Results (185)
Search Parameters:
Keyword: MetricAn enhanced Biometric-based Face Recognition System using Genetic and CRO Algorithms
Face recognition is one of the most well-known biometric methods. It is a technique used for identifying individual from his face. The recognition process takes the face and compares it with the one stored in the database for recognizing it. Many methods were proposed to achieve that. In this paper, a new technique is proposed…
Read MoreAn Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics
Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…
Read MoreMission Profile Analysis of a SiC Hybrid Module for Automotive Traction Inverters and its Experimental Power-loss Validation with Electrical and Calorimetric Methods
This paper investigates the efficiency benefits of replacing the Silicon diodes of a commercial IGBT module for the main inverter application of an electric vehicle with Silicon Carbide diodes, leaving the package, operating conditions and the system unchanged. This ensures that the comparison is directly between the chip technologies without any scope for discrepancies arising…
Read MoreParametric Study of Micro Strip Patch Antenna Using Different Feeding Techniques for Wireless and Medical Applications
Due to the increasing bandwidth requirement of modern wireless communication systems, developing antenna having wider bandwidth have been receiving significant attention in the recent years. In this paper, a comparative analysis of the contacting feed (micro strip line and coaxial probe) and non-contacting feed mechanism (both Aperture Coupling and Proximity Coupling) in micro strip patch…
Read MoreMeasuring modifiability in model driven development using object oriented metrics
Model driven development is an important role in software engineering. It consists of multiple transformation functions. This development is a paradigm for writing and implementing computer program quickly, effectively, at minimum cost and reducing development efforts because it transforms design model to object-oriented code. Our approach is rule-based model driven development in which textual Umple…
Read MoreCyclical contractive conditions in probabilistic metric spaces
The purpose of this paper is to prove a fixed point theorem for a probabilistic k-contraction restricted to two nonempty closed sets of a probabilistic metric spaces, then we prove that these results can be extended to a collection of finite closed sets.
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreAviation Navigation with Use of Polarimetric Technologies
The article deals with the problem of increasing the accuracy of determination of aircraft’s navigation flight parameters. Increasing the accuracy and sensitivity of navigation parameters determination will improve the efficiency of air conveyance by optimizing the flight trajectories and reducing the flight time and simultaneously will ensure the sufficient level of air conveyance safety. The…
Read MoreA Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management
This paper presents a Release Management model to support requirements management. Requirements development and management can be integrated with a release-planning approach to achieve lesser Requirements spillover problems which is an innovative way to capture, control and evolve the user requirements based on integer linear programming.
Read MoreTransmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets
Frequency diverse array (FDA) employs a small frequency increment across its array elements to provide range, angle and time dependent beampattern. In most radar systems, FDA with linear frequency offsets have been employed. But, its transmit beampattern is coupled in range and angle dimensions, which may degrade the output signal-to-interference-plus-noise ratio performance. Note that nonlinear…
Read MoreProposal of a congestion control technique in LAN networks using an econometric model ARIMA
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read MoreHLLSet Theory: A Unified Framework for Probabilistic Knowledge Representation
This paper introduces HLLSet (HyperLogLog Set), a probabilistic data structure that behaves like a set under all standard operations while containing no explicit elements. Unlike traditional HyperLogLog, which only estimates cardinality, HLLSets support full set operations (union, intersection, difference) through enhanced register structures and provide a principled framework for representing semantic relationships. We establish a…
Read MoreSystem-Level Test Case Design for Field Reliability Alignment in Complex Products
Achieving targeted reliability for complex products in real-world field environments remains a persistent challenge, even when laboratory validation suggests high performance. A significant reliability gap often emerges during the initial deployment phase, typically within the first one to five years where field failure rates can be up to twice those predicted in controlled settings. Compounding…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read MoreOptimization of Sheet Material Layout in Industrial Production Using Genetic Algorithms
We address irregular polygon nesting on sheet materials with a lightweight evolutionary framework that operates directly in the layout space. The method formalizes multi-term fitness combining utilization, overlap penalties, spacing regularity, and local alignment, with all components normalized before aggregation. Feasibility is enforced by an AABB– SAT pipeline and validated via analytic ground-truth cases, degenerate…
Read More3D Facial Feature Tracking with Multimodal Depth Fusion
As models based in artificial intelligence increase in sophistication, there is a higher demand for the integration of hardware components to heighten real-world implementations. Both facial feature tracking and shape-from-focus are known techniques in computer vision. However, the combination of these two elements, particularly in a cost-effective configuration, has not been extensively explored. In this…
Read MoreIntegration and Innovation of a Micro-Topic-Pedagogy Teaching Model under the New Engineering Education Paradigm
The rapid evolution of global technologies and industrial restructuring demands innovative pedagogical approaches to foster interdisciplinary engineering expertise. This research pioneers a blended instructional framework anchored in micro-topic pedagogy under the New Engineering Education (NEE) paradigm, orchestrating case studies, heuristic scaffolding, and research-driven inquiry strategies within digitally augmented learning ecosystems. A quasi-experimental study was conducted…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreSolar Photovoltaic Power Output Forecasting using Deep Learning Models: A Case Study of Zagtouli PV Power Plant
Forecasting solar PV power output holds significant importance in the realm of energy management, particularly due to the intermittent nature of solar irradiation. Currently, most forecasting studies employ statistical methods. However, deep learning models have the potential for better forecasting. This study utilises Long Short-Term Memory (LSTM), Gate Recurrent Unit (GRU) and hybrid LSTM-GRU deep…
Read MoreEvaluation of Various Deep Learning Models for Short-Term Solar Forecasting in the Arctic using a Distributed Sensor Network
The solar photovoltaic (PV) power generation industry has experienced substantial, ongoing growth over the past decades as a clean, cost-effective energy source. As electric grids use ever-larger proportions of solar PV, the technology’s inherent variability—primarily due to clouds—poses a challenge to maintaining grid stability. This is especially true for geographically dense, electrically isolated grids common…
Read MoreButon Rock Asphalt Paving Block Innovation using Waste Engine Oil and Recycled Concrete Aggregate
Road surface coating using concrete paving block cement has been used for a long time. As an aggregate binding agent, asphalt can be made into paving blocks. Utilizing waste in the recycling process is an activity to control the sustainability of natural resources. Waste Engine Oil and Recycled Concrete Aggregate can be used as road…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreDesign and Prototyping of a 3DOF Worm-drive Robot Arm
Many designs for robot arms exist. Here we present an affordable revolute arm, capable of executing simple pick-and-place tasks. The arm employs a double parallelogram structure, which ensures its endpoint angle in the plane of the upper arm remains fixed without the need for additional actuation. Its limbs are fabricated from circular tubes made from…
Read MoreMarkov Regime Switching Analysis for COVID-19 Outbreak Situations and their Dynamic Linkages of German Market
This paper deals with the analysis of the dynamic linkage, co-movement between COVID-19 out- break situations and German stock market. Firstly, Markov Regime Switching Analysis(MRSA) is proposed and employed to investigate the situations in the pandemic, as to catch the dynamics of how the daily number of the newly-infected changes, and also to assess the…
Read More
