Results (1611)
Search Parameters:
Keyword: UseA Critical Analysis of Usability and Learning Methods on an Augmented Reality Application for Zoology Education
In recent years, research has been conducted focused on the use of technologies in the classroom, but one of the main problems is to demonstrate that the use of this technology favors learning compared to traditional methods. One of these technologies is augmented reality that allows seeing virtual objects superimposed in the real world, but…
Read MoreTerritorial Sales Redesign Using Geotechnical Tools
In recent years there has been technological growth in the field of facility location, considering it as a significant factor to achieve greater competition among companies. The present work gives a methodological solution for a territorial redesign in a Mexican automotive parts distribution company with the support of Geotechnological tools like Geographic Information Systems (GIS)…
Read MoreIn-Plane Shear Behavior of Unreinforced Masonry Walls Strengthened with Fiber Reinforced Polymer Composites
Unreinforced masonry (URM) wall is one of the oldest types of walls used around the world. During earthquakes, URM walls present a real danger to life safety due to their behavior characterized by a brittle failure caused by their feeble shear resistance to in-plane loads, which make their strengthening necessary. Numerous studies had been used…
Read MoreMutual Reduction in the Coupling of the MIMO Antenna Network Applied to the Broadband Transmission
In this article, a new form of UWB (ultra-wide-band) antenna operating to the desired specifications, obtained from a base antenna to which some modifications are made. The proximity of the antennas causes a mutual coupling phenomenon thus generating an apparent modification of their characteristics. It is therefore crucial to have the minimum level of insulation…
Read MoreExtending Movable Surfaces with Touch Interaction Using the VirtualTablet: An Extended View
Immersive output and natural input are two core aspects of a virtual reality experience. Current systems are frequently operated by a controller or gesture-based approach. However, these techniques are either very accurate but require an effort to learn, or very natural but miss haptic feedback for optimal precision. We transfer ubiquitous touch interaction with haptic…
Read MoreA Sustainable Multi-layered Open Data Processing Model for Agriculture: IoT Based Case Study Using Semantic Web for Hazelnut Fields
In recent years, several projects which are supported by information and communications technologies (ICT) have been developed in the agricultural domain to promote more precise agricultural activities. These projects account for different kinds of key ICT terms such as internet of things (IoT), wireless sensors networks (WSN), cloud computing (CC). These projects are used for…
Read MoreEvolutionary Quantum Technology: The Future with Holographic Plasma Voxel
This current situation will affect the future, technology models that are unthinkable or which impossible to happen pops up one by one. Like the hologram, this technology began to develop as a solution to increase user comfort in operating a system that is needed. This paper explains the development of hologram technology that is currently…
Read MoreThe Adventure of BipBop: An Android App Pathfinding Adventure Game
The purpose of this research is to build an android based pathfinding adventure game where user gets information about Indonesian culture, especially the traditional houses including the folk songs and the traditional weapons in certain areas. The method used is by questionnaires, interviews, observation, and literature study. This application also implements the A* algorithm to…
Read MoreScapy Scripting to Automate Testing of Networking Middleboxes
Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…
Read MoreA Systematic Literature Review of Vessel Anomaly Behavior Detection Methods Based on Automatic Identification System (AIS) and another Sensor Fusion
The high flow of vessel traffic affects the difficulty of monitoring vessel in the middle of the sea because of limited human visibility, occurrence of vessel accidents at the sea and other illegal activities that illustrate abnormal vessel behavior such as oil bunkering, piracy, illegal fishing and other crimes that will continue and will certainly…
Read MoreAnalyzing Job Tenure Factors in Private and Public Companies in Albania by Using Cox Proportional Hazards Model
Job tenure is an important factor for both employees and employers. Sometimes, for employees, this time is a criterion in starting new job, and also for employers when they have to hire new employees. It measures the length of time that employees have been in their current job or with their current employer. Analyzing factors,…
Read MoreSafety in Industry 4.0: The Multi-Purpose Applications of Augmented Reality in Digital Factories
The digital factory is a concept signing a new era for industry, the so-called Industry 4.0, in which ordinary production systems like manufacturing plants, machineries and utilities are being equipped with diagnostic and sensitive instrumentation to be connected to digital shared networks. This data-sharing, trough the big data management techniques, is a fully integrated base…
Read MoreA Framework for Plans Permeable Breakwater Eco-Friendly Building Identification and Characteristics Materials Construction Study Case at Demak Village
Demak is located on the north coast of Java, precisely in Central Java Province, Indonesia which has many problems related to erosion and shoreline degradation. This study attempts to analyze, identify, and select the materials to build eco-friendly permeable breakwater in Demak. The research was conducted during 2014, consist of several activities, i.e. identified the…
Read MoreEnhancing an SDN Architecture with DoS Attack Detection Mechanisms
A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…
Read MoreSystem of Sequential D-Optimal Identification for Dynamic Objects in Real-Time Scale
The article is devoted to the formalization and development of the theory of sequential experimental design for optimal identification of dynamic objects. The algorithmic and technical support for a system of sequential D-optimal identification for a wide class of dynamic objects in real time is considered. This system is universal and can be used for…
Read MoreControl of Electrostatic Suspension System Using Pulse Width Modulation
Electrostatic suspension systems have great potential applications in contactless transportation objects since they allow many different materials to be suspended. The electrostatic suspension will be widely applied in practice if the system cost is inexpensive. This paper presents an electrostatic suspension system controlled by using pulse width modulation (PWM). The use of PWM in electrostatic…
Read MoreAn Algorithm to Improve Data Accuracy of PMs Concentration Measured with IoT Devices
Air pollution is responsible for increased morbidity and mortality due to respiratory problems mainly caused by long term exposure. Although the emissions of principal air pollutants are highly regulated, there is a lack of information about the real extent of personal exposure for an accurate health impact assessment. To tackle these challenges, local air pollution…
Read MoreThe Implementation of Smart Farming Application Based on the Microcontroller and Automatic Sprinkler Irrigation System of Agricultural Land
This research to applying the application of e-smart farming to control the sprinkler irrigation on agricultural land. This study aims to be able to help farmers to solve the watering problems that are manually carried out into watering done automatically and controlled, besides that this research also obtained data about the level of moisture content…
Read MoreDynamic Behavior of Multi-Story Concrete Buildings Based on Non-Linear Pushover & Time History Analyses
In many countries and regions in the world, earthquakes are one of the most common natural disasters, which affect both human life and property. To avoid negative effects of earthquake, the nonlinear response of structures under dynamic loading should be accurately modeled to investigate their actual behavior under earthquake loading to ensure safe and sound…
Read MoreBig Data Analytics Using Deep LSTM Networks: A Case Study for Weather Prediction
Recurrent Neural Networks has been widely used by researchers in the domain of weather prediction. Weather Prediction is forecasting the atmosphere for the future. In this proposed paper, Deep LSTM networks has been implemented which is the variant of RNNs having additional memory block and gates making them capable of remembering long term dependencies. Fifteen…
Read MoreLead Bioaccumulation in Root and Aerial Part of Natural and Cultivated Pastures in Highly Contaminated Soils in Central Andes of Peru
Lead concentration on surface soil (0-20 cm), root and aerial part of natural and cultivated pastures were evaluated, in the rainy season (March 2018), collected in 20 sites of a rural community located 20 km from the La Oroya metallurgical complex , which has been emitting to the environment particulate material with heavy metals since…
Read MoreNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read MoreIn Body Antenna for Monitoring and Controlling Pacemaker
This paper is an extension of work originally presented in 2019 International Conference on Automation, Computational and Technology Management (ICACTM). A micro-strip patch in-body designed antenna is constructed on pacemaker to monitor and control the pacemaker wirelessly. The antenna is intended for ISM (Industrial, Scientific, and Medical) band (2.4 GHz to 2.48 GHz). A perfect…
Read MorePerformance Evaluation and Examination of Data Transfer: A Review of Parallel Migration in Cloud Storage
Recent years have seen a continued pattern of development in the cloud computing field. Numerous approaches to maximize file transfer capacity are still completely standing for use on cloud computing storage; however, they do not maximize the advantage of data migration scalability and elasticity in cloud storage. One potential problem is that elasticity takes time;…
Read MoreImprovement of the Natural Self-Timed Circuit Tolerance to Short-Term Soft Errors
The paper discusses the features of the implementation and functioning of digital self-timed circuits. They have a naturally high tolerance to short-term single soft errors caused by various factors, such as nuclear particles, radiation, and others. Combinational self-timed circuits using dual-rail coding of signals are naturally immune to 91% of typical soft errors classified in…
Read More
