Results (502)
Search Parameters:
Keyword: NetworkInteractive Virtual Rehabilitation for Aphasic Arabic-Speaking Patients
Objective: Individuals with aphasia often experience significant problems in their daily lives and social participation. Technologies that address speech and language disorders deficit in merging between therapist’s major role and reinforcing the training between sessions at home. It also lacks the Arabic language attention; however, current systems are typically expensive and lack amusement. Moreover, cumulative…
Read MoreA Proactive Mobile Edge Cache Policy Based on the Prediction by Partial Matching
The proactive caching has been an emerging approach to cost-effectively boost the network capacity and reduce access latency. While the performance of which extremely relies on the content prediction. Therefore, in this paper, a proactive cache policy is proposed in a distributed manner considering the prediction of the content popularity and user location to minimise…
Read MoreLoad Evaluation with Fast Decoupled-Newton Raphson Algorithms: Evidence from Port Harcourt Electricity
The undulated power supply has dropped to its worst reliability index in most parts of the city despite the installations of distribution transformers to improve the power. In this work, examination of Port Harcourt Town Zone 4 (Z4), Rivers State power distribution system forcing on its operation, planning for future expansion of the system, and…
Read MorePosture Recognition Method for Caregivers during Postural Change of a Patient on a Bed using Wearable Sensors
Caregivers experience lower back pain due to their awkward postures while handling patients. Therefore, a monitoring system to supervise caregivers’ postures using wearable sensors is being developed. This study proposed a postural recognition method for caregivers during postural change while handling a patient on a bed. The proposed method recognizes foot positions and arm movements…
Read MoreMatrix-based Minimal Cut Method and Applications to System Reliability
In this paper, we present a new method to deduce minimal cut sets depending on the minimal path sets of the complex systems (networks) to generate the Incidence Matrix, and then compared it with the truth table of the system. This comparison, based on some algebraic properties, gives minimal-cut sets of the complex network with…
Read MoreClassification of Handwritten Names of Cities and Handwritten Text Recognition using Various Deep Learning Models
This article discusses the problem of handwriting recognition in Kazakh and Russian languages. This area is poorly studied since in the literature there are almost no works in this direction. We have tried to describe various approaches and achievements of recent years in the development of handwritten recognition models in relation to Cyrillic graphics. The…
Read MorePerformance Analysis of Selective Repeat ARQ Protocol Used in Digital Data Transmission Over Unreliable Channels
Stop and Wait (SW) ARQ, Go Back N (GBN) ARQ, and Selective Repeat (SR) ARQ are the main ARQ (Automatic-Repeat-reQuest) protocols used to ensure reliable delivery of digital data at correct sequence. These protocols are implemented at the DLC (Data Link Control) sub layer of Data Link Layer (DLL) of OSI (Open System Interconnection) network…
Read MorePath Loss Estimation for Some Korek-Telecom Sites Operating at (1.8) GHz and (2.1) GHz for Urban and Suburban Area in Erbil City
This investigation deals with the identification of the suitable empirical models for predicting radio wave propagation path losses in Erbil city of Kurdistan region in Iraq. For this purpose, two sites of Korek Telecom operating at 1800 MHz and 2100 MHz have been selected at urban and sub-urban environments in the city and seven different…
Read MoreThe Curriculum Developer Team Assignment Analysis Using Ones Assignment Method
This examination plans to investigate the task issue in the educational program designer group utilizing the Ones Assignment Method. The calculation of this technique as follows. At first characterized the task grid, at that point by utilizing determinant portrayal acquired a diminished framework which has in any event one in each line and segments. At…
Read MoreDevelopment of a Wireless Displacement Estimation System Using IMU-based Device
Estimation of displacement is an information required for daily operation monitoring systems to monitor human health or to locate users in buildings, basements, tunnels and similar places which under the same conditions that the global positioning signal (GPS) level is from very weak to completely absent; and is the measurement technique by using multimetric data…
Read MoreSmartphone Influence Factor of University Student’s Academic Achievement
The smartphone is a phenomenal device or tool that recently transform the habit of people. In this part, the smartphone serves not only as a communication device but also more complex functionality. The early research reported that smartphones are used by university students to support their social and academic activities. However, the research report that…
Read MoreMulti-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System
Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…
Read MoreInvestment of Classic Deep CNNs and SVM for Classifying Remote Sensing Images
Feature extraction is an important process in image classification for achieving an efficient accuracy for the classification learning models. One of these methods is using the convolution neural networks. The use of the trained classic deep convolution neural networks as features extraction gives a considerable results in the remote sensing images classification models. So, this…
Read MoreOvercome Discrimination: A Logistic Regression with 10-year Longitudinal Investigation of Emo Kids’ Facebook Posts
This study primarily aims to identify the factors that helped emo kids in 2010 move through the emo-identity discrimination and be able to obtain a certain level of achievement. Facebook is the social network that allows users to track friends’ posts back over 10 years. Content analysis was conducted by using two coders to rate…
Read MoreCNN-LSTM Based Model for ECG Arrhythmias and Myocardial Infarction Classification
ECG analysis is commonly used by medical practitioners and cardiologists for monitoring cardiac health. A high-performance automatic ECG classification system is a challenging area because there is difficulty in detecting and clustering various waveforms in the signal, especially in the manual analysis of electrocardiogram (ECG) signals. In this paper, an accurate (ECG) classification and monitoring…
Read MoreAdvances in Optimisation Algorithms and Techniques for Deep Learning
In the last decade, deep learning(DL) has witnessed excellent performances on a variety of problems, including speech recognition, object recognition, detection, and natural language processing (NLP) among many others. Of these applications, one common challenge is to obtain ideal parameters during the training of the deep neural networks (DNN). These typical parameters are obtained by…
Read MoreBayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis.…
Read MoreBISINDO (Bahasa Isyarat Indonesia) Sign Language Recognition Using CNN and LSTM
Sign language is one of the languages which are used to communicate with deaf people. By using it, they can communicate and understand each other. In Indonesia, there are two standards of sign language which are SIBI (Sistem Bahasa Isyarat) and BISINDO (Bahasa Isyarat Indonesia). Deep learning is a model that is used to apply…
Read MoreDifferential Evolution based Hyperparameters Tuned Deep Learning Models for Disease Diagnosis and Classification
With recent advancements in medical filed, the quantity of healthcare care data is increasing at a faster rate. Medical data classification is considered as a major research topic and numerous research works have been already existed in the literature. Presently, deep learning (DL) models offers an efficient method for developing a dedicated model to determine…
Read MoreA Review of RPL Objective Function based Enhancement Approaches
Since the release of of the IPv6 Routing protocol for Low-Power and Lossy Networks by the IETF ROLL working group, several enhancement schemes were proposed. In fact, They aim to extend the network lifetime, reduce congestion, mitigate end to end delay and moderate energy consumption. In fact, considering the vast area of Low-Power and Lossy…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MorePower Loss Minimization using the Integration of DGs and Reconfiguration of Distribution System: Applied on Real Distribution Feeder of Urbain Areas of Kenitra City in Morroco
Optimal integration of distributed generation (DG) into the distribution system results in reduced power losses and improved bus voltages. In this article, a combination of two techniques has been analyzed: The integration of DG and reconfiguration of the distribution system by removing the Normally Open Point NOP in different places of the system. These two…
Read MoreAnalysis of Security-Reliability Trade-off for Multi-hop Cognitive Relaying Protocol with TAS/SC Technique
This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage probability (OP)) for a multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, in presence of a multi-antenna eavesdropper. In the considered protocol, all primary and secondary terminals are equipped with multiple antennas, and they employ transmit antenna selection (TAS)…
Read MoreLearning the Influence between Partially Observable Processes using Scorebased Structure Learning
The difficulty of learning the underlying structure between processes is a common task found throughout the sciences, however not much work is dedicated towards this problem. In this paper, we attempt to use the language of structure learning to address learning the dynamic influence network between partially observable processes represented as dynamic Bayesian networks. The…
Read MoreThe Effects of Transmission Power and Modulation Schemes on the Performance of WBANs in on-Body Medical Applications
Wireless Body Area Networks support the operation within multiple frequency bands. Thus, they can be integrated in several applications, one of which is on-body medical monitoring applications, as concerned in this paper. Therefore, the purpose of this study is to present the impact of transmission power and both of Differential Binary Phase Shift Keying and…
Read More
