Results (652)
Search Parameters:
Keyword: ResearchA Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques
Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…
Read MoreFace Recognition on Low Resolution Face Image With TBE-CNN Architecture
Face recognition in low resolution images has challenges in active research because face recognition is usually implemented in high resolution images (HR). In general, research leads to a combination of pre-processing and training models. Therefore, this study aims to classify low-resolution face images using a combination of pre-processing and deep learning. In addition, this study…
Read MoreEvaluation of Mini-Hydro Power for Off Grid Electrification in Rural/Isolated Areas in Africa
Rural electrification and sustainable energy services to the less privileged is à major challenge faced in Nigeria. Off-grid power generation via small hydropower plant would mitigate this challenge. This Paper discusses the awareness and assessment of small hydro power for off-grid electrification in rural/isolated areas in Nigeria. In this research, the method of onsite data…
Read MoreROS Based Multimode Control of Wheeled Robot
This research work mainly presents the design and development of a small-scaled wheeled robot, which can be controlled using multiple controlling interfaces using some new technological trends. Raspberry Pi 3 as the main controller, Python as the programming language integrated with the Robot Operating System (ROS) and Virtual Network Computing (VNC) for screen sharing are…
Read MoreAnalysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador
Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…
Read MoreOn the Use of Triple Graph Grammars for Model Composition
In the software engineering research, several works focus on advantages of multi-modeling, which facilitate modeling a system by separating of concerns. The Model Driven Engineering approach relies on model to design software artefacts during the software development lifecycle. Handling such models involves describing some model management operators like ‘ composition ‘. That is an operation…
Read MoreCommercialization Process of Disruptive Innovations in Corporate Ventures and Spinoff Companies: A Comparison
One of the most critical challenges that large companies, small enterprises and research institutes face, when commercializing their innovations, is the transfer process at the moment of scaling up. These organizations often transfer their innovation to either existing business units or create a new business entirely. The process of transferring innovations to an existing unit…
Read MoreAnalysis of Two-Dimensional Electron Gas Formation in InGaAs-Based HEMTs
In this study, a theoretical simulation was performed using the Schrodinger-Poisson method to elucidate the formation factors for two-dimensional electron gas in InGaAs-based HEMTs. No visible change was observed in the carrier density and the potential shape. The inflection point of the energy level and the agreement of the energy level in each dimension were…
Read MoreStatistical Aspects of the Environment of Albanian Students Who Were Admitted to Higher Public Education Institutions in the Year 2014
The research presents a statistical analysis that characterize the environment of the admitted students to Higher Public Education Institutions, by providing an overview of student’s distribution to the courses of studies offered by universities in Albania, such as, economy, medicine, technical etc., and grouping them according to the relative density of 38 (thirty eight) administrative…
Read MoreOn the Ensemble of Recurrent Neural Network for Air Pollution Forecasting: Issues and Challenges
Time-series is a sequence of observations that are taken sequentially over time. Modelling a system that generates a future value from past observations is considered as time-series forecasting system. Recurrent neural network is a machine learning method that is widely used in the prediction of future values. Due to variant improvements on recurrent neural networks,…
Read MoreInteraction Model and Respect of Rules to Enhance Collaborative Brainstorming Results
This paper presents a collaborative interaction model (CIAO) and several behaviour rules that could enhance brainstorming results. The model is composed of five elements which may be used during brainstorming sessions, consisting of activities performed by partici- pants which are characteristic of different modes of interaction. Some sequences of these interactions may be considered more…
Read MoreObject Classifications by Image Super-Resolution Preprocessing for Convolutional Neural Networks
Blurred small objects produced by cropping, warping, or intrinsically so, are challenging to detect and classify. Therefore, much recent research is focused on feature extraction built on Faster R-CNN and follow-up systems. In particular, RPN, SPP, FPN, SSD, and DSSD are the layered feature extraction methods for multiple object detections and small objects. However, super-resolution…
Read MoreComparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy
Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…
Read MoreThe Usability Evaluation of Academic Progress Information System (SIsKA-NG)
Limited functionalities of the Academic Progress Information System (SIsKA) has direct consequences on the quality of thesis management service at the authors’ magister study program of the authors’ university. This research focused on the significant improvement from the previous User Experience Questionnaire (UEQ) result of SIsKA. That significant improvement was based on the recommendations from…
Read MorePyrolysis of Beech Wood in A Continuous Drop Tube Reactor in Comparison to A Batch Reactor
The goal of this research work is first to investigate the comparison between a batch and a continuous pyrolysis reactor (at 500, 550 and 600 °C) and the eventual differences and similarities that are obtained by analysing the obtained liquid and gas compositions. All the products formed were examined: liquids by GC-MS/FID and Karl Fischer…
Read MoreAuthor Identification for Marathi Language
This is era of new technology; most of information is collected from internet, web sites. Some people uses data from research papers, thesis, and website as it is and publish as their own research without giving proper acknowledgement. This term is known as plagiarism. There are two types of plagiarism detection methods, i) Extrinsic plagiarism…
Read MoreOptimal Flow Analysis of a Unified Energy System with Effects of P2G
The reformation of energy hubs has significantly augmented the apprehensions about the levels of dependency between different energy sources which often can also be discussed as independent systems conventionally. This research brings focus on the formulation and analysis of an integrated system with bi-directional energy conversions and its effects on the stability of the system…
Read MoreA Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment
The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…
Read MoreA Critical Analysis of Usability and Learning Methods on an Augmented Reality Application for Zoology Education
In recent years, research has been conducted focused on the use of technologies in the classroom, but one of the main problems is to demonstrate that the use of this technology favors learning compared to traditional methods. One of these technologies is augmented reality that allows seeing virtual objects superimposed in the real world, but…
Read MoreTerritorial Sales Redesign Using Geotechnical Tools
In recent years there has been technological growth in the field of facility location, considering it as a significant factor to achieve greater competition among companies. The present work gives a methodological solution for a territorial redesign in a Mexican automotive parts distribution company with the support of Geotechnological tools like Geographic Information Systems (GIS)…
Read MoreThe Adventure of BipBop: An Android App Pathfinding Adventure Game
The purpose of this research is to build an android based pathfinding adventure game where user gets information about Indonesian culture, especially the traditional houses including the folk songs and the traditional weapons in certain areas. The method used is by questionnaires, interviews, observation, and literature study. This application also implements the A* algorithm to…
Read MoreThe Effectiveness of Personality-Based Gamification Model for Foreign Vocabulary Online Learning
Currently, there is a growing interest for applying gamification in e-learning due to innovations in technologies and pedagogies. However, motivation and engagement related problems can arise when the gamification elements are not personalized to match the individual’s needs. Therefore, this research proposes a Hybrid Learning Model that combines both Gamification and Personality Traits to increase…
Read MoreA Framework for Plans Permeable Breakwater Eco-Friendly Building Identification and Characteristics Materials Construction Study Case at Demak Village
Demak is located on the north coast of Java, precisely in Central Java Province, Indonesia which has many problems related to erosion and shoreline degradation. This study attempts to analyze, identify, and select the materials to build eco-friendly permeable breakwater in Demak. The research was conducted during 2014, consist of several activities, i.e. identified the…
Read MoreHybrid Solar Thermal/Electricity Automated Oven
This paper presents hybrid solar thermal/electricity automated oven. The work compares sliding mode control (SMC) to traditional PID control of the oven system using MATLAB/Simulink 2014b model. SMC control method shows faster rise and settling time. The control technique has been designed to automate change of temperature level of the oven by accepting multiple reference…
Read MoreThe Implementation of Smart Farming Application Based on the Microcontroller and Automatic Sprinkler Irrigation System of Agricultural Land
This research to applying the application of e-smart farming to control the sprinkler irrigation on agricultural land. This study aims to be able to help farmers to solve the watering problems that are manually carried out into watering done automatically and controlled, besides that this research also obtained data about the level of moisture content…
Read More
