Results (645)
Search Parameters:
Keyword: eSignSimulation-Optimisation of a Granularity Controlled Consumer Supply Network Using Genetic Algorithms
The decision support systems regarding the Supply Chains (SCs) management services can be significantly improved if an effective viable method is utilised. This paper presents a robust simulation optimisation approach (SOA) for the design and analysis of a granularity controlled and complex system known as Consumer Supply Network (CSN) incorporating uncertain demand and capacity. Minimising…
Read MoreReal Time Eye Tracking and Detection- A Driving Assistance System
Distraction, drowsiness, and fatigue are the main factors of car accidents recently. To solve such problems, an Eye-tracking system based on camera is proposed in this paper. The system detects the driver’s Distraction or sleepiness and gives an alert to the driver as an assistance system. The camera best position is chosen to be on…
Read MoreAdaptation of Electronic Book Publishing Technology by The Publishers in Southeast Nigeria
This paper investigates the electronic book production and distribution practices adopted by the Publishers in Southeast Nigeria because of the global growing interest in writing new book titles in digital form as well as converting paper titles to digital content. To investigate this study, the researcher formulated three research questions to guide the study. A…
Read MoreRobot Self-Detection System
The paper presents design and implementation of a mobile robot, located in an accommodation. As opposed to other known solutions, the presented one is entirely based on standard, cheap and accessible devices and tools. An algorithm for transformation of the 2D coordinates of the robot into 3D coordinates is described. The design and implementation of…
Read MoreUsing Fuzzy PD Controllers for Soft Motions in a Car-like Robot
This paper deals with the control problem for nonholonomic wheeled mobile robots moving on the plane, and in particular, the use of a Fuzzy controller technique for achieving a given motion task which consists of following a rectilinear trajectory until an obstacle occurs on the path. After a background part, in which the fundamental knowledge…
Read MoreA Practical Approach for Extending DSMLs by Composing their Metamodels
Domain specific modeling (DSM) has become popular in the software development field during these last years. It allows to design an application using a domain specific modeling language (DSML) and to generate an end-solution software product directly from models. However providing a new DSML is a complex and costly job. This can be reduced by…
Read MoreAn Empirical Study of Icon Recognition in a Virtual Gallery Interface
This paper reports on an empirical study (an extension of a pilot study) that analyses the design of icons in a German 3-D virtual art gallery interface. It evaluates the extent to which a sample of typical computer users from a range of ages, educational attainments and employments can interpret the meaning of icons from…
Read MoreParallelizing Combinatorial Optimization Heuristics with GPUs
Combinatorial optimization problems are often NP-hard and too complex to be solved within a reasonable time frame by exact methods. Heuristic methods which do not offer a convergence guarantee could obtain some satisfactory resolution for combinatorial optimization problems. However, it is not only very time consuming for Central Processing Units (CPU) but also very difficult…
Read MoreStudent Performance Evaluation Using Data Mining Techniques for Engineering Education
In this research work, we are implementing a student performance evaluation model using Mamdani Fuzzy Inference System (FIS) and Neuro Fuzzy system and comparing the results with classical averaging method for Network Analysis (NA) course studied by third semester Electronics and Communication Engineering students. This work explains the designing of scoring rubrics using Bloom’s levels…
Read MoreClosed Approach of a Decoder Mobile for the 406 Mhz Distress Beacon
This article presents the design and realization of decoder mobile for distress beacon 406 MHz. The use of the sparse Fourier transforms in the processing of distress beacon signals. The characteristics of these decoders are mobility, able to decode all the frequencies of the beacons. It locates with great precision the location of the emitting…
Read MoreiSensA – A System for Collecting and Integrating Sensor Data
The idea of monitoring several types of parameters in various environments has been motivating significant research works in Internet of Things (IoT). This paper presents the design and construction of iSensA, a system for integrating and collecting information from sensors. The solution implements a multi-sensor monitoring system and then expands the monitoring concept to an…
Read Morecv4sensorhub – A Multi-Domain Framework for Semi-Automatic Image Processing
Although there are many research domains with very good software support and workflow automation, there are even more which do not have it: software development is too expensive to create domain specific applications for every research topic. This leaves many domain experts to work for example with general purpose image processing and statistics tools. Many…
Read MoreManagement Tool for the “Nephele” Data Center Communication Agent
Optical switching provided the means for the development of Data Centers with high throughput interconnection networks. A significant contribution to the advanced optical Data Centers designs is the Nephele architecture that employs optical data planes, optical Points of Delivery (PoD) switches and Top of Rack (ToR) switches equipped with 10 Gbps connections to the PoDs…
Read MoreAnalysis Refactoring with Tools
The drive for this report is to inaugurate the innumerable techniques espoused by the refactoring tools in coding development. The software product is a very complex and time-consuming process of development. Difficulty understanding and maintaining poorly designed software systems Software maintenance can take up to 50% of total development costs for software production. As a…
Read MoreSlender Confined Masonry Buildings in High Seismic Areas
This is a study on a confined masonry slender walls building in a high seismic area. The structure also contains frames, but the walls bear most of the gravity and seismic loads. The building will be used as a school. It will be built in Bucharest, Romania. It contains a ground floor and 2 stories…
Read MoreNon-bearing Masonry Walls Behavior and Influence to High Reinforced Concrete Buildings
This is a study on non-bearing masonry walls, in a high, reinforced concrete walls building. It will be built in Bucharest, Romania. This is a high seismic area. The building will be used as a dwelling. The structure is composed of a ground floor and 10 stories above. It is interesting to see the interaction…
Read MoreUsing Nullors to Modify Linear Model Parameters of Transistors in an Analog Circuit
Usually, after properly biasing an analog circuit we need to linearize its transistors in order to linearize the entire circuit for performance analysis and design. This linearization is done through modeling of devices, which is becoming more and more complicated as the electronic technology advances. This is not of course a major issue for circuit…
Read MoreImproved DTC Control Strategy of B12 Inverter Fed BLDC Motor Drives Considering Commutation Torque Dips
In most industrial high-power applications, the brushless DC (BLDC) motor is connected to multi-level inverters specially the three-level NPC inverters (B12). Torque ripple is a critical issue in BLDC motor drives. Accordingly, minimizing the ripple produced in the torque is necessary to enhance the BLDC motor drive performances. This paper aims to develop two direct…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreA Ubiquitous and Configurable Wrist-Worn Sensor Node in Hazardous Gases Detection
The monitoring of environmental parameters is a critical topic in occupational medicine. With advances in technology, during the recent years, the wearable sensors are widely used to evaluate the ambient parameters. In this paper a compact, small, light-weighted, and configurable sensor node in three physical layers for prolonged chemical ambient monitoring is described. The device…
Read MoreDevelopment and Testing of Intelligent Wheelchair Controller for Quadriplegic Patients
In this research paper, the development and evaluating of a smart controller for electrical powered wheelchairs are presented. The controller aimed to assist quadriplegic, paralyzed, and handicap patients who cannot use their hands to drive an electrical wheelchair by using a joystick controller. Two sub control units have been combined in one hybrid system to…
Read MoreAn Experimental Investigation of Reconfigurable UWB Modified Octagonal Microstrip Monopole Patch Antenna with Switchable and Tunable Band-Notched Characteristic
An experimental investigation of reconfigurable ultra-wideband (UWB) modified octagonal microstrip monopole patch antenna with switchable and tunable band-notched characteristic is presented in this paper. Notched-bands are obtained by connecting or disconnecting the open shunt stubs. The switching is achieved by using PIN diodes. Additionally, more notch-bands are created by adding additional stubs to the original…
Read MoreImplementation of a Robot Contest for Distance Education
Robot contests are suitable for bachelor courses to gather hands-on experience in engineering diciplines such as mechanics, electronics and embedded software. After summarizing a concept of a robot contest for distance education (robot sumo) as presented in earlier publications this paper describes the implementation and first results of this concept. The contest is seperated into…
Read MoreSDN-based Network Control Method for Distributed Storage Systems
With the increasing need for effective storage management due to ever-growing content-generation over the Internet, Distributed Storage Systems (DSS) has arisen as a valuable tool. Although DSS has considerably improved in the past years, it still leverages legacy techniques in its networking. To cope with the demanding requirements, Software Defined Networking (SDN) has revolutionized the…
Read MoreVirtual Output Queues Architecture for High Throughput Data Center Nodes
The latest design approach for Data Centers (DCs) follows the direction of exploiting optical switching to connect Top-of-Rack (ToR) switches that serve thousands of data storing and computing devices. A ToR’s usual function is the Virtual Output Queues (VOQs), which is the prevalent solution for the head-of-line blocking problem of the DC switches. An effective…
Read More
