Results (486)
Search Parameters:
Keyword: ImplementPluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read MoreDesign of Cognitive Radio Database using Terrain Maps and Validated Propagation Models
Cognitive Radio (CR) encompasses a number of technologies which enable adaptive self-programing of systems at different levels to provide more effective use of the increasingly congested radio spectrum. CRs have potential to use spectrum allocated to TV services, which is not used by the primary user (TV), without causing disruptive interference to licensed users by…
Read More1-D Wavelet Signal Analysis of the Actuators Nonlinearities Impact on the Healthy Control Systems Performance
The objective of this paper is to investigate the use of the 1-D wavelet analysis to extract several patterns from signals data sets collected from healthy and faulty input-output signals of control systems as a preliminary step in real-time implementation of fault detection diagnosis and isolation strategies. The 1-D wavelet analysis proved that is an…
Read MoreSoft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems
The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…
Read MoreCOTS – Harsh Condition Effects Considerations from Technology to User Level
Radiation hardened devices are mostly extremely expensive. The continuously downscaling of microelectronic structures and the unavoidable presence of particle radiation on ground and in space leads to unwanted failures in electronic devices. Furthermore it is expected that in the next few years around 8000 new satellites will be launched around the world. Due to the…
Read MoreA Reliable, Non-Invasive Approach to Data Center Monitoring and Management
Recent standards, legislation, and best practices point to data center infrastructure management systems to control and monitor data center performance. This work presents an innovative approach to address some of the challenges that currently hinder data center management. It explains how monitoring and management systems should be envisioned and implemented. Key parameters associated with data…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MoreEmbedded C Programming Using FRDM to Enhance Engineering Students’ Learning Skill
Computer programming course that utilizes languages such as C/C++ is always packed with dreary syntax details that consume most of the students’ learning time to obtain ‘grammatically’ correct source code. Consequently, it is difficult for most of the students to apply the theory they have learned in a real life context. Thus, this project proposed…
Read MoreUse of machine learning techniques in the prediction of credit recovery
This paper is an extended version of the paper originally presented at the International Conference on Machine Learning and Applications (ICMLA 2016), which proposes the construction of classifiers, based on the application of machine learning techniques, to identify defaulting clients with credit recovery potential. The study was carried out in 3 segments of a Bank’s…
Read MoreTwo-axis Gimbal with Passive Revolute Joints for Motion Isolation of a Stabilizing Mechanism
Energy efficiency is a salient design consideration for stabilization mechanisms when assembled on a battery-powered vehicle. In this paper we study the implementation of a two-axis gimbal with passive revolute joints for motion isolation of an inertially stabilized platform (ISP) mounted on a host vehicle. The objective is for the ISP to maintain a steady…
Read MoreCompact wireless control network protocol with fast path switching
Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER), such as wireless control networks, often adopt time division multiple access (TDMA). However, it is difficult to add or adjust functions in protocol stacks that use TDMA…
Read MoreA Secure Communication Framework for ECUs
Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…
Read MoreClassification of patient by analyzing EEG signal using DWT and least square support vector machine
Epilepsy is a neurological disorder which is most widespread in human beings after stroke. Approximately 70% of epilepsy cases can be cured if diagnosed and medicated properly. Electro-encephalogram (EEG) signals are recording of brain electrical activity that provides insight information and understanding of the mechanisms inside the brain. Since epileptic seizures occur erratically, it is…
Read MoreRecognition and Position Estimation for Multiple Labware Transportation Using Kinect V2 and Mobile Robots
Mobile robots can be used to perform transportation tasks for different objects. These tasks have to be implemented carefully. Therefore, an accurate approach for object recognition and position estimation is required. This work presents a concept for identification and position estimation of multiple labware. These labware, which contain chemical and biological components, have to be…
Read MoreIoT: Their Conveniences, Security Challenges and Possible Solutions
The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…
Read MoreFault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task
Multiprocessor Systems-on-Chip (MPSoC) allow the implementation of heterogeneous architectures with a high integration capacity. In recent years, computational requirements MPSoC are increasing exponentially. This complexity, coupled with constantly evolving specifications, has forced designers to consider intrinsically flexible implementations. Deploying applications typical of multimedia domains is difficult, not only due to the heterogeneous parallelism in the…
Read MorePrecision Statistical Analysis of Images Based on Brightness Distribution
Study the content of images is considered an important topic in which reasonable and accurate analysis of images are generated. Recently image analysis becomes a vital field because of huge number of images transferred via transmission media in our daily life. These crowded media with images lead to highlight in research area of image analysis.…
Read MoreCognitive Artificial Intelligence Method for Interpreting Transformer Condition Based on Maintenance Data
A3S(Arwin-Adang-Aciek-Sembiring) is a method of information fusion at a single observation and OMA3S(Observation Multi-time A3S) is a method of information fusion for time-series data. This paper proposes OMA3S-based Cognitive Artificial-Intelligence method for interpreting Transformer Condition, which is calculated based on maintenance data from Indonesia National Electric Company (PLN). First, the proposed method is tested using…
Read MoreA Novel Ultra High Speed and Configurable Discrete Wavelet Packet Transform Architecture
This work is dedicated to present a new pipeline-parallel architecture of Discrete Wavelet Packet Transform (DWPT) for all wavelet family implemented in FPGA technology. The main target of our architecture is to provide an effective performance trade-off, where it significantly increases the throughput with a restricted amount of hardware. In this article, we propose two…
Read MoreSpace Time – Track Circuits with Trellis Code Modulation
The track circuits are very important equipments used in the railway transportation system. Today these are used to send vital information, to the running train, in the same time with the integrity checking of the rail. The actual track circuits have a small problem due to the use of the same transmission medium by the…
Read More3D Senor-based Library Navigation System
The discussed system in this paper uses the Kinect’s 3D input (acquired through IR projector and Camera) to detect gestures and then based on these gestures perform certain tasks, and display certain results on an output screen. The programming language used here is the Processing open source software and a database was implemented to manage…
Read MoreGraphics on demand: the automatic data visualization on the WEB
Data visualization is an effective tool for communicating the results of opinion surveys, epidemiological studies, statistics on consumer habits, etc. The graphical representation of data usually assists human information processing by reducing demands on attention, working memory, and long-term memory. It allows, among other things, a faster reading of the information (by acting on the…
Read MoreFeatures based approach for indexation and representation of unstructured Arabic documents
The increase of textual information published in Arabic language on the internet, public libraries and administrations requires implementing effective techniques for the extraction of relevant information contained in large corpus of texts. The purpose of indexing is to create a document representation that easily find and identify the relevant information in a set of documents.…
Read MorePerformance Evaluation of Associative Classifiers in Perspective of Discretization Methods
Discretization is the process of converting numerical values into categorical values. Contemporary literature study reveals that there are many techniques available for numerical data discretization. The performance of classification method is dependent on the exploitation of the data discretizing method. In this article, we investigate the effect of discretization methods on the performance of associative…
Read MoreNetwork Intrusion Detection System using Apache Storm
Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various…
Read More
