Results (551)
Search Parameters:
Keyword: REMEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreNon Parallelism and Cayley-Menger Determinant in Submerged Localization
This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…
Read MorePerformance Analysis of Joint Precoding and Equalization Design with Shared Redundancy for Imperfect CSI MIMO Systems
Analytical researches on a potential performance of multipath multiple-input multiple-output (MIMO) systems inspire the development of new technologies that decompose a MIMO channel into independent sub-channels on the condition of constrained transmit power. Moreover, in current studies of inter-symbol interference (ISI) MIMO systems, there is an assumption that channel state information (CSI) at receivers and/or…
Read MoreExperimental Studies of the Silicon Photomultiplier Readout Electronics Based on the Array Chip МН2ХА030
The experimental findings of the main units of readout electronics of silicon photomultipliers (SiPMs) based on array chip (AC) МН2ХА030: a charge-sensitive amplifier (CSA) with an adjustable conversion factor and a base line restorer (BLR) circuit and two types of voltage comparators are considered. The electrical circuits of the units, the measurement results of static…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreA Novel Hybrid Method for Segmentation and Analysis of Brain MRI for Tumor Diagnosis
It is difficult to accurately segment brain MRI in the complex structures of brain tumors, blurred borders, and external variables such as noise. Much research in developing as well as developed countries show that the number of individuals suffering tumor of the brain has died as a result of the inaccurate diagnosis. The proposed article,…
Read MoreLow Carbon Sustainable Building Material: Maximizing Slag Potentials for Improved Lime Mortar Mechanical Properties
Prior to the 19th century discovery of Portland Cement (PC), Lime Based Mortar remained popular due to its flexibility, permeability and more importantly, associated low carbon emissions. However, lime’s characteristic delayed setting/hardening time, low mechanical strength, poor internal cohesion and some volumetric changes have overshadowed significance of its outstanding features particularly, flexibility, and consequently put…
Read MoreActigraph Analysis of Elderly Dementia Patients During Phototherapy Using Non-Linear Analysis
Dementia is one of the three primary diseases that increases the level of nursing care required for the elderly. Dementia can lead to an increased burden not only on those who have contracted it, but also their families and the surrounding environment; initiatives for preventing dementia and slowing the decline of cognitive function are expected…
Read MoreSecuring Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model
In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…
Read MoreMinimizing the Cleaning Cost in Flash Based Storage Sub-Systems by Proliferating the Valid Data Copying Process
Flash memory reliability and the performance have been confirmed as an improvement in the storage subsystem technological advancement, especially in supporting an embedded system solution. Conversely, the main constraint of the storage device is the erase-before-write characteristic in handling both write and re-write I/O operations. More attention must be taken into consideration to handle both…
Read MoreAlternative Braking Method for Small Scaled-Wind Turbines Connected DC Green House with Analogical Experiment on Blade Destruction
To supply a stable and efficient electricity, small-scaled wind turbine’s brake system plays an immense role in various wind speeds. Small-wind power generation systems are difficult to operate in strong wind region since the turbine could be over-rotated and damaged if the brake system is not robust enough to maintain a stable angular velocity. Most…
Read MoreThe Usability Evaluation of Academic Progress Information System (SIsKA-NG)
Limited functionalities of the Academic Progress Information System (SIsKA) has direct consequences on the quality of thesis management service at the authors’ magister study program of the authors’ university. This research focused on the significant improvement from the previous User Experience Questionnaire (UEQ) result of SIsKA. That significant improvement was based on the recommendations from…
Read MoreHybrid Autogyro: Model and Longitudinal Control for Wind Gust Energy Conversion Using Autorotation
In the new technologies for producing electricity from wind gusts, a new class of wind power converter has been proposed. The hybrid autogyro uses the principle of autorotation to generate lift. This paper proposes to take advantage of this rotation to also generate energy. There are systems that use flying wings or airplanes to reach…
Read MoreIn-Plane Shear Behavior of Unreinforced Masonry Walls Strengthened with Fiber Reinforced Polymer Composites
Unreinforced masonry (URM) wall is one of the oldest types of walls used around the world. During earthquakes, URM walls present a real danger to life safety due to their behavior characterized by a brittle failure caused by their feeble shear resistance to in-plane loads, which make their strengthening necessary. Numerous studies had been used…
Read MoreOptimization of Low Temperature Differential Stirling Engine Regenerator Design
Stirling engines working with relatively low temperature are attractive for the future, especially for applications like water pumping without concentration system and low temperature heat recovery. The present work is the continuation of a series of works on the optimization of this type of machines. The main objective of this paper is to investigate the…
Read MoreA Psychovisual Optimization of Wavelet Foveation-Based Image Coding and Quality Assessment Based on Human Quality Criterions
In the present article, we introduce a foveation-based optimized embedded and its optimized version image coders thereafter called VOEFIC/MOEFIC and its related foveation wavelet visible difference predictor FWVDP coding quality metric. It advances a visually advanced foveal weighting mask that regulates the wavelet-based image spectrum before its encoding by the SPIHT encoder. It intends to…
Read MoreHybrid Solar Thermal/Electricity Automated Oven
This paper presents hybrid solar thermal/electricity automated oven. The work compares sliding mode control (SMC) to traditional PID control of the oven system using MATLAB/Simulink 2014b model. SMC control method shows faster rise and settling time. The control technique has been designed to automate change of temperature level of the oven by accepting multiple reference…
Read MoreAn Algorithm to Improve Data Accuracy of PMs Concentration Measured with IoT Devices
Air pollution is responsible for increased morbidity and mortality due to respiratory problems mainly caused by long term exposure. Although the emissions of principal air pollutants are highly regulated, there is a lack of information about the real extent of personal exposure for an accurate health impact assessment. To tackle these challenges, local air pollution…
Read MoreBig Data Analytics Using Deep LSTM Networks: A Case Study for Weather Prediction
Recurrent Neural Networks has been widely used by researchers in the domain of weather prediction. Weather Prediction is forecasting the atmosphere for the future. In this proposed paper, Deep LSTM networks has been implemented which is the variant of RNNs having additional memory block and gates making them capable of remembering long term dependencies. Fifteen…
Read MoreReview on Outliers Identification Methods for Univariate Circular Biological Data
Circular data are common in biological studies which are involved angle and direction measurements. An outlier in circular biological data mostly related to the abnormality of the data set. The existence of outliers may affect the final outcome of a data analysis. Thus, an outliers’ identification method is essential in circular biological data to determine…
Read MoreNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read MoreAttacks Classification and a Novel IDS for Detecting Jamming Attack in WBAN
Wireless Body Area Network (WBAN) aims to monitor patient’s health remotely, by using mini medical sensors that are attached on the human body to collect important data via the wireless network. However, this type of communication is very vulnerable to various types of attacks, poses serious problems to the individual’s life who wears the nodes.…
Read MoreA Regenerative Energy Recovery System for Electric Vehicles Charging A Battery at A Low Speed
In this paper, a regenerative energy recovery system for electric vehicles charging a battery at a low speed is proposed. When a permanent magnet synchronous motor driving the electric vehicles is driven by a generator, the generated voltage is controlled to rise or drop by using the L-C resonance circuit. As the circuit only has…
Read MoreImprovement of the Natural Self-Timed Circuit Tolerance to Short-Term Soft Errors
The paper discusses the features of the implementation and functioning of digital self-timed circuits. They have a naturally high tolerance to short-term single soft errors caused by various factors, such as nuclear particles, radiation, and others. Combinational self-timed circuits using dual-rail coding of signals are naturally immune to 91% of typical soft errors classified in…
Read More
