Results (362)
Search Parameters:
Keyword: DevelopmentEstimation of digital protection devices applicability on basis of multiple characterizing parameters
The contemporary electrical power systems (EPS) impose increased requirements for the functionality of the protection systems. The necessity of improved EPS stability is in some extent resulting of the increased integration of renewable sources of electrical energy. The future grid development gives perspective for connection of more converter based generations. The power electronic schemes and…
Read MoreAlgorithms for Technical Integration of Virtual Power Plants into German System Operation
This paper critically evaluates the operational perspective of Virtual Power Plants (VPP) in Germany by analyzing key factors to replace conventional power plants in the future power system. Therefore, its necessity for the secure operation as well as the technical and economic benefits for the German power system are pointed out. The single sections describe…
Read MoreModelling of the resistance heating of the moving molybdenum sheet
This article describes the modeling procedure of a direct resistive heat model of the molybdenum sheet and its simulation with electrodes made from various materials. The main characteristic of the proposed model is its dynamic behavior, because model considers the movement of the molybdenum sheet. The simulation results are mutually compared and the optimal material…
Read MoreA Perfect Ecosystem for Learning? Modern Thoughts for Organizing Higher Education
The background of the article lies in South Eastern Finland, in Lappeenranta, where an active University campus has attracted a group of ICT startups as well as SME’s in the field to collaboration. The novel education approach also has another remarkable role as a developer and source of innovation. An experimental development ecosystem (EDE), where…
Read MoreFramework for the Formal Specification and Verification of Security Guidelines
Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreInvestigating the Expertise Indicators of Vulnerability Discovery Professionals
In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…
Read MoreDesign and Construction of a remote control switching device for household appliances application
Remote control switching device for household application is a home device used to control the switching of household appliances from a distance. It serves to make the switching of household appliances easy for the elderly, physically challenged, the young and anyone who, in any circumstance, needs comfort and security. This paper develops a remote control…
Read MoreProposal of an Embedded Methodology that uses Organizational Diagnosis and Reengineering: Case of bamboo panel company
This work is an extension of the Proceedings of the International Conference on Industrial Engineering, Management Science and Applications, which presented some of the phases of Reengineering applied to Bamboo Panel Company; the results were Strategic planning, Systemic Diagnosis and Performance Indicators through the Balanced Scorecard. Now, the main purpose of this article is to…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MorePublic transportation network design: a geospatial data-driven method
The paper explores an issue of efficient public transportation network design as a part of the urban developing process. Having data about everyday residents travelling inside of an urban area, we can consider this data as people’s requirements for the public transport system. We propose a novel method for initial public transportation network design based…
Read MoreDesign for Smaller, Lighter and Faster ICT Products: Technical Expertise, Infrastructures and Processes
For the design of Information and Communications Technology (ICT) related products, basic level of technical expertise and simple development tools were enough in the early 1980s. As time goes by, new generation products designed by engineers are always expected to be smaller, lighter and faster, due to the increasing global competition and the application of…
Read MoreA Microwave Reflectometer Prototype for Detection of Body Through the Rubble of Collapsed Buildings
There is a growing interest in using radio frequency in imaging for problem solving in situational awareness, surveillance, search and rescue operations, and screening for security. This has been fetched from recent development in addition to innovative technologies in microwave radar imaging applications. Despite the fact that no new phenomenology is exposed in this field,…
Read MoreRanking of Two Multi Criteria Decision Making Cases with Evidential Reasoning under Uncertainty
Many decision problems have more than one objective that need to be dealt with simultaneously. Moreover, because of the qualitative nature of the most of real world problem it is an inevitable activity and very important to interpret and present the uncertain information for making effective decision. The Evidential Reasoning (ER) approach which is one…
Read MoreSystem Control Device Electronics Smart Home Using Neural Networks
The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system…
Read MoreCollaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma
Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MoreThe Search for a Convergent Option to Deploy Smart Grids on IoT Scenario
Smart city projects are quickly evolving in several countries as a feasible solution to the urban organization to provide sustainable socioeconomic growth and solve problems that arise as the populations of these cities grow. In this sense, technology application plays an important role in enabling automation of processes, improving the citizen’s quality of life and…
Read MorePrincipal Component Analysis Application on Flavonoids Characterization
Flavonoid is one of the bioactive compounds that are currently used in pharmaceutical and medicinal industries due to their health benefit. The focus of current research is mainly on the extraction and isolation of bioactive compounds; however non to date has explored on the identification of flavonoids classes under the Fourier Transform Infrared spectroscopy (FTIR).…
Read MoreService Productivity and Complexity in Medical Rescue Services
The increasing impact of services on economic wealth and income in high wage countries calls for a detailed examination of service productivity and complexity in current research projects. This paper describes the development of a measurement model of service productivity and complexity within the domain of medical service provision. While the measurement model of service…
Read MoreMoving Towards Reliability-Centred Management of Energy, Power and Transportation Assets
Infrastructure Asset Management was first adopted in 1980s for challenges faced by the utilities, road and rail transport systems, mining, process and manufacturing industries in asset life cycle value optimization. International standards ISO 55000 and PAS 55 were subsequently developed to provide a basis for a structured methodology in the development of Asset Management System.…
Read MoreMagnetically Levitated and Guided Systems
The paper describes the fundamentals of magnetic levitation technology. A general background of the magnetic levitation is given in this article, including applications of this technology, several comparisons with other types of technologies, the real stage of its development, etc. Further in the paper, the two main types of magnetically levitated systems are compared within…
Read MoreChikungunya virus; Review of Epidemiology and Outbreak in Pakistan
Chikungunya virus (CHIKV) is mosquito-borne, alpha virus. It causes acute fever and acute and chronic musculoskeletal pain in humans. CHIKV has spread to 22 countries including Pakistan resulting in hundreds of thousands of death across the world. International travel stands out as one of the major risk factors for rapid global spread of the disease.…
Read More
