Results (326)
Search Parameters:
Keyword: ValueA novel model for Time-Series Data Clustering Based on piecewise SVD and BIRCH for Stock Data Analysis on Hadoop Platform
With the rapid growth of financial markets, analyzers are paying more attention on predictions. Stock data are time series data, with huge amounts. Feasible solution for handling the increasing amount of data is to use a cluster for parallel processing, and Hadoop parallel computing platform is a typical representative. There are various statistical models for…
Read MorePerformance Evaluation of Associative Classifiers in Perspective of Discretization Methods
Discretization is the process of converting numerical values into categorical values. Contemporary literature study reveals that there are many techniques available for numerical data discretization. The performance of classification method is dependent on the exploitation of the data discretizing method. In this article, we investigate the effect of discretization methods on the performance of associative…
Read MoreAn efficient model to improve the performance of platelet inventory of the blood banks
Platelet transfusions are vital for the prevention of fatal hemorrhage. Therefore, a stable inventory of platelets is required for an efficient and effective delivery of services in all the hospitals and medical centers. However, over the past decades, the requirement for platelets seems to be continuously increasing, while the number of potential donors is decreasing.…
Read MoreAnalysis of Learning Development With Sugeno Fuzzy Logic And Clustering
In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…
Read MoreCombination of Caesar Cipher Modification with Transposition Cipher
The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…
Read MoreCollaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma
Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreMulti Level Integrity Management in LTE/LTE-A Networks
The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…
Read MoreSegmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery
The evolution of technology has changed the face of education, especially when combined with appropriate pedagogical bases. This combination has created innovation opportunities in order to add quality to teaching through new perspectives for traditional methods applied in the classroom. In the Health field, particularly, augmented reality and interaction design techniques can assist the teacher…
Read MoreImage Segmentation Using Fuzzy Inference System on YCbCr Color Model
This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreMoving Towards Reliability-Centred Management of Energy, Power and Transportation Assets
Infrastructure Asset Management was first adopted in 1980s for challenges faced by the utilities, road and rail transport systems, mining, process and manufacturing industries in asset life cycle value optimization. International standards ISO 55000 and PAS 55 were subsequently developed to provide a basis for a structured methodology in the development of Asset Management System.…
Read MoreAn Overview of Traceability: Towards a general multi-domain model
Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…
Read MoreSynthesis of Important Design Criteria for Future Vehicle Electric System
In this article, we give a brief overview of future trends and corresponding stakeholder requests regarding the design of automotive electric and electronic (e/e)-architectures. While today’s optimization is mainly based on the static design criteria of unit costs and weight, three dynamic design criteria are considered decisive factors in the future: voltage stability, vehicle energy…
Read MoreAnalysis of Fractional-Order 2xn RLC Networks by Transmission Matrices
In this study, a new method is devised and presented for the dynamic analysis of a 2xn RLC circuit network modeled with the fractional-order circuit elements. The analysis method is based on the principles of dynamic analysis with transfer function approximation. Firstly, the fractional-order 2xn RLC circuit network of interest which is divided into n…
Read MoreEvaluation of Pure Aluminium Inoculated with Varying Grain Sizes of an Agro-waste based Inoculant
Pure Aluminium and its alloy are widely utilized in Engineering and Industrial applications due to certain significant properties such as softness, ductility, corrosion resistance, and high electrical conductivity which it possesses. Addition of an agro-waste based grain refiner to the melt can alter the characteristics positively or negatively. Therefore, the aim of this paper is…
Read MoreMethodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…
Read MoreSingular Integral Equations in Electromagnetic Waves Reflection Modeling
The processes of reflection of three-dimensional electromagnetic waves by locally irregular media interfaces are investigated. The problem under study is mathematically reduced to the solution of a boundary value problem for the Maxwell equations in an infinite space with an irregular boundary. In order to develop a numerical algorithm, the potential theory and a special…
Read MoreA Clinical Review of Zika Virus (ZIKAV)
Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…
Read MoreSpatial Sampling Requirements for Received Signal Level Measurements in Cellular Networks of Suburban Area
A process for the determination of a required spatial resolution in the collection of the Received Signal Level (RSL) is discussed. This method considers RSL measurements as a three dimensional surface that is sampled through the data collection process. In addition, it is difficult to collect RSL measurements for an entire coverage area because of…
Read MorePower-Energy Simulation for Multi-Core Processors in Bench-marking
At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important…
Read MorePerformance of Surge Arrester Installation to Enhance Protection
The effects of abnormal voltages on power system equipment and appliances in the home have raise concern as most of the equipments are very expensive. Each piece of electrical equipment in an electrical system needs to be protected from surges. To prevent damage to electrical equipment, surge protection considerations are paramount to a well designed…
Read MoreMIMO Performance and Decoupling Network: Analysis of Uniform Rectangular array Using Correlated-Based Stochastic Models
We explore the dependency of MIMO performance on azimuthal spread (AS) and elevation spread (ES) using correlated-based stochastic models (CBSMs). We represent the transmitter as uniform rectangular array (URA), and derive an analytical function for spatial correlation, in terms of maximum power when phase gradient of the incident wave follows a Student’s t-distribution. We model…
Read MoreA Comparative Study For Color Systems Used In The DCT-DWT Watermarking Algorithm
This paper presents a comparative study of using different color systems on watermarking algorithms. This comparison aim is to determining the robustness and the stability of the color systems used in the watermarking scheme. The watermarking algorithm that is used in this paper is a hybrid scheme using the Discrete Wavelet Transform (DWT) in the…
Read MoreAssessment of Wastewater in Duhok Valley, Kurdistan Region/Iraq
In order to characterize the waste water in Duhok valley in Duhok governorate, during 25km, seven sites were selected in Duhok valley, to represent their water quality. Monthly samples were collected from the Duhok valley for the period from, April to September, 2015. The qualitative study of Duhok valley water tested, as considered one of…
Read More
