Results (1510)
Search Parameters:
Keyword: CoMPEstimating Subjective Appetite based on Cerebral Blood Flow
This study aims to develop and validate a biological food preference task that simultaneously evaluates biological responses to visual stimuli of various food states and subjective evaluations of foods and to examine how these biological responses are related to food preference behavior. We recruited seventeen healthy male and female subjects to observe changes in cerebral…
Read MoreBirds Images Prediction with Watson Visual Recognition Services from IBM-Cloud and Conventional Neural Network
Bird watchers and people obsessed with raising and taming birds make a kind of motivation about our subject. It consists of the creation of an Android application called ”Birds Images Predictor” which helps users to recognize nearly 210 endemic bird species in the world. The proposed solution compares the performance of the python script, which…
Read MoreNatural Tsunami Wave Amplitude Reduction by Straits – Seto Inland Sea
Seto Inland Sea is situated between Japanese islands Honshu, Kyushu, and Shikoku. It is separated from the ocean by the Bungo Channel, Kii Channel, and other narrow straits around Shikoku Island. The objective of the article is to draw the attention to the question of how well the coastal population and infrastructure of those locations…
Read MoreProcess Mining in Healthcare: A Systematic Literature Review and A Case Study
Process mining is an innovative technique through which inefficiencies in production systems can be eliminated. This technique has therefore become very important internationally in recent years and is also useful for pursuing the improvement of production systems by extrapolating process knowledge from event logs recorded by information systems. Process mining has easy application in production…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreExtended Buffer-referred Prefetching to Leverage Prefetch Coverage
This paper is an extension of the work originally presented in the 26th International Con- ference on Automation and Computing. This study regarding hardware prefetching aims at concealing cache misses, leading to maximizing the performance of modern processors. This paper leverages prefetch coverage improvement as a way to achieve the goal. Original work proposes two…
Read MoreRedesign and Improvement in the Management of the Raw Material Inventory Control Process with Oracle APEX
Having reasonable inventory control is a priority for any company because a lack of inventory could incur economic losses. Not having the necessary stock for the timely production of your orders could generate dissatisfaction in your customers and possibly cause them to lose them. Likewise, reasonable inventory control allows quick decision-making for the company’s benefit.…
Read MoreBangla Speech Emotion Detection using Machine Learning Ensemble Methods
Emotion is the most important component of being human, and very essential for everyday activities, such as the interaction between people, decision making, and learning. In order to adapt to the COVID-19 pandemic situation, most of the academic institutions relied on online video conferencing platforms to continue educational activities. Due to low bandwidth in many…
Read MoreField Oriented Control and Commutation Based on Sensorless Methods for High-Speed Electrical Motors of Unmanned Multicopters
In recent years, unmanned aerial vehicles (UAVs), especially small and light multicopters driven by electrical motors and batteries, have experienced a boom in applications. The electrical drive system is a central component of these UAVs. This paper introduces the basics of these drives and presents control methods for them using permanent magnet synchronous motors (PMSMs).…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreAdvantages of 3D Technology in Stereometry Training
This paper presents a new software for stereometry training. Its name is StereoMV (Stereo Math Vision). It is results from a dissertation work on the topic “Stereoscopic Training System”. It introduces virtual reality systems that are both immersive and non-immersive. The difference between them is in the equipment and the stereo effect they offer. A…
Read MoreRegular Tessellation-Based Collective Movement for a Robot Swarm with Varying Densities, Scales, and Shapes
In complex swarm robotic applications that perform different tasks such as transportation and observation, robot swarms should construct and maintain a formation to adapt and move as a single large-scale robot. For example, transportation and observation tasks require unique robot swarms with either high densities to support the weight of the transported objects or low…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read MoreHybrid Neural Network Method for Predicting the SOH and RUL of Lithium-Ion Batteries
The use of a battery to power an electrical or electronic system is accompanied by battery management, i.e. a set of measures intended to preserve it for preventative maintenance, thus the cost reduction. This management is generally based on two key parameters, the (remaining useful life) RUL and the (State-of-health) SOH, which relate respectively to…
Read MoreAssociation Rules for Knowledge Discovery From E-News Articles: A Review of Apriori and FP-Growth Algorithms
Owing to technological development, the internet has become the world’s largest platform where an unaccountable amount of e-news information is freely available to use. Most of the time, e-newspaper readers have to examine the massive collection of e-news articles to locate necessary information relevant to them. Massive semi-structured and unstructured texts usually mislead the readers…
Read MoreBlockchain Applications in Suning and PingAn
The emergence of blockchain technology has facilitated the digital transformation of many businesses and thereby increased the competitiveness of China in the global market. As a cutting-edge technology, Blockchain has significantly influenced the practices across all business sectors. Focusing on the retail and insurance sectors, this paper analyzes the blockchain technology applications in two companies…
Read MoreDetection of Event-Related Potential Artifacts of Oddball Paradigm by Unsupervised Machine Learning Algorithm
Electroencephalography (EEG) is one of the most common and benign methods for analyzing and identifying abnormalities in the human brain. EEG is an incessant measure of the activities of the human brain. In contrast, when the measurement of EEG is bounded by time and the EEG is synchronized to an exterior stimulus, is known as…
Read MoreModel Order Reduction and Distribution for Efficient State Estimation in Sensor and Actuator Networks
We present in this contribution the distribution of a global multi-input-multi-output system in a sensor and actuator network. Based on controllability and observability, the global system is decentralized and the system properties are preserved as a result. This results in multiple decentralized local single-input-single-output systems with the same system order as the global system. As…
Read MoreAutomatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking
In recent years, people-counting problems have increased in popularity, especially in crowded indoor spaces, e.g., public transport. In peak hours, trains move significant numbers of passengers, producing delays and inconveniences for their users. Therefore, analysing how people use public transport is essential to solving this problem. The current analysis estimates how many people are inside…
Read MoreA DC Grid-Connected PV Microgrid Regulated via Digital and MBPC Cascade Control Strategies
The current paper focuses on the design of cascade control systems employed in photovoltaic (PV) powered microgrids (MG), which have been well received in remote agricultural farms in Ecuador. The study case is composed of a three-phase inverter powered by a DC-DC converter fed by a PV array and its control system. To simulate the…
Read MoreDEM models Calibration and Application to Simulate the Phosphate Ore Clogging
In different areas of industry (mining, food processing, pharmaceutical, manufacturing…), the problem of grain, aggregate and clusters flow arises during the handling activities especially loading and unloading. Thus, the study and control of the parameters that govern the flow of the granular medium and its interaction with its environment are key parameters to achieve the…
Read MoreFrequency Oscillation Suppression of Interlinked Solar PV-Thermal Power System using HVDC Link
This paper looks for the merging of solar PV power plant with thermal power generation and interlinked through tie-lines approaching into an interlinked PV-Thermal model for the design and analysis of load frequency controllers. Moreover, the different models of controllers are also proposed and tested to regulate the frequency of PV-Thermal interlinked system for a…
Read MoreSensitive Analysis in Holding and Penalty Costs for the Stochastic Sequencing Problem in Agile Manufacturing
In agile manufacturing, due to the desire to meet customer’s requirements, processing times are stochastic because operations could be done by robots or humans. This can cause several problems in scheduling the jobs, and it is necessary to select the dispatch rule with the least change in costs and times, to respond quickly to different…
Read MoreA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read More
