Results (653)
Search Parameters:
Keyword: AnalysisCritical Embedded Systems Development Using Formal Methods and Statistical Reliability Metrics
Trusted systems are becoming more integrated into everyday life. Security and reliability are at the forefront of trusted system design and are often directed at hardware-only solutions, especially for safety critical systems. This is because hardware has a well-established process for achieving strong, precise, and reliable systems. These attributes have been achieved in the area…
Read MoreDevelopment of Application Specific Electronic Nose for Monitoring the Atmospheric Hazards in Confined Space
The presence of atmospheric hazards in confined space can contribute towards atmospheric hazards accidents that threaten the worker safety and industry progress. To avoid this, the environment needs to be observed. The air sample can be monitored using the integration of electronic nose (e-nose) and mobile robot. Current technology to monitor the atmospheric hazards is…
Read MoreSpectral Grid Impedance Identification on the Low-, Medium- and High-Voltage Level – System Design, Realization and Measurement Results of Grid Impedance Measurement Devices
The frequency dependent grid impedance at the terminals of an electrical supply grid is an essential parameter for power quality and grid feedback analysis. In this contribution the identification of the grid impedance is achieved using spectral excitation currents at the corresponding grid connection point, which generate measureable changes in the grid voltage spectra. Different…
Read MoreOmni-directional Dual-Band Patch Antenna for the LMDS and WiGig Wireless Applications
In this paper an omnidirectional dual band monopole antenna at 28 GHz and 60 GHz which is fit for indoor and outdoor wireless applications is developed. The proposed antenna consists of two rectangular patches with a T folded patch. The design, analysis, and optimization processes through this article are executed by the numerical method, Finite…
Read MorePerfect Molding Challenges and The Limitations “A Case Study”
Driven by today’s market demand, semiconductor is pushing towards the zero-defect direction. The improvement demanded in semiconductor manufacturing is becoming increasingly challenging. In this paper, common molding defects comprise of voids, incomplete fills, and piping holes are studied systematically, focusing on three key areas: 1) Potential mold flow weakness; 2) Molding temperature stability; as well…
Read MoreSimulation-Optimisation of a Granularity Controlled Consumer Supply Network Using Genetic Algorithms
The decision support systems regarding the Supply Chains (SCs) management services can be significantly improved if an effective viable method is utilised. This paper presents a robust simulation optimisation approach (SOA) for the design and analysis of a granularity controlled and complex system known as Consumer Supply Network (CSN) incorporating uncertain demand and capacity. Minimising…
Read MoreAn Integrated & Secure System for Wearable Devices
Health services are under increasing pressure to reduce large waiting times for appointments. The delayed diagnosis of a human illnesses could have profound consequences for the patient. The large waiting times may be attributed to lack of data, the accuracy of the data or the timeliness of the availability of the data. In addition to…
Read MoreModeling an Energy Consumption System with Partial-Value Data Associations
Many existing system modeling techniques based on statistical modeling, data mining and machine learning have a shortcoming of building variable relations for the full ranges of variable values using one model, although certain variable relations may hold for only some but not all variable values. This shortcoming is overcome by the Partial-Value Association Discovery (PVAD)…
Read MoreAn Empirical Study of Icon Recognition in a Virtual Gallery Interface
This paper reports on an empirical study (an extension of a pilot study) that analyses the design of icons in a German 3-D virtual art gallery interface. It evaluates the extent to which a sample of typical computer users from a range of ages, educational attainments and employments can interpret the meaning of icons from…
Read MoreStudent Performance Evaluation Using Data Mining Techniques for Engineering Education
In this research work, we are implementing a student performance evaluation model using Mamdani Fuzzy Inference System (FIS) and Neuro Fuzzy system and comparing the results with classical averaging method for Network Analysis (NA) course studied by third semester Electronics and Communication Engineering students. This work explains the designing of scoring rubrics using Bloom’s levels…
Read MoreComputational Techniques to Recover Missing Gene Expression Data
Almost every cells in human’s body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. However, it is a very expensive and time consuming task. Using computational methods can help biologists to…
Read MoreActual Use and Continuous Use of Retail Mobile App: A Model Comparison Perspective
A mobile retail app is a growing innovation in a retailing setting and there is an argument on the prominent status of a mobile application in contrast with a mobile website and web applications. The study used quantitative data to run multiple regression analysis with keen attention to linear regression assumption and compare four models…
Read MoreMedium Height Dual Buildings with Masonry and Concrete Walls in High Seismic Areas
This is a comparative study on the behavior of a dual medium height building with different walls solutions, in a high seismic area (Bucharest, Romania). The main feature of those buildings is the placement of load bearing walls on the perimeter of the building. This is done to limit the lateral displacement when the structure…
Read Morecv4sensorhub – A Multi-Domain Framework for Semi-Automatic Image Processing
Although there are many research domains with very good software support and workflow automation, there are even more which do not have it: software development is too expensive to create domain specific applications for every research topic. This leaves many domain experts to work for example with general purpose image processing and statistics tools. Many…
Read MoreImpacts of Synchronous Generator Capability Curve on Systems Locational Marginal Price through a Convex Optimal Power Flow
This paper deals about an application of optimal power flows (OPF) constrained with synchronous generator capability curve for power market analysis (SGCC). OPF main features gather in its mathematical formulation non-convexity, non-linearity, and it shows to be a hard to solve optimization problem. In some operational scenarios, SGCC can limit power flows bringing the theoretical…
Read MoreNon-bearing Masonry Walls Behavior and Influence to High Reinforced Concrete Buildings
This is a study on non-bearing masonry walls, in a high, reinforced concrete walls building. It will be built in Bucharest, Romania. This is a high seismic area. The building will be used as a dwelling. The structure is composed of a ground floor and 10 stories above. It is interesting to see the interaction…
Read MoreLow-Dimensional Spaces for Relating Sensor Signals with Internal Data Structure in a Propulsion System
Advances in technology have enabled the installation of an increasing number of sensors in various mechanical systems allowing for more detailed equipment health monitoring capabilities. It is hoped the sensor data will enable development of predictive tools to prevent system failures. This work describes continued analysis of sensor data surrounding a seizure of a turbocharger…
Read MoreNumerical Simulation of One Pavement Structure of Polyethylene Terephthalate Submitted to Static Point Loads
Plastic is highly polluting nowadays and is found in many disposable elements used for people. Plastic materials are disposed inadequately and large quantities of them become pollution in the ground, water, and air, affecting plants and animals. Most of the plastic is Polyethylene Terephthalate (PET) which is used in many activities. Resistance, support capacity, and…
Read MoreEconomic and Social Sustainability for Iraqi Middle Provinces
This research is part of a study concerned with building an integrated framework for development of sustainable urban planning in Iraqi provinces. Seven Iraqi middle provinces are covered in this study. The aim of the study is to determine, measure and evaluate economic and social sustainability in the Iraqi middle provinces. The stages to achieve…
Read MoreUsing Nullors to Modify Linear Model Parameters of Transistors in an Analog Circuit
Usually, after properly biasing an analog circuit we need to linearize its transistors in order to linearize the entire circuit for performance analysis and design. This linearization is done through modeling of devices, which is becoming more and more complicated as the electronic technology advances. This is not of course a major issue for circuit…
Read MoreNonLinear Control via Input-Output Feedback Linearization of a Robot Manipulator
This paper presents the input-output feedback linearization and decoupling algorithm for control of nonlinear Multi-input Multi-output MIMO systems. The studied analysis was motivated through its application to a robot manipulator with six degrees of freedom. The nonlinear MIMO system was transformed into six independent single-input single-output SISO linear local systems. We added PD linear controller…
Read MoreCharacteristic, Thermochemical Behaviors and Kinetic of Demineralized and Torrefied Empty Fruit Bunches (EFB)
A sequential pre-treatment of demineralization and torrefaction, was carried out on palm empty fruit bunches (EFB). EFB and demineralized EFB (DEFB) were torrefied in a vertical tubular reactor in the temperature range of 200 to 280 °C for 30 mins under nitrogen (flow rate:100 mL/min. The pretreated samples were characterized using proximate and ultimate analyses,…
Read MoreModified HOG Descriptor-Based Banknote Recognition System
This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…
Read MoreRecent Advances in Intelligent-Based Structural Health Monitoring of Civil Structures
This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read More
