Results (111)
Search Parameters:
Keyword: visionA Blockchain-Based Architecture for Smart Healthcare System: A Case Study of Saudi Arabia
eHealth is the use of Information and Communication Technologies (ICT) to enhance health quality access. Health care innovations are an essential element of Vision 2030 and National Transformation Program (NTP) 2020 operational plan that will lead to an improvement in the quality of health care in Saudi Arabia. The objective of this paper is to…
Read MoreAlleviation of Nonlinear Impact Using PAPR Hybrid Technique in CO-OFDM Systems
Orthogonal Frequency Division Multiplexing (OFDM) is a modulation format that has recently attracted lots of consideration interior the long-haul fiber-optic transmission community. The most important advantage of optical OOFDM is its unlimited capability of canceling Inter-Symbol Interference (ISI) caused by Chromatic Dispersion (CD) and Polarization-Mode Dispersion (PMD). Specifically, Coherent OOFDM (CO-OFDM) presents a good and…
Read MoreCommunication Management of Digital Information Data in Human Resources as a Policy Making Strategic Program for University
Modern universities aim at carrying capacity human resources component in its tri dharma (Three Pillars of Higher Education). UPI with sufficient conditions in the management of several resources has undoubtedly tried to establish itself as a modern university. The superior human resource support in every competition and the university’s tri dharma is the primary resource…
Read MoreAn Efficient Automotive Paint Defect Detection System
Vision-based defect detection techniques are widely used for quality control purposes. In this work, an efficient deflectometry based detection system is developed for semi-specular/painted surface defect detection. This system consists of a robotic arm that carries a screen/camera setup and can detect defects on large surfaces with different topologies, such as a car bumper, by…
Read MoreMultimedia Application Development With Islamic Critical Reflection Through 3-2-1 Technique for Novice Teacher Internship Program
The use of technology in the learning process has become the most significant point in helping teachers reaching the objectives of the learning. This study focuses on the use of multimedia by novice teachers in comprehending the internship program’s guidance. The Islamic Critical Reflection model is a new and innovative model in the field of…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreA Spectrum Sharing based Metering Infrastructure for Smart Grid Utilizing LTE and WiFi
In advanced metering infrastructure (AMI) of smart grid, WiFi is an appropriate choice for its bidirectional communication requirement to transmit data to the billing center. But, WiFi functions in the free spectrum bands and LTE also requires to use the same free bands for its network expansion being licensed spectrum is limited and expansive. LTE…
Read MoreManaging and Optimizing Quality of Service in 5G Environments Across the Complete SLA Lifecycle
The 5G is the fifth generation of mobile broadband, cellular technologies, and networks that promises a major change in mobility by evolving connected business realities. In such an emerging environment, reliable Service Level Agreements (SLA) and anticipation of breaches of Service Level Objectives (SLO) become compulsory. Thus, guaranteeing the required service quality, while also ensuring…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read MoreObserving and Forecasting the Trajectory of the Thrown Body with use of Genetic Programming
Robotic catching of thrown objects is one of the common robotic tasks, which is explored in a number of papers. This task includes subtask of tracking and forecasting the trajectory of the thrown object. Here we propose an algorithm for estimating future trajectory based on video signal from two cameras. Most of existing implementations use…
Read MoreFuzzy Logic Implementation for Enhanced WCDMA Network Using Selected KPIs
The paper focused on the implementation of fuzzy logic technology for improved Wideband Code Division Multiple Access (WCDMA) network using selected Key Performance Indicators (KPIs). Empirical and analytical methods were principally deployed for the study analyses. Empirical analyses were conducted on two designated networks which are MTN and AIRTEL observed with high network traffic to…
Read MoreState Estimation based Echolocation Bionics and Image Processing based Target Pattern Recognition
This paper deals with the theoretical aspect of bat echolocation and bionics, and image processing-based target recognition and identification methods. The state estimation methods utilizing the linear rustic filters such as fixed gain and Kalman filters are studied and implemented for echolocation bionics for estimating the LOS distance. A complete mathematical modeling and simulation of…
Read MoreStudy on CD ROADM Contention Blocking
Service providers are transferring their static optical transport networks from semi-permanent connections to agile automatic switched optical networks (ASON) with dynamic optical connection provisioning and restoration. To achieve this goal, service providers are looking for flexible optical network ROADMs with CDC capabilities. Although many contention scenarios during network connection provisioning and restoration have been illustrated,…
Read MoreVisualizing Affordances of Everyday Objects Using Mobile Augmented Reality to Promote Safer and More Flexible Home Environments for Infants
This study presented a prototype augmented reality (AR) application that helps visualize the affordances of everyday objects for infants in their home environments to prevent accidents and promote development. To detect and visualize affordances, we observed 16 infants regarding how they perceive and handle common objects from 4 to 12 months of age in their…
Read MoreEnhancing the Energy/Power Efficiency of a DC Distribution Grid for Residential Buildings via Modular Architecture of DC/DC Solid State Transformers
DC power is apparently attempting to breach into the power system – the system which it once lost to the AC power paradigm. DC is already present in the generation, transmission and utilization sides of the system, leaving distribution as the only area where it has not shown any significant presence – this may be…
Read MoreVirtual Output Queues Architecture for High Throughput Data Center Nodes
The latest design approach for Data Centers (DCs) follows the direction of exploiting optical switching to connect Top-of-Rack (ToR) switches that serve thousands of data storing and computing devices. A ToR’s usual function is the Virtual Output Queues (VOQs), which is the prevalent solution for the head-of-line blocking problem of the DC switches. An effective…
Read MoreDefined Limited Fractional Channel Scheme for Call Admission Control by Two-Dimensional Markov Process based Statistical Modeling
The increasing demand for advanced services in wireless networks raises the problem for quality of service (QoS) provisioning with proper resource management. In this research work, such a provisioning technique for wireless networks is performed by Call Admission Control (CAC). A new approach in CAC named by Defined Limited Fractional Channel (DLFC) is proposed in…
Read MoreTheory Building of Quattro Bottom Line Approach for Sustainable Reverse Logistics from Government Perspective: The Indonesia Evidence
Reverse logistics activities are widely used application to preserve the environment in many developed countries from e-waste problem. Due to lack of public awareness in many emerging countries, implementation of reverse logistics program must be initiated by government. Besides that, reverse logistics practices often fail to balance among profit target achievement, the environmental conservation, and…
Read MoreOntology Modeling of Social Roles of Users in Mobile Computing Environments
Today, computing devices of various types with wireless interconnections are used for diverse tasks and increasingly in ad hoc manners. It is not always obvious which devices are present, reachable, and connected when users and their devices are mobile. In such mobile computing environment, the number of registered lines on the network via network operators…
Read MoreInterference Avoidance using Spatial Modulation based Location Aware Beamforming in Cognitive Radio IOT Systems
The Internet of Things (IOT) is a revolutionary communication technology which enables numerous heterogeneous objects to be inter-connected. In such a wireless system, interference management between the operating devices is an important challenge. Cognitive Radio (CR) seems to be a promising enabler transmission technology for the 5G-IOT system. The “sense-and-adapt” smart transmission strategy in CR…
Read MoreConstant Envelope DCT based OFDM System with M-ary PAM Mapper over Fading Channels
Constant Envelope Discrete Cosine Transform based Orthogonal Frequency Division Multiplexing (CE-DCT-OFDM) system with M-ary Pulse Amplitude Modulation (PAM) mapper is considered. In the system phase modulation is used to achieve constant envelope signals that have 0 dB Peak-to-Average-Power Ratio (PAPR). Transmission of such signals permit high power amplifiers in the system to operate with maximum…
Read MoreConstructing Learning-by-Doing Pedagogical Model for Delivering 21st Century Engineering Education
The United Arab Emirates (UAE) is dedicated to establishing the best teaching and learning environment for students and staff across all higher education institutions. To heed this call, the engineering division adopted the Learning-by-Doing (LBD) pedagogical philosophy for 21st Century education at the heart of its strategic directions. This study intends to explore how LBD…
Read MoreReview on security issues in RFID systems
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read More
