Search Results

Non-intrusive load monitoring systems (NILM) have attracted much attention due to their potential contribution to energy savings for individual households. The approach analyzes the load consumption of each device in terms of the total energy consumption of the house. The selection of essential load signatures for load identification expresses a crucial challenge with NILM techniques. Several studies that have been proposed in the literature clai

▼ Show Figures

Crop diseases, unfavorable growth, and nutritional deficiencies have a significant impact on the quality and quantity of agricultural income. According to the United Nations’ Food and Agriculture Organization, it is estimated that pre- and post-harvest diseases alone destroy at least 20–40% of global agricultural production. In developing countries like Cambodia, farmers tend to have a limited understanding of crop diseases and how to treat them,

▼ Show Figures

In the chain of the healthcare domain even in the public or private sector of a developing country, there is still much concern about information sharing, security, and privacy, especially for identity management. In Cambodia, currently, the centralized framework for identity management is mostly used, which highly depends on a single trust third-party Certificate Authority (CA) such as the General Department of ICT (GDICT) at the Ministry of Pos

▼ Show Figures

Nowadays, smart home technology has become one of the leading IoT-based projects and as a result of that there are lots of new IoT-based products available in society that allow people to live more convenient and secure lives at home. Many people are aware of this technology, and the smart home application helps people to manage their schedules, home lighting, electricity bills, grocery lists, and also their home security. Today, face recognition

▼ Show Figures

Medical Information System represents a designed system that enables medical staff to collect, store, manage, and transmit data to strengthen the health sector. Healthcare data is sensitive and therefore, it requires protection from unauthorized access. Besides, this data should be shareable among all health organizations. Thus, the health information system enables multiple users from different healthcare organizations to join the network and ha

▼ Show Figures

Mobile robots have been around since the late 1960s. This kind of technology has caught the attention of many researchers since then. In the last decade, the applications of mobile robots are being applied in various sectors unleashing more benefits of automation and robotics to be captured to their maximum potential by mankind. As the tasks are getting more complex, it requires the mobile robots to be more advanced and autonomous. That is when m

▼ Show Figures

Cambodia's first CubeSat Apsara-1 is being developed through an ongoing collaboration between the Institute of Technology of Cambodia and the University of Tokyo. In the early project phase, simulation methods are required for mission design. One important component, needed to predict the mission lifetime, is an orbital simulator. For example, Apsara1 is planned to be launched into orbit in 2024 when solar activity is near its peak, leading to hi

▼ Show Figures

Humans have fast and accurate visual system that allows them to perform complex tasks like driving with a little consciousness. Without visual system, UAV cannot do complex tasks like humans. When UAVs are equipped with visual system and trained with fast and accurate model, they will be able to carry out even more complex tasks such as autonomous landing. Computer vision is a technique suitable for UAV visual system. In this paper, we consider a

▼ Show Figures

This paper presents about our research in social search. Generally, the research in social search falls into two principal challenges. The first challenge is how to find more relevant answers to the question. The second one is how to increase speed in finding relevant answers. Recently, we had provided an algorithm called Question Waves (QW) to find more relevant answers compared to the baseline algorithmbreadth-first search(BFS). But, the search

▼ Show Figures

The recognition phase of an Optical Character Recognition (OCR) system produces a ranked list of candidate characters, among which the top one is usally taken as recognition result without taking context into account. Recognition error occurs if the correct character is not at the top, which is mostly due to shape similarity between characters.In this paper we propose to use character trigram, which means that two previous characters are taken in

▼ Show Figures

E-mail Alert

Add your e-mail address to receive forthcoming issues of this journal

News & Announcements
More News & Announcements...