Results (1602)
Search Parameters:
Keyword: AppA Proposed Architecture for Parallel HPC-based Resource Management System for Big Data Applications
Big data can be considered to be at the forefront of the present and future research activities. The volume of data needing to be processed is growing dramatically in both velocity and variety. In response, many big data technologies have emerged to tackle the challenges of collecting, processing and storing such large-scale datasets. High-performance computing…
Read MoreA Practical PIR-based Scheme for Discovering Nearby Places for Smartphone Applications
We present a privacy-preserving approach for discovering nearby places of interest to Alice. In this approach, the proposed protocol allows Alice to learn whether there is any place that she is looking for near her. However, the location-based service (LBS) that tries to help Alice to find nearby places does not learn Alice’s location. Alice…
Read MoreOmni-directional Dual-Band Patch Antenna for the LMDS and WiGig Wireless Applications
In this paper an omnidirectional dual band monopole antenna at 28 GHz and 60 GHz which is fit for indoor and outdoor wireless applications is developed. The proposed antenna consists of two rectangular patches with a T folded patch. The design, analysis, and optimization processes through this article are executed by the numerical method, Finite…
Read MoreA Practical Approach for Extending DSMLs by Composing their Metamodels
Domain specific modeling (DSM) has become popular in the software development field during these last years. It allows to design an application using a domain specific modeling language (DSML) and to generate an end-solution software product directly from models. However providing a new DSML is a complex and costly job. This can be reduced by…
Read MoreMachine Learning Applied to GRBAS Voice Quality Assessment
Voice problems are routinely assessed in hospital voice clinics by speech and language therapists (SLTs) who are highly skilled in making audio-perceptual evaluations of voice quality. The evaluations are often presented numerically in the form of five-dimensional ‘GRBAS’ scores. Computerised voice quality assessment may be carried out using digital signal processing (DSP) techniques which process…
Read MoreClosed Approach of a Decoder Mobile for the 406 Mhz Distress Beacon
This article presents the design and realization of decoder mobile for distress beacon 406 MHz. The use of the sparse Fourier transforms in the processing of distress beacon signals. The characteristics of these decoders are mobility, able to decode all the frequencies of the beacons. It locates with great precision the location of the emitting…
Read MoreActual Use and Continuous Use of Retail Mobile App: A Model Comparison Perspective
A mobile retail app is a growing innovation in a retailing setting and there is an argument on the prominent status of a mobile application in contrast with a mobile website and web applications. The study used quantitative data to run multiple regression analysis with keen attention to linear regression assumption and compare four models…
Read MoreEffect of Various Parameters for Temperature Distribution in Human Body: An Analytic Approach
This paper is the extension of the work originally presented in 2nd International Conference on Man and Machine Interfacing (MAMI 2017) and the paper of Yue et al. The present study aims at observing the effect of various parameters on temperature distribution profiles at various environmental temperature, tissue thermal conductivities, metabolic rates, blood perfusion rates,…
Read MoreAn Approach for Determining Rules used to Select Viable Junction Design Alternatives Based on Multiple Objectives
Transport planners and engineers frequently face the challenge to determine the best design for a specific junction. Many road design manuals provide guidelines for the design and evaluation of different junction alternatives, however these mostly refer to specialized software in which the performances of design alternatives can be modelled. In the first stage of the…
Read MoreEvolving AL-FEC Application on 5G NGMN-Edge Computing Systems
Fifth generation of mobile networks (5G) comes to cope with the context of the new mobile telecommunications era. Edge computing is a new collaborative technology under standardization utilizing end-user devices or near-end-user edge devices to operate processing, communication, or control operations. The achievement of efficient error control is a very critical aspect in the successful…
Read MoreParametric Co-variance Assignment for a Class of Multivariable Stochastic Uncertain Systems: Output Feedback Stabilization Approach
This paper presents a novel parametric co-variance assignment strategy for multi-variable stochastic uncertain systems. Based upon the explicit parametric design and reduced-order closed-form co-variance model, the variances and co-variances of the system outputs can be assigned artificially using output feedback while the effect of the system uncertainties can be minimized by optimizing the free parameters.…
Read MoreApplication of Modularization Idea of Fault Tree in Ship Pilotage Risk Decision Making
Ship pilotage risk decision-making problems, which is an important issue affecting the safety of navigation. Before the study on the risk decision of ship pilotage, all use direct analysis of fault tree methods. In this paper, through the process analysis of ship pilotage fault tree, the model of fault tree is standardized and simplified. The…
Read MoreA Comparative Analysis of two Controllers for Trajectory Tracking Control: Application to a Biological Process
The aim of the present work is to guarantee the trajectory tracking of a nonlinear biological process and compare two control approaches. The main objective of this work is to elaborate a fuzzy model and build a fuzzy controllers for a biological process by using the fuzzy Takagi-Sugeno. Two controllers are synthesized, the parallel distributed…
Read MorePsychoacoustical Approach in Soundscape Characterization
Four different soundscapes with different loudness and spectral distributions were recorded in Zagreb (capital of Croatia) and reproduced to two groups of listeners while they were performing a concentration demanding task – a simplified variation of the memory game. These two groups of test subjects listened to the same soundscapes but with different loudness distribution.…
Read MoreTheory Building of Quattro Bottom Line Approach for Sustainable Reverse Logistics from Government Perspective: The Indonesia Evidence
Reverse logistics activities are widely used application to preserve the environment in many developed countries from e-waste problem. Due to lack of public awareness in many emerging countries, implementation of reverse logistics program must be initiated by government. Besides that, reverse logistics practices often fail to balance among profit target achievement, the environmental conservation, and…
Read MoreInteractive Virtual Reality Educational Application
Virtual Reality (VR) technology has become one of the most advanced techniques that is used currently in many fields. The role of education is extremely important in every society; therefore, it should always be updated to be in line with new technologies and lifestyles. Applying technology in education enhances the way of teaching and learning.…
Read MoreA detailed step-by-step electrical parameters identification method for photovoltaic generators using a combination of two approaches
The object of this paper is to identify the unknown electrical parameters of solar photovoltaic generators in real time, through the application of a novel suggested hybrid method. The identification process is discussed with details, about the four steps of identification. In this issue, the first step describes the experimental data acquisition work done to…
Read MoreA New Study Performance Control of PMSMs: Validity Abacus Approach
This paper is an extension of work originally presented in conference name” Study Performance of Speed Tracking Control with Frequency and Amplitude Dependence”. Though many PMSMs (Permanent Magnet Synchronous Motor) control approach have already been published, little endeavors have been invested in the study of speed tacking control with frequency or amplitude dependence. The use…
Read MoreEffects of Dielectric Properties of the Material located inside Multimode Applicator on Microwave Efficiency
During microwave heating of materials, the efficiency of microwave heating depends on the materials’ dielectric property, shapes and sizes of the material, materials’ position inside the applicator, operating frequency, level of input power, specific heat capacity, number and position of waveguide over the applicator, size and geometry of applicator etc. This paper examines the effects…
Read MoreA Comparison of MIMO Tuning Controller Techniques Applied to Steam Generator
This work presents a comparison between controller tuning methods for a multivariable steam generator. Controller tuning has a remarkable impact on closed loop performance. Methods selected were Single-Loop Tuning (SLT), Biggest Log Modulus Tuning (BLT), Sequential Return- Difference (SRD) and Structured H(inf) Synthesis (S-H(inf)). Method assessment takes into account set-point tracking, disturbance rejection, tuning effort and…
Read MoreWhich User of technology? Perspectivising the UTAUT model by application of the SFL language Pronoun System towards a systems perspective of technology acceptance and use
This study applies systemic functional linguistics (SFL) as complementary framework of analysis of technology acceptance models (TAMs). The purpose is to bridge research methodology language in international business (IB) studies and engineering management science. Currently TAMs and its consolidated version, the Unified Theory of Acceptance and Use of Technology (UTAUT) provides for a typology of…
Read MoreSteganography System with Application to Crypto-Currency Cold Storage and Secure Transfer
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…
Read MoreAn Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics
Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…
Read MoreA decision-making-approach for the purchasing organizational structure in Moroccan health care system
Excellence in hospitals supply management results in better quality, best prices, and good deliveries. One of the questions that come up as healthcare organization to capture the economies of scale in purchasing prices and process costs is whether their purchasing activities should be centralized or decentralized. In most cases, centralization strategy usually gives good supplier’s…
Read MoreA Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation
Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…
Read More
