Results (652)
Search Parameters:
Keyword: ResearchAnalysis of Fuzzy Data for the Selection of Ingredients of the Polymer Composition by Technical Functions in Quality Management
The task of fuzzy mathematical modeling of the composition of a polymer composition is singled out and formulated, as one of the types of chemical-technological systems for creating the theoretical foundations for managing the physicochemical properties of the material produced from this composition. Fuzzy data on the technical functions and concentration of individual ingredients that…
Read MoreDevelopment of Smart Technology for Complex Objects Prediction and Control on the Basis of a Distributed Control System and an Artificial Immune Systems Approach
This paper is an extension of work originally presented in 2018 Global Smart Industry Conference (GloSIC). Researches are devoted to the development of Smart technology for complex objects control and prediction on the basis of a distributed Honeywell DCS control system of the TengizChevroil enterprise using the example of a technological process of medium pressure…
Read MoreFlame Distribution and Attenuation in Narrow Channels Using Mathematical Software
The article of given research presents the mathematical and computer modeling of flame attenuation in narrow channels for different fire extinguishing and explosion suppression compositions. Such kind of flame distribution and attenuation could be considered for different media and channels but in this case it was considered for narrow channels. The effect on the combustion…
Read MoreStress Level Classification Using Heart Rate Variability
The research programme reported in this paper is set within the framework of our research under the theme of ICT support for Active Healthy Ageing (AHA). This longitudinal empirical research is focused on the study of the impact on the management of cardio-vascular disease if supported by sustained health monitoring using wearable connected devices. One…
Read MoreAn Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador
Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…
Read MoreDetection the Places of the Heat Energy Leak on the Underground Thermal Pipelines Using the Computer System
The purpose of this paper is to improve the thermographic method for detection the places of heat energy losses on the urban underground thermal pipelines using the computer system. This goal was achieved by building a heat map of the surveyed heating main with data layering directly on a computer map of the area, which…
Read MoreBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreDistribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field
The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the…
Read MoreEstimation of Software Development Project Success using Fuzzy Logics
To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…
Read MoreEffects of Different Activation Functions for Unsupervised Convolutional LSTM Spatiotemporal Learning
Convolutional LSTMs are widely used for spatiotemporal prediction. We study the effect of using different activation functions for two types of units within convolutional LSTM modules, namely gate units and non-gate units. The research provides guidance for choosing the best activation function to use in convolutional LSTMs for video prediction. Moreover, this paper studies the…
Read MoreA New Model of Supplier’s Selection for Sustainable Supply Chain Management
In the last years, industrial company began to understand the central role that plays sustainable supplier selection (SSS) process for obtaining a sustainable supply chain (SSC). This paper proposes a new multi-criterion decision-making (MCDM) model for managers, which makes it possible to select the best suppliers who respect the sustainable development (SD) concept for a…
Read MoreDesigning IT Blue Print Academic System on Higher Education with Togaf
STIE XYZ is one of the universities of economics that has not been optimal in the use of information technology. IT implementation is applied when there are urgent and sudden needs. So it is not planned carefully according to the development needs of this educational institution. Therefore many patchy applications are created. As the consequence,…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreA Critical Analysis of Topics in Software Architecture and Design
Software architecture and design is an important component in the software engineering field. This aspect of software engineering covers the functional and non-functional requirements of any system being proposed to be developed, while software architecture deals with non-functional requirements, software design entails the functional requirements. The objective of this paper is to critically analyze current…
Read MoreDevelopment & Implementation of Smart Vehicle Over Speeding Detector using IoT
Nowadays over speeding is one of the most common traffic violations. Generally, over speeding is the result of restless and bad behavior of drivers. As the accident rates are increasing it is important to develop and implement a system which can automatically detect and report over speeding to the traffic control authorities as early as…
Read MoreFeature Selection for Musical Genre Classification Using a Genetic Algorithm
Music genre classification is an important multimedia research domain, including aspects of music piece representation, distances between genres, and categorization of music databases. The objective of this study was to develop a model for automatic classification of musical genres from audio data by using features from low-level time and frequency domains. These features can highlight…
Read MoreSentiment Analysis of Regional Head Candidate’s Electability from the National Mass Media Perspective Using the Text Mining Algorithm
Mass media plays an important role in leading public opinion, including in the election of regional head candidates. The tendency of mass media coverage can be used as a parameter to measure the strength of each regional head candidate. To analyze the tendency of media opinion, sentiment analysis is needed. In this study, text mining…
Read MoreA Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models and Business Models
Cloud computing is an exceptional paradigm, which is facilitating the developments and utilization of resources over the internet. Fog computing operates at the edge of the network saving bandwidth, by not sending all information to the cloud, while edge computing does processing of data at the edge of the cloud. Edge computing reduces the distance…
Read MoreDesign of an Additively Manufacturable Multi-Material Light-Weight Gripper with integrated Bellows Actuators
Combining state-of-the-art additive manufacturing technologies with structural optimization has the potential to produce geometrically complex multi-material components with integrated functionalities and desired structural behavior. In this article, the simulation-driven design process of a multi-material light-weight gripper with an integrated pneumatic bellows actuator is described. The design of the bellows structure is based on a previously…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read MoreTalk Show’s Business Intelligence on Television by Using Social Media Data in Indonesia
Knowing how and types of talk shows discussed in social media is significant to all stakeholders in a talk show’s program. There are many messages that can be found in social media that need to be noticed so the messages from the user could reach the viewer. Social media provides promising as well as challenging…
Read MoreExtending the Life of Legacy Robots: MDS-Ach via x-Ach
Our work demonstrates how to use contemporary software tools on older or “legacy” robots while keeping compatibility with the original control, tools, and calibration procedures. This is done by implementing a lightweight middle-ware called MDS-Ach connected directly to the hardware communications layer of the robot’s control system. The MDS-Ach middle-ware, which relies on the x-Ach…
Read MoreA Proposed Architecture for Parallel HPC-based Resource Management System for Big Data Applications
Big data can be considered to be at the forefront of the present and future research activities. The volume of data needing to be processed is growing dramatically in both velocity and variety. In response, many big data technologies have emerged to tackle the challenges of collecting, processing and storing such large-scale datasets. High-performance computing…
Read MoreBuilding an Online Interactive 3D Virtual World for AquaFlux and Epsilon
In today’s technology, 3D presentation is vital in conveying a realist and comprehensive understanding of a specific notion or demonstrating certain functionality for a specific device or tool, especially on the World Wide Web. Therefore, the importance of this field and how its continuous enhancement has become one of the dominant topics in web development…
Read MoreStudy on CD ROADM Contention Blocking
Service providers are transferring their static optical transport networks from semi-permanent connections to agile automatic switched optical networks (ASON) with dynamic optical connection provisioning and restoration. To achieve this goal, service providers are looking for flexible optical network ROADMs with CDC capabilities. Although many contention scenarios during network connection provisioning and restoration have been illustrated,…
Read More
