Results (797)
Search Parameters:
Keyword: FACImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreDeep venous thrombus characterization: ultrasonography, elastography and scattering operator
A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…
Read MoreLow Probability of Interception Beampattern Using Frequency Diverse Array Antenna
Frequency diverse array (FDA) antenna employs a small frequency increment, as compared with the carrier frequency, across antenna array elements. The use of a frequency increment generates an array factor that is dependent on angle, time, and the range and this yields a range and angle dependent beampattern. In this paper, a transmit array beamforming…
Read MoreDetailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model
In urban, rural and indoor applications, diffraction mechanism is very important to predict the field strength and calculate the coverage accurately. The diffraction mechanism takes place on NLOS (non-line-of-sight) cases like rooftop, vertex, corner, edge and sharp surfaces. S-UTD-CH model computes three type of electromagnetic wave incidence such as direct, reflected and diffracted waves, respectively.…
Read MoreComputer Aided Medical Diagnosis for the Treatment of Sexually Transmitted Disease (Gonorrhea)
The World Health Organization (WHO) report on the circumstances of clinical facilities in developing countries indicates that, there is considerable efficient delivery of medical services to the rural inhabitants where the services are available, these services are very expensive and not affordable to the average citizen. This has risen inadequacies such as prolonged suffering and…
Read MoreEvaluation of Three Evaporation Estimation Techniques In A Semi-Arid Region (Omar El Mukhtar Reservoir Sluge, Libya- As a case Study)
In many semi-arid countries in the world like Libya, drinking water supply is dependent on reservoirs water storage. Since the evaporation rate is very high in semi-arid countries, estimates and forecasts of reservoir evaporation rate can be useful in the management of major water source. Many researchers have been investigating the suitability of estimates evaporation…
Read MoreImplementation Of Carlson Survey Software2009 In Survey Works And Comparison With CDS Software
The automation surveying is one of the most influential changes to surveying concept and profession has had to go through, this has taken effect in two major courses, hardware (instrumentation used in data collection and presentation), and the software (the applications used in data processing and manipulation). Automation is majorly computer based and just like…
Read MoreA Clinical Review of Zika Virus (ZIKAV)
Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…
Read MoreSpatial Sampling Requirements for Received Signal Level Measurements in Cellular Networks of Suburban Area
A process for the determination of a required spatial resolution in the collection of the Received Signal Level (RSL) is discussed. This method considers RSL measurements as a three dimensional surface that is sampled through the data collection process. In addition, it is difficult to collect RSL measurements for an entire coverage area because of…
Read MoreEfficient Resource Management for Uplink Scheduling in IEEE 802.16e Standard
The IEEE 802.16e standard, known as mobile Worldwide Interoperability for Microwave Access (WiMAX) becomes the most demanding broadband wireless access (BWA) technology recently. Its main advantage is rapid delivery of services in remote areas due to the cost efficiency factor. The base station (BS) supports data rate up to 70 Mbps, mobile stations with 5–15…
Read MoreWireless Android Based Home Automation System
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…
Read MoreHow Effective is Using Lip Movement for Japanese Utterance Training
Lip movements have long been the subject of research. There are many methods of lip movement recognition, such as the calculation of the amount of movement compared to a matching face pattern. In a previous study, we investigated utterance recognition based on the power spectrum by focusing on lip movements, which is one aspect of…
Read MoreMIMO Performance and Decoupling Network: Analysis of Uniform Rectangular array Using Correlated-Based Stochastic Models
We explore the dependency of MIMO performance on azimuthal spread (AS) and elevation spread (ES) using correlated-based stochastic models (CBSMs). We represent the transmitter as uniform rectangular array (URA), and derive an analytical function for spatial correlation, in terms of maximum power when phase gradient of the incident wave follows a Student’s t-distribution. We model…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read MoreFrame Filtering and Skipping for Point Cloud Data Video Transmission
Sensors for collecting 3D spatial data from the real world are becoming more important. They are a prime research area topic and have applications in consumer markets, such as medical, entertainment, and robotics. However, a primary concern with collecting this data is the vast amount of information being generated, and thus, needing to be processed…
Read MoreSystem Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate
Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…
Read MoreAdaptive Intelligent Systems applied to two-wheeled robot and the effect of different terrains on performance
This work discuss two different intelligent controllers: Online Neuro Fuzzy Controller (ONFC) and Proportional-Integral-Derivative Neural Network (PID-NN). They were applied to maintain the equilibrium and to control the position of a two-wheeled robot prototype. Experiments were carried out to investigate the equilibrium control and movement of the two-wheeled robot first on flat terrain, then in…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read MoreAn Efficient Approach of Load Shifting by Using SCADA
The consumption of electric power has increased significantly in the past few years, and its demand is still increasing every day. In this regard, its proper distribution is a significant challenge. This paper includes a method not only to improve the existing power distribution by using SCADA but also to reduce the human errors from…
Read MoreRobust µController Implementations for a Linear Pneumatic Actuator Interaction
Over the years, pneumatic systems have recorded a remarkable performance in automated applications, based on their cost to efficiency ratio and ease of energy transmission. Therefore, their drawback of not being totally controllable devices in terms of position accuracy, still represents a challenge task for engineers. In this paper, a traditional three term controller (PID)…
Read MoreEffect of Foliar Application of Zinc on Growth and Yield of Guava (Psidium Guajava L.)
In depth study focusing to ascertain the effect of different rates of Zinc (Zn) fertilization in improving the quality and yield of Guava fruit was carried out at Gharo, Sindh – Pakistan during year 2014-15. The outcome of the research revealed that there was no significant effect on the yield as well as quality, without…
Read MoreCoal Seam Methane Abatement and Utilization Techniques with Availability and Feasibility Criteria
Methane found in coal seams is about 17% of total methane emissions by human activities and 8% of world’s greenhouse gases emissions. Mine methane can be generated through different streams of coal mines like degasification of underground coal mines, ventilation of air in coal seams, post mining processes and surface mining. Methane from ventilation air…
Read More
