Results (578)
Search Parameters:
Keyword: ApplicationSmart Ambulance: Speed Clearance in the Internet of Things paradigm using Voice Chat
In recent years, researchers have focused on the development of many applications of information and communication which could lead to enhance human life. The congestion and road traffic are one of the most problems facing the ambulance transportation to provide fast healthcare services for patients. In this work, a tracking and data transfer system has…
Read MoreIntegration of Third-Party Routing Stack to NetScaler CPX
The Citrix NetScaler CPX, is one of the many Application Delivery Controllers (ADCs), which is used mainly for load balancing between the application servers in a datacenter network. ADCs are typically placed in the demilitarized zone in an organization’s network, handling the connectivity of the external clients to the organization’s servers. While performing load balancing…
Read MoreDiscriminant Analysis of Diminished Attentiveness State Due to Mental Fatigue by Using P300
Fatigue is broadly divided into two types depending on the content of a task: physical fatigue and mental fatigue. Mental fatigue is associated with human error. It is thus important to search for indicators that can easily evaluate mental fatigue. The aim of this study is to construct a system that can evaluate mental fatigue…
Read MoreIntelligent Wireless System for PV Supervision Based on The Raspberry Pi
Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…
Read MoreEKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection
Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…
Read MoreA Modular Multipurpose, Parameter Centered Electronic Health Record Architecture
Health Information Technology is playing a key role in healthcare. Specifically, the use of electronic health records has been found to bring about most significant improvements in healthcare quality, mainly as relates to patient management, healthcare delivery and research support. Health record systems adoption has been promoted in many countries to support efficient, high quality…
Read MorePriority Incorporated Zone Based Distributed Clustering Algorithm for Heterogeneous Wireless Sensor Network
Wireless sensor networks (WSNs) are considered to be the currently flourishing scientific domain, thereby found to be applicable in numerous industrial and domestic applications. As per the mathematical results in Pulse-coupled oscillator (PCO), it has been predicted that, numerous iterations are needed for convergence, leading to increased power consumption. Biologically inspired solutions are greatly applicable…
Read MoreAn Integrated Framework for Pronominal Anaphora Resolution in Malayalam
Anaphora resolution is one of the old problems in Natural Language Processing. It is the process of identifying the antecedent of an anaphoric expression in a natural language text. Most of the NLP applications such as text summarization, question answering, information extraction, machine translation etc. require the successful resolution of anaphors. In this paper, we…
Read MoreSentiment Analysis of Transjakarta Based on Twitter using Convolutional Neural Network
TransJakarta is one of the methods to reduce congestion in Jakarta. However, the number of TransJakarta users compared to number of private vehicle users is very small, only 24% of the total population in Jakarta. The purpose of this research is to know public opinions about TransJakarta whether positive or negative by doing sentiment analysis…
Read MoreFuzzy Simulation of Historical Associative Thesaurus
Research is dedicated to fuzzy reconstructions in the diachronic associative linguistics, and encompasses several simulation practices. The principles of an associative memory model and fuzzy computing with words are adopted in the working methodology. The evolved mathematical model reanimates the older patterns of Scottish associative map by means of fuzzy logic. The compiled fuzzy associative…
Read MoreImprovement opportunities of a Simulation/Expert System Approach for Manufacturing System Sizing: A review and proposal
Manufacturing System (MS) sizing is a crucial task to complete in order to obtain the desired MS performance and efficiency. It involves selecting the required number of resources from each used type in a given planning horizon. In fact, different approaches coupling simulation/optimization tools have been developed to solve this issue and evaluate the MS…
Read MorePrediction of Non-Communicable Diseases Using Class Comparison Data Mining
Data mining is recognized as an effective technique for extracting and retrieving valuable information or decision from the vast available data. Because of the nature of the functionality of medical centers and hospitals, their data centers contain a collection of valuable information about their patients. By properly processing these data, different applications can be developed…
Read MoreSurvey on Semantic Similarity Based on Document Clustering
Clustering is a branch of data mining which involves grouping similar data in a collection known as cluster. Clustering can be used in many fields, one of the important applications is the intelligent text clustering. Text clustering in traditional algorithms was collecting documents based on keyword matching, this means that the documents were clustered without…
Read MoreLogic Error Detection System based on Structure Pattern and Error Degree
The importance of programming skills has increased with advances in information and communication technology (ICT). However, the difficulty of learning programming is a major problem for novices. Therefore, we propose a logic error detection algorithm based on structure patterns, which are an index of similarity based on abstract syntax trees, and error degree, which is…
Read MoreMultiple-Optimization based-design of RF Integrated Inductors
In this paper, a multiple-objective Metaheuristics study is discussed. Initially, three mono-objective metaheuristics will be explored in order to design and optimize Radio-Frequency integrated inductors. These metaheuristics are: An evolutionary algorithm called The Differential Evolution (DE), An algorithm supported on Newton’s laws of gravity and motion called the Gravitational Search Algorithm (GSA) and, finally, A…
Read MoreA Lightweight, Hardware-Based Support for Isolation in Mixed-Criticality Network-on-Chip Architectures
Spatial and temporal isolation is a crucial issue in embedded systems executing multiple tasks with several levels of criticality. This is considerably significant in the context of multi-processor (or multi-core) embedded systems running multiple mixed-criticality applications in parallel. This work deals with the issue of isolation of different application classes on Network on Chip (NoC)…
Read MoreMaterial, Structural Optimization and Analysis of Visible-Range Back-Illuminated OPFET photodetector
High gain-bandwidth product and visible/UV contrast photodetectors are vital in Visible Light Communication (VLC) and Ultraviolet (UV) reflectance imaging applications respectively. We adopt material and structural optimization to perceive such photodetectors with back-illuminated Optical Field Effect Transistor (OPFET) wherein any potential difference in absorption coefficient of the semiconductor material between the visible and the UV…
Read MoreConceptual Architecture for the Continuity if Workflow in Activities on Multi-Devices: Case Study Co-Kitchen
Nowadays, the realization and follow-up of a team activity takes place in different execution environments (e.g. mobile phone, PC) through the use of computer applications. This implies context changes that generate interruptions in the activity. To improve the continuity of an activity with the reduction of interruptions during the development of this activity, would help…
Read MoreA Fuzzy-Based Approach and Adaptive Genetic Algorithm in Multi-Criteria Recommender Systems
Recommender Systems (RSs) are termed as web-based applications that make use of filtering methods and several machine learning algorithms to suggest relevant user objects. It can be said that some techniques are usually adopted or trained to develop these systems that generate lists of suitable recommendations. Conventionally, RS uses a single rating approach to preference…
Read MoreSupporting Better Physical Activity in a Smart City: a Framework for Suggesting and Supervising Walking Paths
The increase of elderly population creates the need to promote healthy aging, with autonomy and independence, for preserving the functional capacity and quality of life as much as possible. To achieve this goal the recommendations include walking a certain amount of steps daily, given that the exact amount of steps changes with age, lesions, and…
Read MoreEvent Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network
With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…
Read MoreAn Enhanced Fuzzy Clustering with Cluster Density Immunity
Clustering is one of the well-known unsupervised learning methods that groups data into homogeneous clusters, and has been successfully used in various applications. Fuzzy C-Means(FCM) is one of the representative methods in fuzzy clustering. In FCM, however, cluster centers tend leaning to high density area because the sum of Euclidean distances in FCM forces high…
Read MoreModel-Driven Engineering Infrastructure and Tool Support for Petrochemical Industry Automation
The definition of equipment and components of physical plants is a necessary step towards the development of simulation, control, and supervisory applications for the petrochemical industry. Often it happens that the same plant/equipment is (re)modeled on each application, causing a waste-oftime on repetitive (re)design, besides introducing potential inconsistencies between the models. Moreover, even though each…
Read MorePermutation Methods for Chow Test Analysis an Alternative for Detecting Structural Break in Linear Models
This study examined the performance of two proposed permutation methods for Chow test analysis and the Milek permutation method for testing structural break in linear models. The proposed permutation methods are: (1) permute object of dependent variable and (2) permute object of the predicted dependent variable. Simulation from gamma distribution and standard normal distribution were…
Read MoreProposal of Ledger Technology to Apply to a Public Organization in Ecuador
Ledger technology has now changed financial systems around the world, applying this technology to the improvement of the public sector, mainly to the debt collection system, we improve the speed of payment and its immediate registration, we make use of the advantages of Ledger technology with respect to reliability, security and speed. The objective is…
Read More
