Results (440)
Search Parameters:
Keyword: ProblemHidden Surface Removal for Interaction between Hand and Virtual Objects in Augmented Reality
Recently, augmented reality (AR) technology has been applied to the inter- action technology between human and virtual objects. In AR interaction technology, it is necessary for users to be able to manipulate virtual objects intuitively. Thus, we focus on manipulating virtual objects directly with the user’s bare hands in this study. On the other hand,…
Read MoreSmart Meter Data Analysis for Electricity Theft Detection using Neural Networks
The major problem in electric utility is Electrical Theft, which is harmful to electric power suppliers and causes economic loss. Detecting and controlling electrical theft is a challenging task that involves several aspects like economic, social, regional, managerial, political, infrastructural, literacy rate, etc. Numerous methods were proposed formerly for detecting electricity theft. However, the previous…
Read MoreMulti-Restricted Area Avoidance Scenario Using Hybrid Dynamical Model and Its Predictive Controller
This article is addressed to show the results of hybrid dynamical modeling in the form of PWA (piecewise-affine) and equivalent MLD (mixed-logical dynamical) model for multi-restricted areas avoidance of an autonomous system. It is a problem of determining the optimal moving trajectory from plant’s initial position to some desired position while avoiding some restricted areas…
Read MoreFactors Influencing the Integration of Freight Distribution Networks in the Indonesian Archipelago: A Structural Equation Modeling Approach
The main problem of the distribution of freight in archipelago countries such as Indonesia is how to ensure that the outlying and outermost islands are served optimally, with low freight costs and optimal frequency of vessel stops at ports. There are three types of vessels that are subsidized and have the duty of public service…
Read MoreProposal of Ledger Technology to Apply to a Public Organization in Ecuador
Ledger technology has now changed financial systems around the world, applying this technology to the improvement of the public sector, mainly to the debt collection system, we improve the speed of payment and its immediate registration, we make use of the advantages of Ledger technology with respect to reliability, security and speed. The objective is…
Read MoreStudy of Performance of Bio- Inspired Strategies Applied to Pursuit Evasion Game Under Feedback Laws
Pursuit Evasion Game (PEG) is an abstract model of various significant problems that appear in both civil and military applications. Bio- Inspired strategies are found to be very useful in studying the PEG. While optimal response to the pursuit strategies are available using geometric control theory, it is shown in this paper that application of…
Read MoreEarly Detection of Alzheimer’s Using Digital Image Processing Through Iridology, An Alternative Method
Over the years, alternative medicine has carried out numerous systematic studies related to the ophthalmological field, specifically the eye. Studies that propose as support of analysis to the Iridology, which studies the alterations of the iris in correspondence with the organs of the human body. Thus, it presents the opportunity to investigate neuronal diseases related…
Read MoreCognitive Systems for Monitoring: Architectural View
The modern stage of information technology development is characterized by the acute need to use cognitive technologies for the solution of tasks of practice, in particular, in the sphere of real world objects monitoring and management. Practical usage of cognitive systems of monitoring is significantly limited to two factors now: operation at the level of…
Read MoreAn Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America
The problems in information security regarding vulnerabilities, threats and risks in voting systems for popular election in Latin America and the world persist; because in most of the countries of the world there is no maturity in democracy and defined policies; the problems of confidentiality, integrity and authenticity in the electoral processes can be evidenced.…
Read MoreMultimedia Application Development With Islamic Critical Reflection Through 3-2-1 Technique for Novice Teacher Internship Program
The use of technology in the learning process has become the most significant point in helping teachers reaching the objectives of the learning. This study focuses on the use of multimedia by novice teachers in comprehending the internship program’s guidance. The Islamic Critical Reflection model is a new and innovative model in the field of…
Read MoreAnalysis of Fuzzy Data for the Selection of Ingredients of the Polymer Composition by Technical Functions in Quality Management
The task of fuzzy mathematical modeling of the composition of a polymer composition is singled out and formulated, as one of the types of chemical-technological systems for creating the theoretical foundations for managing the physicochemical properties of the material produced from this composition. Fuzzy data on the technical functions and concentration of individual ingredients that…
Read MoreDevelopment of Smart Technology for Complex Objects Prediction and Control on the Basis of a Distributed Control System and an Artificial Immune Systems Approach
This paper is an extension of work originally presented in 2018 Global Smart Industry Conference (GloSIC). Researches are devoted to the development of Smart technology for complex objects control and prediction on the basis of a distributed Honeywell DCS control system of the TengizChevroil enterprise using the example of a technological process of medium pressure…
Read MoreFlame Distribution and Attenuation in Narrow Channels Using Mathematical Software
The article of given research presents the mathematical and computer modeling of flame attenuation in narrow channels for different fire extinguishing and explosion suppression compositions. Such kind of flame distribution and attenuation could be considered for different media and channels but in this case it was considered for narrow channels. The effect on the combustion…
Read MoreVowel Classification Based on Waveform Shapes
Vowel classification is an essential part of speech recognition. In classical studies, this problem is mostly handled by using spectral domain features. In this study, a novel approach is proposed for vowel classification based on the visual features of speech waveforms. In sound vocalizing, the position of certain organs of the human vocal system such…
Read MoreLocation Prediction based on Variable-order Markov Model with Time Feature and User’s Spatio-temporal Rule
Location-based service has been widely used in modern life. It brings a lot of convenience to our lives. Improving the accuracy of location prediction can provide better location- based service. We propose a location prediction method based on the variable-order Markov model with time feature and user’s spatio-temporal rule. First, the user’s trajectory data needs…
Read MoreAn Innovative EPC Architecture based on Not Only Stack for beyond 5G Mobile Networks
The traditional long-term evolved (LTE) network architecture faces major challenges due to the rapid development of mobile intelligent applications. Evolved packet core (EPC) network, as the core network of the LTE system, faces the same problem as well. In this paper, we propose an innovative EPC architecture, i.e., Not only stack (NOS)-EPC, in which we…
Read MoreConversion of 2D to 3D Technique for Monocular Images using Papilio One
A 3D image adds realism in viewing experience and can assist in simplifying the graphical displays. A Third dimension supplement to the input can improve pattern recognition, and can be used for 3D scene reconstruction and robot navigation. Recently popularity of 3D hardware is also increased which makes it a hot topic. The production of…
Read MoreEstimation of Software Development Project Success using Fuzzy Logics
To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…
Read MoreEffects of Different Activation Functions for Unsupervised Convolutional LSTM Spatiotemporal Learning
Convolutional LSTMs are widely used for spatiotemporal prediction. We study the effect of using different activation functions for two types of units within convolutional LSTM modules, namely gate units and non-gate units. The research provides guidance for choosing the best activation function to use in convolutional LSTMs for video prediction. Moreover, this paper studies the…
Read MoreDesigning IT Blue Print Academic System on Higher Education with Togaf
STIE XYZ is one of the universities of economics that has not been optimal in the use of information technology. IT implementation is applied when there are urgent and sudden needs. So it is not planned carefully according to the development needs of this educational institution. Therefore many patchy applications are created. As the consequence,…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreParallel Hybrid Testing Tool for Applications Developed by Using MPI + OpenACC Dual-Programming Model
Building massively parallel applications has become increasingly important with coming Exascale related technologies. For building these applications, a combination of programming models is needed to increase the system’s parallelism. One of these combinations is the dual-programming model (MPI+X) which has many structures that increase parallelism in heterogeneous systems that include CPUs and GPUs. MPI +…
Read MoreComputational and Technological Models of Cognitive Monitoring Systems
The approach to the construction of promising cognitive monitoring systems is considered. Based on the analysis of known solutions, the problem of automatic synthesis of computational models of cognitive monitoring is posed. In the synthesis of models, it is proposed to reduce them to relatively finite operational automata. An example of a synthesized model of…
Read MoreEducational Domain Management Knowledge Content Identification and Knowledge Updating Method, Based on Enterprise Management Information Interactions
The aim of this paper is to develop the educational domain management knowledge content identification and knowledge updating method, based on formal descriptions of enterprise management information interactions. This is very important because the progress of modern science leads to the emergence of new factual or conceptual knowledge. There is a need for proper methods…
Read MoreAutomatic Stitching of Medical Images Using Feature Based Approach
Image stitching is a process of creating a panoramic image by combining multiple images that have overlapping regions of the same scene. It is a challenging topic in image processing, multimedia, and medical applications. The proposed system can be applied in medical applications for scoliosis operations and other long limb operations. The problem of the…
Read More
