Results (68)
Search Parameters:
Keyword: AGGOn the Use of Triple Graph Grammars for Model Composition
In the software engineering research, several works focus on advantages of multi-modeling, which facilitate modeling a system by separating of concerns. The Model Driven Engineering approach relies on model to design software artefacts during the software development lifecycle. Handling such models involves describing some model management operators like ‘ composition ‘. That is an operation…
Read MoreUnderstanding Human Perception of Vibrotactile Feedback in Walking and Running Tasks
Vibrotactile feedback is increasingly becoming an essential feedback component in several non-medical and medical areas. One area that vibrotactile feedback has not been explored as an intervention tool is in sports science. In addition, vibrotactile feedback lacks scientific evidence as a feedback mechanism within the sports world. A portable vibrotactile feedback system was developed to…
Read MoreBig Data Analytics Using Deep LSTM Networks: A Case Study for Weather Prediction
Recurrent Neural Networks has been widely used by researchers in the domain of weather prediction. Weather Prediction is forecasting the atmosphere for the future. In this proposed paper, Deep LSTM networks has been implemented which is the variant of RNNs having additional memory block and gates making them capable of remembering long term dependencies. Fifteen…
Read MoreDistributed Linear Summing in Wireless Sensor Networks with Implemented Stopping Criteria
Many real-life applications based on the wireless sensor networks are equipped with data aggregation mechanisms for suppressing or even overcoming negative environmental effects and data redundancy. In this paper, we present an extended analysis of the linear average consensus algorithm for distributed summing with bounded execution over wireless sensor networks. We compare a centralized and…
Read MoreIntegration of Third-Party Routing Stack to NetScaler CPX
The Citrix NetScaler CPX, is one of the many Application Delivery Controllers (ADCs), which is used mainly for load balancing between the application servers in a datacenter network. ADCs are typically placed in the demilitarized zone in an organization’s network, handling the connectivity of the external clients to the organization’s servers. While performing load balancing…
Read MoreAn Integrated Framework for Pronominal Anaphora Resolution in Malayalam
Anaphora resolution is one of the old problems in Natural Language Processing. It is the process of identifying the antecedent of an anaphoric expression in a natural language text. Most of the NLP applications such as text summarization, question answering, information extraction, machine translation etc. require the successful resolution of anaphors. In this paper, we…
Read MoreMelanoma detection using color and texture features in computer vision systems
All forms of skin cancer are becoming widespread. These forms of cancer, and melanoma in particular, are insidious and aggressive and if not treated promptly can be lethal to humans. Effective treatment of skin lesions depends strongly on the timeliness of the diagnosis: for this reason, artificial vision systems are required to play a crucial…
Read MoreSupporting Better Physical Activity in a Smart City: a Framework for Suggesting and Supervising Walking Paths
The increase of elderly population creates the need to promote healthy aging, with autonomy and independence, for preserving the functional capacity and quality of life as much as possible. To achieve this goal the recommendations include walking a certain amount of steps daily, given that the exact amount of steps changes with age, lesions, and…
Read MoreEvent Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network
With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…
Read MoreDysphoria Detection using EEG Signals
Dysphoria is a state faced when one experienced disappointment. If it is not handled properly, dysphoria may trigger acute stress, anxiety and depression. Typically, the individual who experienced dysphoria are in-denial because dysphoria is always being associated with negative connotations such as incompetency to handle pressure, weak personality and lack of will power. To date,…
Read MoreAnalysis of Fuzzy Data for the Selection of Ingredients of the Polymer Composition by Technical Functions in Quality Management
The task of fuzzy mathematical modeling of the composition of a polymer composition is singled out and formulated, as one of the types of chemical-technological systems for creating the theoretical foundations for managing the physicochemical properties of the material produced from this composition. Fuzzy data on the technical functions and concentration of individual ingredients that…
Read MoreStudent Performance Evaluation Using Data Mining Techniques for Engineering Education
In this research work, we are implementing a student performance evaluation model using Mamdani Fuzzy Inference System (FIS) and Neuro Fuzzy system and comparing the results with classical averaging method for Network Analysis (NA) course studied by third semester Electronics and Communication Engineering students. This work explains the designing of scoring rubrics using Bloom’s levels…
Read MoreThe Visualization of Cattle Movement Data in The State of Pará in 2016 Through Networks of Animal Transit Graphs and Guides
Animal movement is inherent in the marketing between the rural productive units, establishing space-time connections between them. The relational nature of such information is kept in the Animal Transit Guides (GTA), a mandatory issuance in Brazil. When evaluating such set of information, this work aimed at characterizing the bovine movement network in the state of…
Read MoreGroup of UAVs Moving on Smooth Control Law with Fixed Obstacles
In this paper considered the movement of multi-agent system that consists of several UAVs that carry out monitoring ground surface. The multi-agent system includes a lead agent and several agents-members of the group. The motion of this system occurs along a trajectory, which is determined by the initial conditions, its mathematical model and obstacles on…
Read MoreThe main characteristics of five distributed file systems required for big data: A comparative study
These last years, the amount of data generated by information systems has exploded. It is not only the quantities of information that are now estimated in Exabyte, but also the variety of these data which is more and more structurally heterogeneous and the velocity of generation of these data which can be compared in many…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreUsing Naming Patterns for Identifying Architectural Technical Debt
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read More
