Results (1507)
Search Parameters:
Keyword: CatOptimization of the Procedures for Checking the Functionality of the Greek Railways: Data Mining and Machine Learning Approach to Predict Passenger Train Immobilization
Information is the driving force of businesses because it can ensure the ability of knowledge and prediction. The railway industry produces a huge volume of data, with the proper processing of them and the use of innovative technology, there is the possibility of beneficial information to be provided which constitute the deciding factor for the…
Read MoreCoastal Risk Modelling for Oil Spill in the Mediterranean Sea
The accident probability estimation and the consequence analysis are based on statistical data about oil spill accident occurrence in the Mediterranean area, on the probability of different release sizes, and on the joint probability of wind speed and directions. The risk model and its evaluation have been assessed for the Mediterranean littoral considering the time…
Read MoreExploring the Performance Characteristics of the Naïve Bayes Classifier in the Sentiment Analysis of an Airline’s Social Media Data
Airline operators get much feedback from their customers which are vital for both operational and strategic planning. Social media has become one of the most popular platforms for obtaining such feedback. However, to analyze, categorize, and generate useful insight from the huge quantity of data on social media is not a trivial task. This study…
Read MoreDiffusion of Technology for Language Challenges in the South African Healthcare Environment
Even though mobile technologies are increasingly used to enable communications between providers and receivers of healthcare services, there remain severity challenges owing to the use of various indigenous languages in many Africa countries. Some of the challenges get worst in a countries like South Africa where there are eleven official languages. As a result, interpreters…
Read MoreContextualization of the Augmented Reality Quality Model through Social Media Analytics
Augmented Reality applications are gaining popularity while maintaining novelty. Many industries are utilizing the user interface type, and use cases are becoming repeat patterns of problem solutions. Despite this rising popularity, quality has not matured nor has the technology become mainstream. Novelty must be approached as risk, and risk must be evaluated for and tested…
Read MoreIndustry 4.0 Operators: Core Knowledge and Skills
One of the most important technological changes due to the arrival of Industry 4.0, an initial, gradual, and complex process of technology transfer is taking place, which strongly relies on the integration of universities, industries, and governments. In this context, to make the Industry 4.0 approach a reality, several requirements need to be met. One…
Read MoreModelling and Simulation of Aerodynamic Parameters of an Airship
The dynamic modelling of an airship is the primary requirement in designing and developing a control system for a particular application. Extracting/predicting/modelling the aerodynamic coefficients is a crucial step towards the modelling of an airship. There is a huge amount of literature on the aerodynamic modelling of airships which presents experimental as well as analytical…
Read MoreNearest Neighbour Search in k-dSLst Tree
In the last few years of research and innovations, lots of spatial data in the form of points, lines, polygons and circles have been made available. Traditional indexing methods are not perfect to store spatial data. To search for nearest neighbour is one of the challenges in different fields like spatiotemporal data mining, computer vision,…
Read MoreA Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network
Restoring, estimating the fully 3D hand skeleton and pose from the image data of the captured sensors/cameras applied in many applications of computer vision and robotics: human-computer interaction; gesture recognition, interactive games, Computer-Aided Design (CAD), sign languages, action recognition, etc. These are applications that flourish in Virtual Reality and Augmented Reality (VR/AR) technologies. Previous survey…
Read MoreComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreDesign of an EEG Acquisition System for Embedded Edge Computing
The human brain is one of the most complex machines on the planet. Being the only method to get real-time data with high temporal resolution from the brain makes EEG a highly sought upon signal in the neurological and psychiatric domain. However, recent developments in this field have made EEG more than just a tool…
Read MoreOptimization of Dual Motion Mechanism with Double Grooved Cams for High-voltage Gas Circuit Breaker
A novel design of a dual motion mechanism for a high-voltage gas circuit breaker is presented. The contact motion of the circuit breaker due to the operating mechanism increases capacitive current switching (CCS) performance. CCS is one of the interrupting duties of the circuit breaker, where high voltage is applied during the half cycle from…
Read MoreContribution in Private Cloud Computing Development based on Study and KPI Analysis
The preset paper describes a contributes in the implementation of private Cloud Computing. Exhaustive study made validates Cloud environment creation and successful deployed Solution Configuration choice. Related solution ensures a good investment that reduces energy costs of the data center, minimizes network traffic cost proven as an NP-hard problem. In addition, each virtual machine (VsM)…
Read MoreMulti-Agent Data Recognition System Based on Received Signal in Antenna on Board Telecom System
Information data recognition during traditional operating step in telecommunication system, as their interpretation, presents an important active research field. In this context, we propose as a solution multi-agent data identification system starting with received signal parameters in antenna network connected on board telecom system. Due to the Information Identification Data (IID) response variability that differ…
Read MoreAdapting to Individual Differences (ATID) For Inductive Thinking and Learning Purpose
The research in general aims to develop students’ writing skills by applying a model with reader response strategy and visual symbols to promote students’ morals. Specifically, this inquiry is expected to describe the acceptability, comparison, impact, strength, and shortcomings, and the model Adapting To Individual Differences (ATID) of Indonesian literature learning to promote writing skills.…
Read MoreOntologic Design of Software Engineering Knowledge Area Knowledge Components
The article sets forth the solution of the educational resources semantic context knowledge components development task, based on the learning technology project-oriented concepts, graduate’s competency model and ontological; engineering. The being considered ontology model and knowledge display formalisms allow, firstly, relevantly image the educational resources semantic context in the support concepts ontology format, and their…
Read MoreA Fuzzy-PID Controller Combined with PSO Algorithm for the Resistance Furnace
The paper presents a novel control strategy applying the particle swarm optimization (PSO) algorithm to optimize the scaling weights coefficients of the fuzzy-PID controller for the resistance furnace temperature control system, called PSO-based fuzzy-PID controller/ algorithm. The proposed PSO-based fuzzy-PID controller in this paper consist of the fuzzy-PID controller and the PSO algorithm. The proposed…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreSmart Transmission Line Maintenance and Inspection using Mobile Robots
The paper presents sharing several of experiences and practices on smart robotic application for overhead transmission line maintenance and inspection. First, the pilot-line pulling robot is an invention used to pull a pilot line which is an important step for additional high voltage conductor installation. The puller robot can traverse the overhead ground wire, OHGW,…
Read MoreMonte Carlo Estimation of Dose in Heterogeneous Phantom Around 6MV Medical Linear Accelerator
In this work, we completed a validation of the Varian Clinac IX equipped with the High Definition Multi-Leaf Collimator (HD 120 MLC) instead of the removable jaws, using GATE Monte Carlo Platform version 8.2. We validated the multileaf collimator (MLC) geometry by simulating two dosimetric functions (Percentage Depth Dose (PDD) and Dose Profile (DP)), for…
Read MoreThe Design of an Experimental Model for Deploying Home Area Network in Smart Grid
In the smart power grid, designing an efficient and reliable communication architecture has an important role in improving efficiency, and maintaining the connectivity of different network components. The home area network (HAN) provides an energy management system in houses since it enables home energy control and monitoring. So, it is imperative to determine a HAN…
Read MoreA Survey on Image Forgery Detection Using Different Forensic Approaches
Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…
Read MoreANN Based MRAC-PID Controller Implementation for a Furuta Pendulum System Stabilization
Nowadays, process automation and smart systems have gained increasing importance in a wide variety of sectors, and robotics have a fundamental role in it. Therefore, it has attracted greater research interests; among them, Underactuated Mechanical Systems (UMS) have been the subject of many studies, due to their application capabilities in different disciplines. Nevertheless, control of…
Read MoreAnalysis of Local Rainfall Characteristics as a Mitigation Strategy for Hydrometeorology Disaster in Rain-fed Reservoirs Area
The Gembong reservoir in Pati Regency, Java, Indonesia is a rain-fed reservoir, which experiences a depletion of it carrying capacity. The characteristic of local rainfall is one of the important factors in assessing the potential of hydrometeorology disasters in its area. Sedimentation in watersheds and reservoirs has covered water sources, so local rainfall determines the…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read More
