Results (115)
Search Parameters:
Keyword: TestingShear Strength of Unreinforced Masonry Walls Retrofitted with CFRP
This paper investigates the in plane behavior of unreinforced masonry (URM) walls externally strengthening on both sides by different configurations of unidirectional carbon fiber reinforced polymer (CFRP) wraps. In order to evaluate the effectiveness of using the strengthening systems to improve the in plane behavior of masonry walls, the experimental program was conducted by testing…
Read MoreSystem of Sequential D-Optimal Identification for Dynamic Objects in Real-Time Scale
The article is devoted to the formalization and development of the theory of sequential experimental design for optimal identification of dynamic objects. The algorithmic and technical support for a system of sequential D-optimal identification for a wide class of dynamic objects in real time is considered. This system is universal and can be used for…
Read MoreAn Algorithm to Improve Data Accuracy of PMs Concentration Measured with IoT Devices
Air pollution is responsible for increased morbidity and mortality due to respiratory problems mainly caused by long term exposure. Although the emissions of principal air pollutants are highly regulated, there is a lack of information about the real extent of personal exposure for an accurate health impact assessment. To tackle these challenges, local air pollution…
Read MorePerformance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. Due to the mobility-related instability of the paths between nodes and due to the limited buffer and energy resources, the ultimate objective of routing protocols in opportunistic…
Read MoreSCMS: Tool for Assessing a Novel Taxonomy of Complexity Metrics for any Java Project at the Class and Method Levels based on Statement Level Metrics
Software is the primary and indispensable entity in our technologically driven world. Therefore, quality assurance, and in particular software testing, represents a vital component in the software development cycle. Throughout the years, many tools have been developed to collect metrics of software that had been implemented. These tools have some differences but continue to play…
Read MoreResonator Influence Simulation of Designed Close-Open Standing Wave Thermoacoustic Engine
Thermo-acoustic technology is very potential to be applied to convert heat into another energy source. The complete thermoacoustic engine construction requires a resonator connected to a core where there is a heat exchanger. The thermoacoustic core has a function as an acoustic power generator while the resonator functions as a storage of acoustic power which…
Read MoreThe Effect of Fuel Additives on Pyrorated Biodiesel Blends on the Performance of a Diesel Power Generator
The demand for renewable energy sources such as waste pyrolysis plastic oil (WPPO), ethanol biofuel with high oxygen content is increasing globally. This study used blending of conventional diesel oil, waste plastic pyrolysis oil, ethanol and 2-ethyl hexyl nitrate (EHN) as additive. The purpose was to improve combustion, the ignition quality, and performance and emission…
Read MoreDetecting Malicious Assembly using Convolutional, Recurrent Neural Networks
We present findings on classifying the class of executable code using convolutional, re- current neural networks by creating images from only the .text section of executables and dividing them into standard-size windows, using minimal preprocessing. We achieve up to 98.24% testing accuracy on classifying 9 types of malware, and 99.50% testing accuracy on classifying malicious…
Read MoreStudy and Implementation of Various Image De-Noising Methods for Traffic Sign Board Recognition
The problem of recognizing traffic sign boards in a correct fashion is one of the major challenges since there is an alarming rate of increase in the number of road accidents happening because of incorrect interpretation of traffic sign boards in bad weather conditions. In this paper, a comparative analysis of various noise removal techniques…
Read MorePermutation Methods for Chow Test Analysis an Alternative for Detecting Structural Break in Linear Models
This study examined the performance of two proposed permutation methods for Chow test analysis and the Milek permutation method for testing structural break in linear models. The proposed permutation methods are: (1) permute object of dependent variable and (2) permute object of the predicted dependent variable. Simulation from gamma distribution and standard normal distribution were…
Read MoreFactors Influencing the Integration of Freight Distribution Networks in the Indonesian Archipelago: A Structural Equation Modeling Approach
The main problem of the distribution of freight in archipelago countries such as Indonesia is how to ensure that the outlying and outermost islands are served optimally, with low freight costs and optimal frequency of vessel stops at ports. There are three types of vessels that are subsidized and have the duty of public service…
Read MoreEstimation of Software Development Project Success using Fuzzy Logics
To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…
Read MoreA Relation Extraction System for Indian Languages
Relation Extraction is an important subtask of Information Extraction that involves extracting significant facts from natural language text. Extracting structured information from the plaintext is the ultimate goal of IE systems. The Indian language content on the internet is increasing day to day. Extracting relevant information from this huge unstructured data is a challenging task…
Read MoreStrategies of the Level-By-Level Approach to the Minimal Route
The task of optimal path planning for drilling tool with numerical control is considered. Such tools are used in the production of printed circuit boards. The algorithm modification of level-by-level route construction for the approximate solution of the traveling salesman problem is discussed. Bypass objects can be specified either as a table of distances or…
Read MoreCritical Embedded Systems Development Using Formal Methods and Statistical Reliability Metrics
Trusted systems are becoming more integrated into everyday life. Security and reliability are at the forefront of trusted system design and are often directed at hardware-only solutions, especially for safety critical systems. This is because hardware has a well-established process for achieving strong, precise, and reliable systems. These attributes have been achieved in the area…
Read MoreDevelopment of Application Specific Electronic Nose for Monitoring the Atmospheric Hazards in Confined Space
The presence of atmospheric hazards in confined space can contribute towards atmospheric hazards accidents that threaten the worker safety and industry progress. To avoid this, the environment needs to be observed. The air sample can be monitored using the integration of electronic nose (e-nose) and mobile robot. Current technology to monitor the atmospheric hazards is…
Read MoreMRI images Enhancement and Brain Tumor Segmentation
Brain tumor is the abnormal growth of cancerous cells in Brain. The development of automated methods for segmenting brain tumors remains one of the most difficult tasks in medical data processing. Accurate segmentation can improve diagnosis, such as evaluating tumor volume. However, manual segmentation in magnetic resonance data is a laborious task. The main problem…
Read MoreAn Empirical Study of Icon Recognition in a Virtual Gallery Interface
This paper reports on an empirical study (an extension of a pilot study) that analyses the design of icons in a German 3-D virtual art gallery interface. It evaluates the extent to which a sample of typical computer users from a range of ages, educational attainments and employments can interpret the meaning of icons from…
Read MoreManagement Tool for the “Nephele” Data Center Communication Agent
Optical switching provided the means for the development of Data Centers with high throughput interconnection networks. A significant contribution to the advanced optical Data Centers designs is the Nephele architecture that employs optical data planes, optical Points of Delivery (PoD) switches and Top of Rack (ToR) switches equipped with 10 Gbps connections to the PoDs…
Read MoreElliptical Printed Dipole Antenna Design using ANN Based on Levenberg–Marquardt Algorithm
A design of elliptical printed dipole antenna based on neural network approach is presented in this paper for recent WiMAX, Bluetooth, WLAN, LTE, and future 5G applications. The dipole patch is printed on top of substrate which has relative permittivity of 2.2 and 0.787mm of thickness. The elliptical dipole antenna is single band and the…
Read MoreSequential Card Activities of Recollect Experience for Elderly with Dementia
In this study, the authors propose a modified design of sequential card activities to recollect experience for the elderly with Dementia. The cards and App were designed to complement each other for Nostalgia-based support. Image and text are utilized to trigger memories that bring out shared experience from the patient. By using suitable trigger elements,…
Read MoreA modular design process for developing humanoid mobile robot VieBot
This paper introduces a design process for developing a humanoid mobile robot, namely VieBot. Stemming from the design process, it is easy to adjust the design and extent robot behaviors to meet customer needs. Our key solution is to split the design into three modules related to robot behavior, kinematic computation and motion control. Base…
Read MoreA Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security
During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…
Read MoreSteganography System with Application to Crypto-Currency Cold Storage and Secure Transfer
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…
Read MoreStructure-Preserving Modeling of Safety-Critical Combinational Circuits
In this work, a representative combinational circuit is visualized in various ways. It is abstracted (concretized) from transistor level to gate level and a structure-preserving transition is carried out into a signal flow graph. For creating a signal flow plan it is necessary to swap the nodes and the edges in the signal flow graph.…
Read More
