Results (325)
Search Parameters:
Keyword: TechnologyInnovative Research on the Development of Game-based Tourism Information Services Using Component-based Software Engineering
In recent years, a number of studies have been conducted exploring the potential of digital tour guides, that is, multimedia components (e.g., 2D graphic, 3D models, and sound effects) that can be integrated into digital storytelling with location-based services. This study uses component-based software engineering to develop the content of game-based tourism information services. The…
Read MoreParametric Study of Micro Strip Patch Antenna Using Different Feeding Techniques for Wireless and Medical Applications
Due to the increasing bandwidth requirement of modern wireless communication systems, developing antenna having wider bandwidth have been receiving significant attention in the recent years. In this paper, a comparative analysis of the contacting feed (micro strip line and coaxial probe) and non-contacting feed mechanism (both Aperture Coupling and Proximity Coupling) in micro strip patch…
Read MoreA Survey of Security Challenges in Internet of Things
Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…
Read MoreDesign of an Automatic Forward and Back Collision Avoidance System for Automobiles
This paper is the extended reflection of work originally presented in conference of Electrical, Computer and Communication Engineering (ECCE)-CUET 2017, entitled “Automated Anti Collision System for Automobiles”. Automated collision avoidance system is a trending technology of science in automobile engineering. The aim of this paper is to design a system which will prevent collision from…
Read MoreConstructing Learning-by-Doing Pedagogical Model for Delivering 21st Century Engineering Education
The United Arab Emirates (UAE) is dedicated to establishing the best teaching and learning environment for students and staff across all higher education institutions. To heed this call, the engineering division adopted the Learning-by-Doing (LBD) pedagogical philosophy for 21st Century education at the heart of its strategic directions. This study intends to explore how LBD…
Read MoreImpact of Crosstalk on Signal Integrity of TSVs in 3D Integrated Circuits
Through-Silicon-Vias (TSVs) are utilized for high density 3D integration, which induce crosstalk problems and impact signal integrity. This paper focuses on TSV crosstalk characterization in 3D integrated circuits, where several TSV physical and environmental configurations are investigated. In particular, this work shows a detailed study on the influence of signal-ground TSV locations, distances and their…
Read MoreImpact of Line Resistance Combined with Device Variability on Resistive RAM Memories
In this paper, the performance and reliability of oxide-based Resistive RAM (ReRAM) memory is investigated in a 28nm FDSOI technology versus interconnects resistivity combined with device variability. Indeed, common problems with ReRAM are related to high variability in operating conditions and low yield. At a cell level ReRAMs suffer from variability. At an array level,…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreReview on security issues in RFID systems
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…
Read MoreA Review of Anti- Podal Vivaldi Antenna Operating in Cellular Mobile Communications
The antenna proposed is a new geomantic structure of Ultra-Wideband (UWB) Anti- Podal Vivaldi antenna (AVA). It remarkably offers an attractive performance over the bands of cellular networks. However, its benefits are not limited only in particular applications, whereas radar imaging, mining detection, the biomedical science in the heating of brain cancer tumor and treatment,…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreBig Data Analytics for Healthcare Organization: A Study of BDA Process, Benefits and Challenges of BDA
Day by day, data grows exponentially large using advanced technology and it requires effective analytical techniques to analyze the unknown and useful facts, patterns, associations and new trends which will provide new way for giving treatment to diseases and to provide good quality healthcare at low cost for everyone. This paper describes uncover valuable insights,…
Read MoreA novel beamforming based model of coverage and transmission costing in IEEE 802.11 WLAN networks
IEEE 802.11 WLAN indoor networks face major inherent and environmental issues such as interference, noise, and obstacles. At the same time, they must provide a maximal service performance in highly changing radio environments and conformance to various applications’ requirements. For this purpose, they require a solid design approach that considers both inputs from the radio…
Read MoreDesign and Construction of a remote control switching device for household appliances application
Remote control switching device for household application is a home device used to control the switching of household appliances from a distance. It serves to make the switching of household appliances easy for the elderly, physically challenged, the young and anyone who, in any circumstance, needs comfort and security. This paper develops a remote control…
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read MoreA Reliable, Non-Invasive Approach to Data Center Monitoring and Management
Recent standards, legislation, and best practices point to data center infrastructure management systems to control and monitor data center performance. This work presents an innovative approach to address some of the challenges that currently hinder data center management. It explains how monitoring and management systems should be envisioned and implemented. Key parameters associated with data…
Read MoreThe effect of employing knowledge workers from technologically advanced countries: The knowledge spillover caused by the mobility of knowledge workers in electronic industries in Asia
This paper is an extension of work originally presented in 2017 6th International Conference on Industrial Technology and Management (ICITM) [53]. This research focuses on the mobilization of human resources in the Asian electrical industry and analyzes the impact of engineers’ international mobility on the innovation of enterprises in the host countries. I examine the…
Read MoreTowards Deployment Strategies for Deception Systems
Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…
Read MoreStability and nonlinear controller design of Fast-Lock Phase-Locked Loop in 0.18-µm CMOS
This paper introduces a kind of novel backstepping phase- locked loops (PLL). The paper presents a developed theoretical model of (PLL) frequency synthesizer and provides analytical equations for calculating the desired specification such as phase margin (PM). The proposed model aims to improve the control accuracy, ensure stability and reducing the lock time. Adaptive controller…
Read MoreOn-Chip Testing Schemes of Through-Silicon-Vias (TSVs) in 3D Stacked ICs
This paper presents on-chip testing structures to characterize and detect faulty Through Silicon Vias (TSVs) in 3D ICs technology. 3D Gunning Transceiver Logic (GTL) I/O testing is proposed to characterize the performance of 3D TSVs in high speed applications. The GTL testing circuit will fire different data patterns at different frequencies to characterize the transient…
Read MoreModel-based Development of Safety-critical Functions and ISO 26262 Work Products using modified EAST-ADL
Safety is becoming more and more important with the ever increasing level of safety related E/E Systems built into the cars. Increasing functionality of vehicle systems through electrification of power train, in future even more by autonomous driving, leads to complexity in designing system, software and safety architecture. ISO 26262 aims to reduce the complexity…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read MoreEMI Shielding Performance For Varies Frequency by Metal Plating on Mold Compound
Conformal metalization on mold compound offers new possibility for IC package design to improve features such as rigidization of the flexible core, heat sink capability, 3D-circuit patterning and the electromagnetic interference (EMI) shielding. With the unique processes, the fabrication technology had enabled to achieve the high reliable performance and had passed the electrical test. Following…
Read MoreA Novel Ultra High Speed and Configurable Discrete Wavelet Packet Transform Architecture
This work is dedicated to present a new pipeline-parallel architecture of Discrete Wavelet Packet Transform (DWPT) for all wavelet family implemented in FPGA technology. The main target of our architecture is to provide an effective performance trade-off, where it significantly increases the throughput with a restricted amount of hardware. In this article, we propose two…
Read MoreDesign for Smaller, Lighter and Faster ICT Products: Technical Expertise, Infrastructures and Processes
For the design of Information and Communications Technology (ICT) related products, basic level of technical expertise and simple development tools were enough in the early 1980s. As time goes by, new generation products designed by engineers are always expected to be smaller, lighter and faster, due to the increasing global competition and the application of…
Read More
