Results (2356)
Search Parameters:
Keyword: SEComparison of Electrogastrograms in Seated and Supine Positions Using Wayland Algorithm
In previous study, it is difficult to estimate the biological states such as postural ones and aetas in accordance with the previous analysis of electrogastrograms (EGGs), basically the frequency resolution of healthy individuals. In addition, few studies have compared gastric myoelectrical activity in supine and sitting posture. The aim of this study is to evaluate…
Read MoreCareer Recommendation System for Scientific Students Based on Ontologies
Students are usually unaware of their own skills. They choose to follow the trend, rather than the proper pathway. Which negatively a_ects the professional sector, and the development of the country. Orienting students, and guiding them would o_er considerable benefits. Building the appropriate student’s profiles is the golden key for an accurate orientation. To do…
Read MoreSentiment Analysis on Twitter for Predicting Stock Exchange Movement
This paper is proposed to build a model by applying two methods, namely support vector machine and nonnegative matrix factorization in the process of predicting stock market movement using twitter and historical data. The stock exchange is based on the LQ 45 stock with period from August 2018 – January 2019. The features consist of…
Read MoreMulti-Band Hand of God Antenna with Functionality Variation with Use of Slots and Feed Position
This article investigates different versions of a new multi-band micro-strip antenna design. NASA inspired the antenna design from “Hand of God” galaxy discovery. A multi-band operation between 0.15 and 8 [GHz] is obtained and captures up to 10 frequency bands. The antenna has a small area of 4 x 5 cm2 and is printed on…
Read MoreDigitization Impact Assessment Model for Secondary Schools: Case of Nairobi County in Kenya
Digitization is viewed as the capability to utilize digital technologies for generating processing, sharing and transacting information. Studies show that digitization has now become ubiquitous. In almost all the sectors, we routinely interact with digital technologies. As a result, the impact of digitization is being observed in such sectors. For instance, the positive impact of…
Read MoreLinearity Improvement of VCSELs based Radio over Fiber Systems utilizing Digital Predistortion
The article proposes a Digital Predistortion (DPD) methodology that substantially meliorates the linearity of limited range Mobile Front Haul links for the extant Long-Term Evolution (LTE) and future (5G) networks. Specifically, the DPD is employed to Radio over Fiber links that contrive of Vertical Cavity Surface Emitting Lasers (VCSELs) working at 850 nm. Both, Memory…
Read MoreAnalysis of Fuzzy Data for the Selection of Ingredients of the Polymer Composition by Technical Functions in Quality Management
The task of fuzzy mathematical modeling of the composition of a polymer composition is singled out and formulated, as one of the types of chemical-technological systems for creating the theoretical foundations for managing the physicochemical properties of the material produced from this composition. Fuzzy data on the technical functions and concentration of individual ingredients that…
Read MoreResourceful Residual Energy Consumption in TDMA Scheduling for IoT-based Wireless Sensor Network
Recently, wireless sensor network (WSN) gets more concern due to the robustness in the latest communication technology iteration such as big data, IoT and 5G. Such daily usage of these technologies includes smart home, smart farming, smart traffic control etc. Moreover, WSN becomes the best preference for mobile objects in data accumulating in a wild…
Read MoreAn Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador
Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…
Read MoreVowel Classification Based on Waveform Shapes
Vowel classification is an essential part of speech recognition. In classical studies, this problem is mostly handled by using spectral domain features. In this study, a novel approach is proposed for vowel classification based on the visual features of speech waveforms. In sound vocalizing, the position of certain organs of the human vocal system such…
Read MoreEvaluation of IEEE 802.11n and IEEE 802.11p based on Vehicle to Vehicle Communications
Wireless communication opens up new avenues in the field of intelligent vehicle systems, including monitoring, guidance and warning applications. In order to determine more precisely the feasibility of using the 802.11n standard in vehicular communication systems, this paper describes a process for evaluating the propagation performance of the 802.11n and 802.11p standards. To do that,…
Read MoreA Novel Rule Based Technique to Detect Electricity Theft in India
It is high time to control and prevent power theft by manipulating the meter reading and tampering of the meter. It is possible to deal power theft by developing Advanced Metering Infrastructure (AMI) and smart grids. For most of the distribution companies, utility smart meters’ data is serving as wealthy source of information beyond billing.…
Read MoreBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreRelational Databases Versus HBase: An Experimental Evaluation
Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…
Read MoreA Formal Ontology-based Framework Towards an Intelligent Temporal Scheduler
Time scheduling as seen in timetabling processes with few and/or competing resources has exposed complex interoperable time scheduling. Attempts to resolving these time scheduling processes has been undertaken, using several classical methods, with difficulty due to inherent complexities, constraints and conflicting issues. The use of ontology-based approaches to resolve time complexity is recently adopted due…
Read MoreDistribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field
The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreLocation Prediction based on Variable-order Markov Model with Time Feature and User’s Spatio-temporal Rule
Location-based service has been widely used in modern life. It brings a lot of convenience to our lives. Improving the accuracy of location prediction can provide better location- based service. We propose a location prediction method based on the variable-order Markov model with time feature and user’s spatio-temporal rule. First, the user’s trajectory data needs…
Read MoreAn Innovative EPC Architecture based on Not Only Stack for beyond 5G Mobile Networks
The traditional long-term evolved (LTE) network architecture faces major challenges due to the rapid development of mobile intelligent applications. Evolved packet core (EPC) network, as the core network of the LTE system, faces the same problem as well. In this paper, we propose an innovative EPC architecture, i.e., Not only stack (NOS)-EPC, in which we…
Read MoreNoise Cancellation Algorithm Based on Air- and Bone-Conducted Speech Signals by Considering an Unscented Transformation Method
Noise control is essential when applying speech recognition in noisy environments such as factories. In this study, a signal processing for noise cancellation is proposed by using a noise-insensitive bone-conducted speech signal together with an air-conducted speech signal. The speech signal is generally expressed by a nonlinear model. The extended Kalman filter is very famous…
Read MoreITSM Software Ranking for Small Medium Enterprises Based on ITIL V3 Quick Win Criteria using Fuzzy SIR Method
There are various software related to the implementation of IT Service Management (ITSM) for a company, including those that are open source and commercial. An input is needed for companies in determining what software to choose from various software, especially for small and medium enterprises (SMEs) that have limited human and financial resources. In this…
Read MoreEffects of Different Activation Functions for Unsupervised Convolutional LSTM Spatiotemporal Learning
Convolutional LSTMs are widely used for spatiotemporal prediction. We study the effect of using different activation functions for two types of units within convolutional LSTM modules, namely gate units and non-gate units. The research provides guidance for choosing the best activation function to use in convolutional LSTMs for video prediction. Moreover, this paper studies the…
Read MoreA New Model of Supplier’s Selection for Sustainable Supply Chain Management
In the last years, industrial company began to understand the central role that plays sustainable supplier selection (SSS) process for obtaining a sustainable supply chain (SSC). This paper proposes a new multi-criterion decision-making (MCDM) model for managers, which makes it possible to select the best suppliers who respect the sustainable development (SD) concept for a…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read More
