Results (71)
Search Parameters:
Keyword: MetricsUnderstanding Human Perception of Vibrotactile Feedback in Walking and Running Tasks
Vibrotactile feedback is increasingly becoming an essential feedback component in several non-medical and medical areas. One area that vibrotactile feedback has not been explored as an intervention tool is in sports science. In addition, vibrotactile feedback lacks scientific evidence as a feedback mechanism within the sports world. A portable vibrotactile feedback system was developed to…
Read MoreBiometric System Vulnerabilities: A Typology of Metadata
This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…
Read MoreA Comparative Study of Safety Leading and Lagging Indicators Measuring Project Safety Performance
The safety management system is recognized by safety leading and lagging indicators, and their correlation with injury rates. The background on this specific subject is vague in definition, labelling, and indicators measurement. The comparativeness between leading and lagging indicators have been introduced in the constructing safety performance projects evaluation. Safety performance leading indicators are the…
Read MoreCurrent Trends and Challenges in Link Prediction Methods in Dynamic Social Networks: A Literature Review
In more recent times, researchers have turned their attention to link prediction and the role link inference can play in better understanding the evolutionary nature of social networking sites. The objective of this paper is to present an in-depth review, analysis, and discussion of the cutting-edge link prediction methods that can be applied to better…
Read MoreMulti Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms
Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…
Read MoreDevelopment of Wavelet-Based Tools for Event Related Potentials’ N400 Detection: Application to Visual and Auditory Vowelling and Semantic Priming in Arabic Language
Neurological signals are generally very weak in amplitude and strongly noisy. As a result, one of the major challenges in neuroscience is to be able to eliminate noise and thus exploit the maximum amount of information contained in neurological signals (EEG…). In this paper, we aimed at studying the N400 wave of the Event-Related Potentials…
Read MoreAssessment of Coordinated Multipoint Transmission Modes for Indoor and Outdoor Users at 28 GHz in Urban Macrocellular Environment
The aim of this article is to analyze and evaluate the performance of Coordinated Multipoint (CoMP) transmission approach at a frequency of 28 GHz using three dimensional ray tracing simulations in an urban macrocellular environment. The new performance metric introduced in this article is the relative power usage. Other performance metrics examined in this article…
Read MoreThe Chimera and the Cyborg
High Performance Computing (HPC) systems offer excellent metrics for speed and efficiency when using bare metal hardware, a high speed interconnects, and massively parallel applications. However, this leaves out a significant portion of scientific computational tasks, namely high throughput computing tasks that can be trivially parallelized and scientific workflows that require their own well-defined software…
Read MoreManaging and Optimizing Quality of Service in 5G Environments Across the Complete SLA Lifecycle
The 5G is the fifth generation of mobile broadband, cellular technologies, and networks that promises a major change in mobility by evolving connected business realities. In such an emerging environment, reliable Service Level Agreements (SLA) and anticipation of breaches of Service Level Objectives (SLO) become compulsory. Thus, guaranteeing the required service quality, while also ensuring…
Read MoreInsight into the IEEE 802.1 Qcr Asynchronous Traffic Shaping in Time Sensitive Network
TSN is an attractive solution for latency-critical frame transmission built upon IEEE 802 architecture. Traffic scheduling and shaping in TSN aim to achieve bounded low latency and zero congestion loss. However, the most widespread solution (i.e. Time-Aware Shaper) requires a networkwide precision clock reference and only targets on cyclical traffic flows. This paper focuses on…
Read MoreWeb Authentication: no Password; Listen and Touch
Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…
Read MoreComputational Techniques to Recover Missing Gene Expression Data
Almost every cells in human’s body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. However, it is a very expensive and time consuming task. Using computational methods can help biologists to…
Read MoreExperimental Investigation of Human Gait Recognition Database using Wearable Sensors
In this research human gait database is collected using different possible methods such as Wearable sensors, Smartphone and Cameras. For a gait recognition accelerometer data from wearable shimmer modules and smartphone are used. Data from different sensors location is compared to know which sensor location have better recognition rate. Different walking scenarios like slow, normal…
Read MoreEffectiveness of Routing Protocols for Different Networking Scenarios
Selection of a routing protocol is vital for modern arena of Internet communication as network traffic and network complexities are rapidly increasing. This paper evaluates the effectiveness of three routing protocols namely routing information protocol version 2 (RIPv2), open shortest path first (OSPF), enhanced interior gateway routing protocol (EIGRP), and hybrid protocols based on these…
Read MoreA Survey on Parallel Multicore Computing: Performance & Improvement
Multicore processor combines two or more independent cores onto one integrated circuit. Although it offers a good performance in terms of the execution time, there are still many metrics such as number of cores, power, memory and more that effect on multicore performance and reduce it. This paper gives an overview about the evolution of…
Read MoreAn enhanced Biometric-based Face Recognition System using Genetic and CRO Algorithms
Face recognition is one of the most well-known biometric methods. It is a technique used for identifying individual from his face. The recognition process takes the face and compares it with the one stored in the database for recognizing it. Many methods were proposed to achieve that. In this paper, a new technique is proposed…
Read MoreAdaptive and Non Adaptive LTE Fractional Frequency Reuse Mechanisms Mobility Performance
Mobile broadband has gained momentum with the growing demand of user data rates. Long Term Evolution (LTE) technology is the step in mobile communications evolution, developed to satisfy high data rate demand, and meet better spectral efficiency requirements. Effective radio resource management and inter cell interferences are the major challenges. Fractional Frequency Reuse (FFR) is…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreEfficient Resource Management for Uplink Scheduling in IEEE 802.16e Standard
The IEEE 802.16e standard, known as mobile Worldwide Interoperability for Microwave Access (WiMAX) becomes the most demanding broadband wireless access (BWA) technology recently. Its main advantage is rapid delivery of services in remote areas due to the cost efficiency factor. The base station (BS) supports data rate up to 70 Mbps, mobile stations with 5–15…
Read MorePower-Energy Simulation for Multi-Core Processors in Bench-marking
At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important…
Read MoreFrame Filtering and Skipping for Point Cloud Data Video Transmission
Sensors for collecting 3D spatial data from the real world are becoming more important. They are a prime research area topic and have applications in consumer markets, such as medical, entertainment, and robotics. However, a primary concern with collecting this data is the vast amount of information being generated, and thus, needing to be processed…
Read More
