Results (1074)
Search Parameters:
Keyword: HANPsychoacoustical Approach in Soundscape Characterization
Four different soundscapes with different loudness and spectral distributions were recorded in Zagreb (capital of Croatia) and reproduced to two groups of listeners while they were performing a concentration demanding task – a simplified variation of the memory game. These two groups of test subjects listened to the same soundscapes but with different loudness distribution.…
Read MoreExperimental Investigation of Human Gait Recognition Database using Wearable Sensors
In this research human gait database is collected using different possible methods such as Wearable sensors, Smartphone and Cameras. For a gait recognition accelerometer data from wearable shimmer modules and smartphone are used. Data from different sensors location is compared to know which sensor location have better recognition rate. Different walking scenarios like slow, normal…
Read MoreComplete Modeling of the Hydrogen Stored in a Spherical Cavity
Hydrogen is the lightest of gases and possesses the lowest density. However at ambient temperature and pressure it occupies a large volume. This necessitates compressing it at high pressures up to 800 Bars to minimize the volume. The immense interest generated by hydrogen comes from the fact that it has the best energy per weight…
Read MoreEffectiveness of Routing Protocols for Different Networking Scenarios
Selection of a routing protocol is vital for modern arena of Internet communication as network traffic and network complexities are rapidly increasing. This paper evaluates the effectiveness of three routing protocols namely routing information protocol version 2 (RIPv2), open shortest path first (OSPF), enhanced interior gateway routing protocol (EIGRP), and hybrid protocols based on these…
Read MoreExtendable Board Game to Facilitate Learning in Supply Chain Management
Game-based learning has been introduced as an interactive tool to facilitate learning and training processes in various fields, including supply chain management (SCM). Most of these games are specifically designed to focus on certain scenarios and concepts. For example, the original beer distribution game focuses on a single product supply chain without considering capacity and…
Read MoreInteractive Virtual Reality Educational Application
Virtual Reality (VR) technology has become one of the most advanced techniques that is used currently in many fields. The role of education is extremely important in every society; therefore, it should always be updated to be in line with new technologies and lifestyles. Applying technology in education enhances the way of teaching and learning.…
Read MoreAn FPGA Implementation of Resource-Optimized Dynamic Digital Beamformer for a Portable Ultrasound Imaging System
This paper presents a resource-friendly dynamic digital beamformer for a portable ultrasound imaging system based on a single field-programmable gate array (FPGA). The core of the ultrasound imaging system is a 128- channel receive beamformer with fully dynamic focusing embedded in a single FPGA chip, which operates at a frequency of 40 MHz. The Rx…
Read MoreStream Cipher by Reed-Solomon Codes
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read MoreAutomating Hostel Telephone Systems
Residential schools can be a great place for students to learn and develop a different set of skills if the right environment is given to the child. Constant communication with parents can help the child to stay motivated and feel comfortable away from home, hence schools tend to provide various solutions to allow the student…
Read MoreA Method for Generating, Evaluating and Comparing Various System-level Synthesis Results in Designing Multiprocessor Architectures
Multiprocessing can be considered the most characteristic common property of complex digital systems. Due to the more and more complex tasks to be solved for fulfilling often conflicting requirements (cost, speed, energy and communication efficiency, pipelining, parallelism, the number of component processors, etc.), different types of component processors may be required by forming a so…
Read MoreLearning Personalization Based on Learning Style instruments
Adaptive education systems (AES) are considered one of the most interesting research topics in technology-based learning strategies. Since students have different abilities, needs and learning styles, we should fit the curriculum and teaching activities to these different learning styles. This study investigates the impact of using LAES (Libyan Adaptive Education System) on the performance of…
Read MoreWeight Parameters and Green Tea Effect; A Review
The objective was to review and add literature whether green tea is helpful for weight reduction. Reviewing the randomized, double-blind, placebo-controlled trials to compare green tea extracts for weight loss from various online sources including Ovid MEDLINE, PubMed, and Cochrane databases studies published in 2006, 2007 and 2008 in English language were considered. In each…
Read MoreEvaluating the effect of Locking on Multitenancy Isolation for Components of Cloud-hosted Services
Multitenancy isolation is a way of ensuring that the performance, stored data volume and access privileges required by one tenant and/or component does not affect other tenants and/or components. One of the conditions that can influence the varying degrees of isolation is when locking is enabled for a process or component that is being shared.…
Read MoreEffects of Cinnamon on Diabetes
Diabetes is a condition of the body in which blood sugar level is higher than the normal average value. It is considered as a major cause of morbidity worldwide. According to the data reported in 2015,420 million people had diabetes worldwide, type 2 diabetes account for 85% of these cases. This shows 9.2% of the…
Read MoreEAES: Extended Advanced Encryption Standard with Extended Security
Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…
Read MoreDesign of True Random Numbers Generators with Ternary Physical Unclonable Functions
Memory based ternary physical unclonable functions contain cells with fuzzy states that are exploited to create multiple sources of physical randomness, and design true random numbers generators. A XOR compiler enhances the randomness of the binary data streams generated with such components, while a modulo-3 addition enhances the randomness of the native ternary data streams,…
Read MoreDirect Torque Control Strategy Based on the Emulation of Six-Switch Inverter Operation by a Four-Switch Inverter Using an Adaptive Fuzzy Controller
This paper presents a novel direct torque control (DTC) strategy aimed to four-switch three-phase (FSTP) inverter-fed an interior permanent magnet synchronous machine (IPMSM), using a fuzzy logic toolbox in speed control loop. In fact, the introduced DTC approach is based on the emulation of the operation of the standard six-switch three-phase (SSTP) inverter. This fact…
Read MoreOntology Modeling of Social Roles of Users in Mobile Computing Environments
Today, computing devices of various types with wireless interconnections are used for diverse tasks and increasingly in ad hoc manners. It is not always obvious which devices are present, reachable, and connected when users and their devices are mobile. In such mobile computing environment, the number of registered lines on the network via network operators…
Read MoreFuel Cell/ Super-capacitor power management system assessment and Lifetime Cost study in a 500kVA UPS
A 500 KVA Uninterruptible power supply (UPS) using Fuel Cells (FC) and super-capacitors (SCs) was studied with the worst case of 10 minutes and eight hours of interruption per day. A power management system was established to control the FC and the SCs in order to extract the hybridization benefits with a comparison between a…
Read MoreModeling of the wave functions and of the energy states of hydrogen stored in a spherical cavity
This article examines the hydrogen storage phenomenon in a spherical cavity. The hydrogen gas or liquid is subjected to high pressures, leading to significant loss of mass of hydrogen, and requires materials that can withstand these high pressures also minimize losses. For all these reasons, the problem is considered at the quantum scale. So in…
Read MoreEfficient Limited Feedback Technique for FDD MIMO Systems
In this paper an efficient feedback quantization technic for beamforming in MIMO systems is presented. The proposed technic named time domain quantization TD-Q is based on the feedback of time domain parameters necessary for the reproduction of the beamforming matrix at the transmitter. This TD-Q presents the same performance than the conventional Givens rotation quantization…
Read MoreAgent Based Fault Detection System for Chemical Processes using Negative Selection Algorithm
Recently, the number of industrial accidents of chemical plants has been increasing in Japan. The fault detection system is required to keep chemical plant safely. In this study, a fault detection system for a chemical plant using agent framework and negative selection algorithm was proposed. The negative selection algorithm is one of artificial immune systems.…
Read MoreMPC-based energy efficiency improvement in a pusher type billets reheating furnace
The research reported in this paper proposes an Advanced Process Control system, denoted “i.Process | Steel – RHF”, oriented to energy efficiency improvement in a pusher type billets reheating furnace located in an Italian steel plant. A tailored control method based on a two-layer Model Predictive Control strategy has been created that involves cooperating modules.…
Read MoreTPMTM: Topic Modeling over Papers’ Abstract
Probabilities topic models are active research area in text mining, machine learning, information retrieval, etc. Most of the current statistical topic modeling methods, such as Probabilistic Latent Semantic Analysis (pLSA) and Latent Dirichlet Allocation (LDA). They are used to build models from unstructured text and produce a term-based representation to describe a topic by choosing…
Read MoreAn Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images
Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…
Read More
