Results (53)
Search Parameters:
Keyword: MeasuresRecognition of Maximal Lift Capacity using the Polylift
Background: Occupational injuries are an issue of huge significance in the United States. After a work injury, health care providers often utilize functional capacity evaluations to determine readiness of a patient to return to work. However, it can be difficult to determine if a patient is providing maximal “effort” during the evaluation. The aim of…
Read MoreDeterminants of Technological and Innovation Performance of the Nepalese Cellular Telecommunications Industry from the Customers’ Perspective
The study aimed to understand and analyze the technological and innovation performance measures of the Nepalese cellular telecommunications industry from the customers’ perspective. The measures like network service quality, signal strength and coverage, voice quality, and calls drop are used for technological performance, whereas measures like product/service innovation, process innovation, customization, competitive innovation, and marketing…
Read MoreEvaluating the Effectiveness of Query-Document Clustering Using the QDSM Measure
It is well documented that the average length of the queries submitted to Web search engines is rather short, which negatively impacts the engines’ performance, as measured by the precision metric. It is also well known that ambiguous keywords in a query make it hard to identify what exactly search engine users are looking for.…
Read MoreMinimizing Collisions of Self-Driving Cars by a Control System Using Predetermined Two-Dimensional Grid Localization
Most crossroads use a traffic light to communicate between human-driven vehicles by conveying to the drivers when to stop and when to proceed in an organized fashion. However, the stop and wait nature of traffic lights cause slower mobility, leading to congestion. This paper presents a localization scheme based on two-dimensional (2D) flat geometry adaptation…
Read MoreUltra Wide Band-based Control of Emulated Autonomous Vehicles for Collision Avoidance in a Four-Way Intersection
Traditional crossroads use traffic lights, but may cause delays due to its stop and wait process. Moreover, autonomous vehicles are being made, although it is not yet mass-produced. This work presents a design and implementation of an agile system that communicates and coordinates autonomous vehicles entering the intersection by adjusting their speeds and maneuvers to…
Read MoreEvaluating the Impact of Semantic Gaps on Estimating the Similarity using Arabic Wordnet
Knowledge-based approach is wield used in various NLP applications. For example, to evaluate the semantic similarity between words, the semantic evidence in lexical ontologies (wordnets) is commonly used. The success of the English WordNet (EnWN) in this domain has inspired the creation of several wordnets in different languages, including the Arabic WordNet (ArWN). The English…
Read MoreAn Empirical Comparison of Different Two-Factor Models in the Context of Portfolio Optimisation
The crisis linked to the COVID-19 and the uncertainty it generates in the unprecedented health, societal, economic and financial fields have had a strong impact on the stock markets. Indeed, in such a climate of very high uncertainty, it is to be expected that the excessive stock market price movements will continue, with both declines…
Read MoreSupervised Machine Learning Based Medical Diagnosis Support System for Prediction of Patients with Heart Disease
Application in the field of medical development has always been one of the most important research areas. One of these medical applications is the early prediction system for heart diseases especially; coronary artery disease (CAD) also called atherosclerosis. The need for a medical diagnosis support system is to detect atherosclerosis at the earlier stages to…
Read MoreCase Study to Determine the Causes of Fire in Agriculture
The aim of this paper is to identify a critical link in the man – machine – environment system in the case of an adverse event, such as a hay baling fire, based on a comprehensive risk assessment method. The rate of spread of fires in agriculture depends on meteorological conditions, with large areas affected…
Read MoreAn Explanatory Review on Cybersecurity Capability Maturity Models
Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…
Read MorePerformance Analysis of Go-Back-N ARQ Protocol Used in Data Transmission Over Noisy Channels
Automatic Repeat reQuest (ARQ) protocols are used to control transmission errors in data communications. They are used at Data Link Control (DLC) sublayer of Data Link Layer (DLL) of OSI (Open Systems Interconnection) network model to achieve flow and error control and provide smooth and reliable transmission between network nodes. ARQ protocols use acknowledgments and…
Read MoreDegradation Process in Pipeline and Remaining Useful Lifetime Estimation Based on Extended Kalman Filtering
Degradation measurements are often treated and analyzed for improvement the reliability of system. Our objective in this paper is to study a class of non linear systems, whose dynamics and observations are non linear functions of the state. Obviously, we develop an Extended Kalman Filtering (EKF) algorithm for detecting the additive failures in a two…
Read MoreA Framework for Measuring Workforce Agility: Fuzzy Logic Approach Applied in a Moroccan Manufacturing Company
In today’s Moroccan business environment, companies need to implement organization agility by developing an agile workforce that is able to deal with the environment volatility. Thus, the agile workforce concept has been appeared as a necessary and sufficient condition to achieve agility. Focusing on agile enablers influencing workforce agility is an important area but currently…
Read MoreA Comparative Analysis of ARIMA and Feed-Forward Neural Network Prognostic Model for Bull Services
Bull service is the natural copulation by a purebred male carabao with a female counterpart. This is part of the bull loan agenda of the Philippine Carabao Center-Visayas State University (PCC-VSU), one of the 12 regional centers of PCC. For the past years, PCC-VSU used averaging of bull services count of previous years and sometimes…
Read MoreA Comparative Study of Safety Leading and Lagging Indicators Measuring Project Safety Performance
The safety management system is recognized by safety leading and lagging indicators, and their correlation with injury rates. The background on this specific subject is vague in definition, labelling, and indicators measurement. The comparativeness between leading and lagging indicators have been introduced in the constructing safety performance projects evaluation. Safety performance leading indicators are the…
Read MoreSurvey on Semantic Similarity Based on Document Clustering
Clustering is a branch of data mining which involves grouping similar data in a collection known as cluster. Clustering can be used in many fields, one of the important applications is the intelligent text clustering. Text clustering in traditional algorithms was collecting documents based on keyword matching, this means that the documents were clustered without…
Read MoreA Support Vector Machine Cost Function in Simulated Annealing for Network Intrusion Detection
This paper proposes a computationally intelligent algorithm for extracting relevant features from a training set. An optimal subset of features is extracted from training examples of network intrusion datasets. The Support Vector Machine (SVM) algorithm is used as the cost function within the thermal equilibrium loop of the Simulated Annealing (SA) algorithm. The proposed fusion…
Read MoreEducational Domain Management Knowledge Content Identification and Knowledge Updating Method, Based on Enterprise Management Information Interactions
The aim of this paper is to develop the educational domain management knowledge content identification and knowledge updating method, based on formal descriptions of enterprise management information interactions. This is very important because the progress of modern science leads to the emergence of new factual or conceptual knowledge. There is a need for proper methods…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read MoreMachine Learning Applied to GRBAS Voice Quality Assessment
Voice problems are routinely assessed in hospital voice clinics by speech and language therapists (SLTs) who are highly skilled in making audio-perceptual evaluations of voice quality. The evaluations are often presented numerically in the form of five-dimensional ‘GRBAS’ scores. Computerised voice quality assessment may be carried out using digital signal processing (DSP) techniques which process…
Read MoreThe Visualization of Cattle Movement Data in The State of Pará in 2016 Through Networks of Animal Transit Graphs and Guides
Animal movement is inherent in the marketing between the rural productive units, establishing space-time connections between them. The relational nature of such information is kept in the Animal Transit Guides (GTA), a mandatory issuance in Brazil. When evaluating such set of information, this work aimed at characterizing the bovine movement network in the state of…
Read MorePredicting Smoking Status Using Machine Learning Algorithms and Statistical Analysis
Smoking has been proven to negatively affect health in a multitude of ways. As of 2009, smoking has been considered the leading cause of preventable morbidity and mortality in the United States, continuing to plague the country’s overall health. This study aims to investigate the viability and effectiveness of some machine learning algorithms for predicting…
Read MoreReview on security issues in RFID systems
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…
Read MoreA Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System
Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…
Read MoreOn Modeling Affect in Audio with Non-Linear Symbolic Dynamics
The discovery of semantic information from complex signals is a task concerned with connecting humans’ perceptions and/or intentions with the signals content. In the case of audio signals, complex perceptions are appraised in a listener’s mind, that trigger affective responses that may be relevant for well-being and survival. In this paper we are interested in…
Read More
