American Journal of Electrical and Computer Engineering

Archive

Volume 6, Issue 1, June 2022

  • A Language & an Approach for the Development of IoT Solutions

    Taoufik Ben Hassine

    Issue: Volume 6, Issue 1, June 2022
    Pages: 1-14
    Received: 7 June 2021
    Accepted: 22 June 2021
    Published: 8 January 2022
    Downloads:
    Views:
    Abstract: IoT can contribute to the resolution of problems inherent in the control of our environment and to the automation of decisions based on data extracted from that environment. However, the opportunity to contribute to these activities is not offered to everyone. Indeed, according to the majority of decision makers in different fields, IoT solution de... Show More
  • Performance of Non-Line of Sight Underwater Optical Wireless Communication Links with Spatial Diversity

    Al-Amin Barambu Umar, Mark Stephen Leeson

    Issue: Volume 6, Issue 1, June 2022
    Pages: 15-23
    Received: 21 March 2021
    Accepted: 2 June 2021
    Published: 5 February 2022
    Downloads:
    Views:
    Abstract: Line-of-sight (LOS) underwater optical wireless communication (UOWC) transmission may suffer blocking and are not always possible due to obstructions from sea creatures, bubbles, large suspended particles and features of the seabed, especially in coastal and turbid water environments. Thus, we present the performance of a spatially diverse non-line... Show More
  • An Efficient Intrusion Detection Approach for Wireless Sensor Networks

    Fuad Abu Owaimer, Ayman Tanira, Mohammed Abu Hatab, Mohammad Mikki

    Issue: Volume 6, Issue 1, June 2022
    Pages: 24-29
    Received: 26 March 2022
    Accepted: 16 April 2022
    Published: 10 May 2022
    Downloads:
    Views:
    Abstract: Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detec... Show More
  • Case Characterization and Discipline Measurement Method Based on Discipline Inspection and Supervision Knowledge Graph

    Yue Wang, Yuefeng Liu, Hanyu Zhang, HaoFeng Liu, Xiang Bao, Bo Liu, Jianmin Dong

    Issue: Volume 6, Issue 1, June 2022
    Pages: 30-39
    Received: 28 April 2022
    Accepted: 18 May 2022
    Published: 26 May 2022
    Downloads:
    Views:
    Abstract: As an important link to realize intelligent discipline inspection and supervision, the term “case characterization and discipline measurement” refers to the automatic extraction of material facts from case description and the conclusion of conformity and nonconformity after comparison in accordance with legal norms. In response to the problem that ... Show More
  • Phase Unwrapped Method of Modified Fringe Order

    Tian Yi, Chang Li

    Issue: Volume 6, Issue 1, June 2022
    Pages: 40-46
    Received: 8 May 2022
    Accepted: 13 June 2022
    Published: 16 June 2022
    Downloads:
    Views:
    Abstract: Phase measurement profilometry is an optical three-dimensional measurement method, in which phase is the key factor to accurately obtain the three-dimensional coordinates of the measured object, but there will be phase jump error in phase unwrapped process. In order to eliminate the phase jump error existing in the phase unwrapped process based on ... Show More
  • Research on YOLOv5s Highway Pedestrian Detection Algorithm Integrating Attention Mechanism

    Zhang Xue, Chang Li

    Issue: Volume 6, Issue 1, June 2022
    Pages: 47-53
    Received: 8 May 2022
    Accepted: 13 June 2022
    Published: 16 June 2022
    Downloads:
    Views:
    Abstract: Pedestrian detection is widely used in daily life, but it is difficult to study in highway environment, such as occlusion overlap. In order to reduce error detection rate of highway pedestrian detection, an algorithm based on YOLOv5s was proposed. Since vehicle occlusion leads to the reduction of effective features of targets, CBAM attention and SE... Show More