Results (722)
Search Parameters:
Keyword: ITSEmpirical Probability Distributions with Unknown Number of Components
We consider the estimation of empirical probability distributions, both discrete and continuous. We focus on deriving formulas to estimate number of categories for the discrete distribution, when the number of categories is hidden, and the means and methods to estimate the number of components in the Gaussian mixture model representing a probability density function given…
Read MoreAnalysis of the Operational Impact of ETC Lanes on Toll Station
Traffic congestion is being experienced daily by many travellers both on the inner-city roads as well as on the highways. The toll plaza can become a real highway bottleneck, as vehicles must stop and manually pay the tolls at the toll booths. This stop-and-go process can seriously affect traffic fluidity, resulting in a lower quality…
Read MoreLEACH Based Protocols: A Survey
Advances in the world of communications and information technology, as well as the urgent necessity to monitor particular areas and regions, have led to a considerable and influential development in the world of wireless sensor nodes. As they are small, low-cost multi-purpose nodes with limited energy and capabilities. The most important points that deserve research…
Read MoreCreativity in Prototypes Design and Sustainability – The case of Social Organizations
The role of creativity techniques in the design of prototypes is of particular interest given its potential for innovation. At same time, despite the efforts of decades in terms of policies and programs of action, humanity has not yet come close to global sustainability. Sustainability design must involve society and creatively employ all available knowledge…
Read MorePriority-based Scheduling Algorithm for NOMA-integrated V2X
The fifth-generation (5G) wireless system was implemented due to the massive connectivity, especially Internet of Things (IoT) including industrial automation, Vehicle to Everything (V2X) communications, which is shelter an extensive range of applications services and use cases and Intelligent Transportation Systems (ITS). A cellular Non-Orthogonal Multiple Access (NOMA) based on radio resource allocation schemes need…
Read MoreDevelopment of a Technology and Digital Transformation Adoption Framework of the Postal Industry in Southern Africa: From Critical Literature Review to a Theoretical Framework
The pressing and most urgent challenge for most of the Posts in Southern Africa is to transit from its historical reputation of being a snail-paced, inefficient, loss-making and ineffective service provider to an agile, innovative, solution-driven and highly competitive service provider that strive for excellence. In this context, adoption, and diffusion of technology and digital…
Read MoreDefeating Anti-Debugging Techniques for Malware Analysis Using a Debugger
Cyberattacks such as spear phishing and malspam pretending to be companies, institutes, and government officials are increasing and evolving. Malware has a variety of purposes, such as collecting personal information and illegal access to the system. New types of malware are increasing every day, and many malware programs spread all over the Internet, causing severe…
Read MoreMulti-Criteria Decision Analysis Coupled with GIS and Remote Sensing Techniques for Delineating Suitable Artificial Aquifer Recharge Sites in Tafilalet Plain (Morocco)
Despite that groundwater is an important and vital water resource, it is not well managed; depletion of aquifers around the world due to overexploitation is of serious concern especially in arid regions where the situation is much more alarming. Tafilalet plain in Morocco which belongs to this type of environment is certainly no exception and…
Read MoreDevelopment of Secondary Processing Data Methods under Single Point Thunderstorm Activity Monitoring
Forecasting the occurrence and development of thunderstorms near insured mobile objects, such as aircraft carriers, oil tankers, requires the usage of appropriate single-point monitoring systems (SPMS) of thunderstorm activity. These systems must be small and included in the equipment of the objects. A SPMS based on EH location finder meets the requirements of small dimensions.…
Read More5G, Vehicle to Everything Communication: Opportunities, Constraints and Future Directions
The 5G, as a new source of telecommunication infrastructure technology, has attracted many stakeholders to promote the progress of its standards and the development of its technology industry. The 5G reinforces new technologies and delivers vehicles for everything services (V2X) to drivers and passengers. It also offers several advantages. On the other hand, due to…
Read MoreReview of Different Methods for Optimal Placement of Phasor Measurement Unit on the Power System Network
Phasor Measurement Unit (PMU) is an integral device for tracking, protection, and regulation of the power network. PMU gives synchronised calculations of actual-time data for voltage phasor, current phasor, and the frequency. Placing PMU in every node to observe the power network is not realistic from an economic standpoint and even for big data management.…
Read MoreAn Analysts’ Skills: Bespoke Software vs Packaged Software at Small Software Vendors
SMEs usually succeed in today market since they achieve unique things in the business market. Therefore, SMEs look to keep their business benefit by avoiding any regulation conducted of software. Executed software packaged at SMEs consequently provides obstacle concerning to misfits between software services process and SMEs business process. Hence software analysts’ skills are a…
Read MoreInvestigating the Optical Behavior of Single/Multi-Dimensional Photonic Crystal Structures for Photovoltaic Applications
The results investigated in this work are toward the optimization of the photonic crystal structures in 1D and 2D scale. One-dimensional distributed Bragg reflectors (DBRs) have demonstrated substantial potential in various optoelectronic applications, due to the observed tunable optical band-gap. Herein, the use of DBRs in light trapping solar cells was simulated and validated, representing…
Read MoreDesign and Implementation of DFT Technique to Verify LBIST at RTL Level
According to IEC 61805 and ISO 26262 standards requirement inclusion of LBIST (Logic Built in Self-Test) became mandatory to achieve safety critical application such as automotive field. In such systems, once device is switched ON LBIST (Logic Built in Self-Test) is activated and testing of digital logic is performed. After safety subsystem says that the…
Read MoreLow Power Fast Settling Switched Capacitor PTAT Current Reference Circuit for Low Frequency Applications
This paper presents a low voltage, low power, fast settling switched capacitor based Proportional to Absolute Temperature (PTAT) current reference circuit. Unlike in a conventional resistor based PTAT current source, the proposed circuit saves a significant amount of silicon area on chip and hence the circuit becomes less susceptible to process variations. It creates a…
Read MoreAn Enhanced Conceptual Security Model for Autonomous Vehicles
Connected and self-driving cars have emerged over the last decade as a leading example of cyber-physical systems, which seek to considerably enhance traffic safety, reduce emissions, decrease costs, and improve efficiency. Google, TESLA, Uber ATG are becoming pioneers in the autonomous vehicles industry. Autonomous vehicles can have a large codebase and with a large volume…
Read MoreTowards a Smart Campus for Qassim University: An Investigation of Indoor Navigation System
With the advancements in technology, smart entities are becoming increasingly intelligent, therefore, increasing their interaction capabilities with their surrounding environment. Apart from the traditional smart low profile devices, these entities now involve cars, mobiles, televisions, and extend to universities and smart cities. One of the bi-product of the smart cities is the emergence of the…
Read MoreSurge Protection Device for Ex Application
A modern process plant is controlled, operated and safeguarded by the sophisticated distributed control system or a programmable logic controller and an emergency shutdown system. This process plant’s operation could be seriously affected by lightning, electrical switching, and power outrage. Lightning propagation can travel kilometers away, which has the risk of disturbing the control system’s…
Read MoreAnalysis of Long-term Equilibrium Relationship Between KRW, RMB, JPY Exchange Rates and International Financial Market Variables: Comparative Analysis of KRW, RMB, JPY
This study used 15 VECM analysis models to analyze the relationship among exchange rates of South Korea, China and Japan; and between exchange rates of each country and international financial market variables. The analysis variables are the Won, Yuan, Yen spot exchange rates and international financial market variables. The results of the analysis are as…
Read MoreComparison of Support Vector Machine-Based Equalizer and Code-Aided Expectation Maximization on Fiber Optic Nonlinearity Compensation Using a Proposed BER Normalized by Power and Distance Index
Advances in optimizing optical fiber communications have been on the rise these recent years due to the increasing demand for larger data bandwidths and overall better efficiency. Coherent optics have focused on many kinds of research due to its ability to transport greater amounts of information, have better flexibility in network implementations, and support different…
Read MoreUltra Wide Band-based Control of Emulated Autonomous Vehicles for Collision Avoidance in a Four-Way Intersection
Traditional crossroads use traffic lights, but may cause delays due to its stop and wait process. Moreover, autonomous vehicles are being made, although it is not yet mass-produced. This work presents a design and implementation of an agile system that communicates and coordinates autonomous vehicles entering the intersection by adjusting their speeds and maneuvers to…
Read MoreCognitive Cybernetics in the Foresight of Globalitarianism
This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…
Read MoreHand-Based Biometric Recognition Technique – Survey
In today’s modern world, reliable automatic personal recognition is a crucial area of discussion, primarily because of the increased security risks. A large number of systems first require the recognition of a person before they can access their services. Biometric recognition can be used, which can be understood as automatic identification or automatic verification of…
Read MoreSocial Influence Factor of e-Tourism Application Case Study University Student
The income generated from the tourism sector exhibits the main driving force for national revenues in Indonesian. Based on data from the Ministry of Tourism in Indonesia, it turns out that the potential tourist category originated from the cluster of college students or school-aged cohort. In this line, social media signifies a similar age of…
Read MoreImproved System Based on ANFIS for Determining the Degree of Polymerization
Transformer health assessment techniques, based on applicable standards, such as the dissolved gas analysis (DGA), through laboratory testing or online monitoring are used to analyze the symptoms of a failure which develops in transformers from an early stage. The DGA from a sample of dielectric liquid taken from the main tank generates information on the…
Read More
