Results (877)
Search Parameters:
Keyword: ICIAdaptation of Electronic Book Publishing Technology by The Publishers in Southeast Nigeria
This paper investigates the electronic book production and distribution practices adopted by the Publishers in Southeast Nigeria because of the global growing interest in writing new book titles in digital form as well as converting paper titles to digital content. To investigate this study, the researcher formulated three research questions to guide the study. A…
Read MoreMachine Learning Applied to GRBAS Voice Quality Assessment
Voice problems are routinely assessed in hospital voice clinics by speech and language therapists (SLTs) who are highly skilled in making audio-perceptual evaluations of voice quality. The evaluations are often presented numerically in the form of five-dimensional ‘GRBAS’ scores. Computerised voice quality assessment may be carried out using digital signal processing (DSP) techniques which process…
Read MoreContract Price Model Under Active Demand Response
The power market in China is faced with problems such as the continuous widening of terminal load peak-valley difference and the imbalance between supply and demand. Under this background, this paper to establish the mathematical model of the contract price of active demand response. The first is to consider the load component of the user’s…
Read MoreAn Empirical Study of Icon Recognition in a Virtual Gallery Interface
This paper reports on an empirical study (an extension of a pilot study) that analyses the design of icons in a German 3-D virtual art gallery interface. It evaluates the extent to which a sample of typical computer users from a range of ages, educational attainments and employments can interpret the meaning of icons from…
Read MoreProbabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots
This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…
Read MoreParallelizing Combinatorial Optimization Heuristics with GPUs
Combinatorial optimization problems are often NP-hard and too complex to be solved within a reasonable time frame by exact methods. Heuristic methods which do not offer a convergence guarantee could obtain some satisfactory resolution for combinatorial optimization problems. However, it is not only very time consuming for Central Processing Units (CPU) but also very difficult…
Read More3D Reconstruction of Monuments from Drone Photographs Based on The Spatial Reconstruction of The Photogrammetric Method
Due to their efficient flight control systems and their camera of high quality modern drones can fly precisely and take aerial photos of high resolution. Although these multi-rotor devices are not able to fly long distances yet, they are very efficient instruments for taking aerial photographs of their proximate environment. As they are able to…
Read MoreComputational Techniques to Recover Missing Gene Expression Data
Almost every cells in human’s body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. However, it is a very expensive and time consuming task. Using computational methods can help biologists to…
Read MoreAttitude Control Simulation of a Legged Aerial Vehicle Using the Leg Motions
To gather information rapidly in disaster sites, a lot of search/rescue robots have been developed. It is difficult to correspond to the complicated environment composed of fields requiring various locomotion strategies, because most of these robots have only one type of locomotion device. To increase the available search routes under such conditions with the aim…
Read MoreA Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques
Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…
Read MoreFuzzy Uncertainty Management in Multi-Shift Single-Vehicle Routing Problem
Our research deals with the single-vehicle routing problem (VRP) with multi-shift and fuzzy uncertainty. In such a problem, a company constantly uses one vehicle to serve demand over a scheduling period of different work shifts. Our issue relies on a routing problem in maintenance jobs, where a crew executes jobs in different sites. The crew…
Read MoreDifference in Speech Analysis Results by Coding
Mental health disorder is becoming a social problem, and there is a need for technology that can easily check for states of stress and depression as a countermeasure. Conventional methods of diagnostic support and screening include self-administered psychological tests and use of biomarkers. However, there are problems such as burden on subjects, examination costs, dedicated…
Read MoreEffect of Various Parameters for Temperature Distribution in Human Body: An Analytic Approach
This paper is the extension of the work originally presented in 2nd International Conference on Man and Machine Interfacing (MAMI 2017) and the paper of Yue et al. The present study aims at observing the effect of various parameters on temperature distribution profiles at various environmental temperature, tissue thermal conductivities, metabolic rates, blood perfusion rates,…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreA Ubiquitous and Configurable Wrist-Worn Sensor Node in Hazardous Gases Detection
The monitoring of environmental parameters is a critical topic in occupational medicine. With advances in technology, during the recent years, the wearable sensors are widely used to evaluate the ambient parameters. In this paper a compact, small, light-weighted, and configurable sensor node in three physical layers for prolonged chemical ambient monitoring is described. The device…
Read MoreNemoMap: Improved Motif-centric Network Motif Discovery Algorithm
Network motif analysis has several applications in many different fields such as biological study and social network modeling, yet motif detection tools are still limited by the intensive computation. Currently, there are two categories for network motif detection method: network-centric and motif-centric approach. While most network-centric algorithms excel in enumerating all potential motifs of a…
Read MoreImplementation of a Robot Contest for Distance Education
Robot contests are suitable for bachelor courses to gather hands-on experience in engineering diciplines such as mechanics, electronics and embedded software. After summarizing a concept of a robot contest for distance education (robot sumo) as presented in earlier publications this paper describes the implementation and first results of this concept. The contest is seperated into…
Read MoreEvolving AL-FEC Application on 5G NGMN-Edge Computing Systems
Fifth generation of mobile networks (5G) comes to cope with the context of the new mobile telecommunications era. Edge computing is a new collaborative technology under standardization utilizing end-user devices or near-end-user edge devices to operate processing, communication, or control operations. The achievement of efficient error control is a very critical aspect in the successful…
Read MoreVirtual Output Queues Architecture for High Throughput Data Center Nodes
The latest design approach for Data Centers (DCs) follows the direction of exploiting optical switching to connect Top-of-Rack (ToR) switches that serve thousands of data storing and computing devices. A ToR’s usual function is the Virtual Output Queues (VOQs), which is the prevalent solution for the head-of-line blocking problem of the DC switches. An effective…
Read MoreThe Visualization of Cattle Movement Data in The State of Pará in 2016 Through Networks of Animal Transit Graphs and Guides
Animal movement is inherent in the marketing between the rural productive units, establishing space-time connections between them. The relational nature of such information is kept in the Animal Transit Guides (GTA), a mandatory issuance in Brazil. When evaluating such set of information, this work aimed at characterizing the bovine movement network in the state of…
Read MoreParametric Co-variance Assignment for a Class of Multivariable Stochastic Uncertain Systems: Output Feedback Stabilization Approach
This paper presents a novel parametric co-variance assignment strategy for multi-variable stochastic uncertain systems. Based upon the explicit parametric design and reduced-order closed-form co-variance model, the variances and co-variances of the system outputs can be assigned artificially using output feedback while the effect of the system uncertainties can be minimized by optimizing the free parameters.…
Read MoreAcquiring Wi-Fi Energy to Charge a Mobile Phone
As a result, outdoor travelers, tourists and businessman who utilize portable electronic devices often experience battery depletion of their devices without the means of charging their device. The number of Wi- Fi access point continues to increase. There are many occasions where it is desirable to acquire energy from many radio frequency stations, while charging…
Read MoreAn Optical-based Fingertip Force Sensor
This work introduces the design and prototype development of a novel optical-based fingertip force sensor, which is integrated in a bio-mimetic finger for robotic and prosthetic manipulation. Given the optical nature of the sensor, the proposed device is free of any electrical and metal components. Accordingly, the design improves manipulation of objects with high electromagnetic…
Read MoreAmplitude-Frequency Analysis of Emotional Speech Using Transfer Learning and Classification of Spectrogram Images
Automatic speech emotion recognition (SER) techniques based on acoustic analysis show high confusion between certain emotional categories. This study used an indirect approach to provide insights into the amplitude-frequency characteristics of different emotions in order to support the development of future, more efficiently differentiating SER methods. The analysis was carried out by transforming short 1-second…
Read MoreMinimizing Time Delay of Information Routed Across Dynamic Temporal Sensor Networks
In this research we address the problem of routing information across dynamic temporal sensor networks. The goal is to determine which information, generated by sensors on resources at various times, is able to be routed to other resources, consumer resources, within the given information time window, while being constrained by temporally dynamic bandwidth limitations across…
Read More
