Results (1076)
Search Parameters:
Keyword: HANRecent Impediments in Deploying IPv6
Internet Protocol version 6 is being adopted on slow pace and it is taking a long time. This paper intends to discuss the transition process between IPv4 and IPv6 and the major obstacles that prevent deploying IPv6 worldwide. It presents the IPv4 exhaustion reports results and where are the IPv4 address pool. Then it presents…
Read MoreChaos-Based Image Encryption Using Arnold’s Cat Map Confusion and Henon Map Diffusion
This research designed an image encryption system that focused on securing teledermatology data in the form of skin disease images. The encryption and decryption process of this system is done on the client side using chaos-based encryption with confusion and diffusion techniques. Arnold’s cat map is the chaotic map model used for confusion, while the…
Read MoreOptimizing the Wind Farm Layout for Minimizing the Wake Losses
The development of wind farms requires an optimal design of wind turbines layout. The main goal of this optimization is to minimize the wake effect through the optimal placement of the wind turbines. The current study aims to standardize the wake losses among all wind turbines in the wind farm and bringing their losses to…
Read MoreRanking the Most Important Attributes of using Google Classroom in online teaching for Albanian Universities: A Fuzzy AHP Method with Triangular Fuzzy Numbers and Trapezoidal Fuzzy Numbers
This paper has conducted the study of the impact and effectiveness of Google Classroom in online teaching and learning. Based on the unified theory of acceptance and use of technology (UTAUT2), the first aim was to rank the 8 constructs namely: Performance Expectancy, Effort Expectancy, Social Influence, Facilitating Conditions, Hedonic Motivation, Habit, Behavioral Intention, and…
Read MoreGeneralized Integral Transform Method for Bending and Buckling Analysis of Rectangular Thin Plate with Two Opposite Edges Simply Supported and Other Edges Clamped
This paper presents the generalized integral transform method for solving flexural and elastic stability problems of rectangular thin plates clamped along and simply supported along remaining boundaries (x = 0, x = a) (CSCS plate). The considered plate is homogeneous, isotropic and carrying uniformly distributed transversely applied loading causing bending. Also studied, is a plate…
Read MoreSimulation of Pulse Width Modulation DC-DC Converters Through Symbolic Analysis Techniques
The problem of Pulse Width Modulated (PWM) DC-DC converter simulation is faced in this paper. It is shown how the analysis of this kind of circuits, nonlinear and switching for their nature, can be easily and quickly executed by using symbolic analysis techniques. The paper also presents the program SapWinPE, which performs an automatic symbolic…
Read MoreTrend Analysis of NO\(_X\) and SO\(_2\) Emissions in Indonesia from the Period of 1990 -2015 using Data Analysis Tool
NOX and SO2 gas pollution have a direct impact on health problems and environmental damage. Therefore, to map the emission patterns and predict the resulting impacts, complete data and information on emissions of the two pollutants are needed. In Indonesia, data on NOX and SO2 emissions that are recorded over a long period of time…
Read MoreIndoor Positioning System using WKNN and LSTM Combined via Ensemble Learning
Indoor positioning system (IPS) has become a high demand research field to be developed and has made considerable progress in recent years. Wi-Fi fingerprinting is the most promising technique that produces an acceptable result. However, despite the large amount of research that has been done using Wi-Fi fingerprinting, only a few Wi-Fi based IPS in…
Read MoreQoE-aware Bandwidth Allocation for Multiple Video Streaming Players over HTTP and SDN
For many years, the most popular technique for Internet video streaming is hypertext transfer protocol-based adaptive streaming, known as HAS (HTTP Adaptive Streaming). However, a seamless viewing experience can not be just simply guaranteed by HAS only. In the management network, the adaptation of HAS copes with a huge challenge since client- driven schemes lead…
Read MorePredicting Student Academic Performance Using Data Mining Techniques
There is a crisis in basic education during this pandemic which affected everyone worldwide, we see that teaching and learning have gone online which has effected student performance. Student’s academic performance needs to be predicted to help an instructor identify struggling students more easily and giving teachers a proactive chance to come up with supplementary…
Read MoreApplications of TCAD Simulation Software for Fabrication and study of Process Variation Effects on Threshold Voltage in 180nm Floating-Gate Device
In this work, a study of the process variation effects on the threshold voltage of a floating- gate device is proposed. The study demonstrates the sensitivity of the threshold voltage to five geometrical parameters including gate length, gate width, tunneling gate oxide thickness, bottom oxide-nitride-oxide oxide thickness, and nitride spacer thickness. This paper also proposed…
Read MoreBalancing Exploration-Exploitation in the Set Covering Problem Resolution with a Self-adaptive Intelligent Water Drops Algorithm
The objective of the metaheuristics, together with obtaining quality results in reasonable time, is to be able to control the exploration and exploitation balance within the iterative processes of these methodologies. Large combinatorial problems present ample search space, so Metaheuristics must efficiently explore this space; and exploits looking in the vicinity of good solutions previously…
Read MoreDownlink Indoor Coverage Performance of Unmanned Aerial Vehicle LTE Base Stations
In this study, we study on the downlink indoor coverage performance of unmanned air vehicle (UAV) base stations. We consider a probabilistic expression for air-to-ground (ATG) path loss, and a deterministic one for additional indoor losses in order to provide a practical model. One of our important assumptions is that the UAV base station operates…
Read MoreModified Blockchain based Hardware Paradigm for Data Provenance in Academia
Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…
Read MoreSensitivity Analysis of Data Normalization Techniques in Social Assistance Program Decision Making for Online Learning
Data sensitivity analysis using normalization techniques in decision making has an impact on preference values and rankings in the case of social assistance programs for student online. The distribution of assistance is disproportionate and not on target to potential recipients. This study aims to analyze data sensitivity from simple data normalization techniques and linear techniques…
Read MoreSynthesis and Characterization of Graphene Oxide Under Different Conditions, and a Preliminary Study on its Efficacy to Adsorb Cu\(^{2+}\)
Graphene oxide (GO) was prepared by the modified Hummer’s method, but the mass ratio of graphite to sodium nitrate (NaNO3) was varied from 2:1, 1:1, and 1:2. The primary reason for the variation was to determine the optimum conditions that would afford more oxygen functional groups to improve the material for application in adsorption. The…
Read MoreThe Designing of Institute’s Educational Mascots for Brand Identity
The purpose of this study is to show how to design the character used as the symbol or Mascot of the educational institution and how to apply the design results into advertising and Brand identity design such as printing art, poster, digital media, toy, and souvenir. In this study, the ideas of mascot design have…
Read MoreAn Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware
Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…
Read MoreNew Properties of Crimes in Virtual Environments
Virtual reality is a technology that literally allows constructing of a new reality for its users. VR has huge potential, it is able to change social life, communications, and the academic sphere, but VR may also be applied by criminals. In the present paper properties of potentially committed crimes in VR are analyzed. It is…
Read MoreDesign of Power Efficient Routing Protocol for Smart Livestock Farm Applications
The demand on livestock as a source of protein is increasing with the dramatic increase of world population which approaches 8 billion. As a result, the monitoring of the performance of livestock breeding is becoming essential. The technique which could increase livestock production and improve the efficiency of operation is digitalization of livestock management .…
Read MoreEfficient and Scalable Ant Colony Optimization based WSN Routing Protocol for IoT
IoT integrates and connects intelligent devices or objects with varied architectures and resources. The number of IoT devices is growing exponentially. Due to the massive wave of IoT objects, their diversity and heterogeneity among their architectures, the existing communication protocols for wireless networks become ineffective in the context of IoT. Wireless Sensor Network (WSN) has…
Read MoreSentiment Analysis in English Texts
The growing popularity of social media sites has generated a massive amount of data that attracted researchers, decision-makers, and companies to investigate people’s opinions and thoughts in various fields. Sentiment analysis is considered an emerging topic recently. Decision-makers, companies, and service providers as well-considered sentiment analysis as a valuable tool for improvement. This research paper…
Read MoreJapanese Abstractive Text Summarization using BERT
In this study, we developed and evaluated an automatic abstractive summarization algorithm in Japanese using a neural network. We used a sequence-to-sequence encoder-decoder model for practical purposes. The encoder obtained a feature-based input vector of sentences using the bidirectional encoder representations from transformers (BERT) technique. A transformer-based decoder returned the summary sentence from the output…
Read MoreType 2 Diabetes Risk and Physical Activity in outpatients treated in Health Centers in a District of North Lima, 2020
Diabetes Mellitus Type 2 is a chronic disorder that affects the way the body metabolizes sugar (glucose) in the blood and depends on a combination of risk factors, such as genes and lifestyle. Although certain risk factors such as family history, age, or ethnicity cannot be changed, those related to diet, physical activity, and weight…
Read MoreFPGA-Based Homogeneous and Heterogeneous Digital Quantum Coprocessors
Quantum computers are heterogeneous device. It consists of a main CPU and a quantum accelerator. True quantum accelerator (or coprocessor) is analog and probabilistic device. Qubits are the basic building blocks of quantum computers. But qubits can be digital. A digital qubit is similar to RISC processor pipeline and is an unique chain of digital…
Read More
