climate change adaptation and energy access
Human-Centric Machine Vision
Recently, the algorithms for the processing of the visual information have greatly evolved, providing efficient and effective solutions to cope with the variability and the complexity of real-world environments. These achievements yield to the development of Machine Vision systems that overcome the typical industrial applications, where the environments are controlled and the tasks are very specific, towards the use of innovative solutions to face with everyday needs of people. The Human-Centric Machine Vision can help to solve the problems raised by the needs of our society, e.g. security and safety, health care, medical imaging, and human machine interface. In such applications it is necessary to handle changing, unpredictable and complex situations, and to take care of the presence of humans
African Handbook of Climate Change Adaptation
This open access book discusses current thinking and presents the main issues and challenges associated with climate change in Africa. It introduces evidences from studies and projects which show how climate change adaptation is being - and may continue to be successfully implemented in African countries. Thanks to its scope and wide range of themes surrounding climate change, the ambition is that this book will be a lead publication on the topic, which may be regularly updated and hence capture further works. Climate change is a major global challenge. However, some geographical regions are more severly affected than others. One of these regions is the African continent. Due to a combination of unfavourable socio-economic and meteorological conditions, African countries are particularly vulnerable to climate change and its impacts. The recently released IPCC special report "Global Warming of 1.5º C" outlines the fact that keeping global warming by the level of 1.5º C is possible, but also suggested that an increase by 2º C could lead to crises with crops (agriculture fed by rain could drop by 50% in some African countries by 2020) and livestock production, could damage water supplies and pose an additonal threat to coastal areas. The 5th Assessment Report produced by IPCC predicts that wheat may disappear from Africa by 2080, and that maize— a staple—will fall significantly in southern Africa. Also, arid and semi-arid lands are likely to increase by up to 8%, with severe ramifications for livelihoods, poverty eradication and meeting the SDGs. Pursuing appropriate adaptation strategies is thus vital, in order to address the current and future challenges posed by a changing climate. It is against this background that the "African Handbook of Climate Change Adaptation" is being published. It contains papers prepared by scholars, representatives from social movements, practitioners and members of governmental agencies, undertaking research and/or executing climate change projects in Africa, and working with communities across the African continent. Encompassing over 100 contribtions from across Africa, it is the most comprehensive publication on climate change adaptation in Africa ever produced
Plants and Plant Products in Local Markets Within Benin City and Environs
AbstractThe vulnerability of agriculture systems in Africa to climate change is directly and indirectly affecting the availability and diversity of plants and plant products available in local markets. In this chapter, markets in Benin City and environs were assessed to document the availability of plants and plant products. Markets were grouped into urban, suburban, and rural with each group having four markets. Majority of the plant and plant product vendors were women and 88 plant species belonging to 42 families were found. Their scientific and common names were documented as well as the parts of the plant and associated products available in the markets. Most of the plant and plant products found in local markets belong to major plant families. Urban markets had the highest diversity of plants and plant products. Three categories of plants and plant products were documented. Around 67% of the plants and plant products were categorized as whole plant/plant parts, 28% as processed plant parts, while 5% as reprocessed plant/plant parts. It was revealed that 86% of these plants are used as foods, 11% are for medicinal purposes, while 3% is used for other purposes. About 35% of plants and plant products across the markets were fruits, which is an indication that city and environs are a rich source of fruits. The local knowledge and practices associated with the plants and plant products can contribute towards formulating a strategic response for climate change impacts on agriculture, gender, poverty, food security, and plant diversity
Proof-of-PUF enabled blockchain: concurrent data and device security for internet-of-energy
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the sources and reasons of any cyber attack. In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and future research challenges