Results (1057)
Search Parameters:
Keyword: ArtDependence-Based Segmentation Approach for Detecting Morpheme Boundaries
The unsupervised morphology processing in the emerging mutant languages has the advantage over the human/supervised processing of being more agiler. The main drawback is, however, their accuracy. This article describes an unsupervised morphemes identification approach based on an intuitive and formal definition of event dependence. The input is no more than a plain text of…
Read MoreMethodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…
Read MoreAviation Navigation with Use of Polarimetric Technologies
The article deals with the problem of increasing the accuracy of determination of aircraft’s navigation flight parameters. Increasing the accuracy and sensitivity of navigation parameters determination will improve the efficiency of air conveyance by optimizing the flight trajectories and reducing the flight time and simultaneously will ensure the sufficient level of air conveyance safety. The…
Read MoreTravelling Wave Solutions of Coupled Burger’s Equations of Time-Space Fractional Order by Novel (Gʹ/G)-Expansion Method
In this paper, Novel (Gʹ/G)-expansion method is used to find new generalized exact travelling wave solutions of fractional order coupled Burger’s equations in terms of trigonometric functions, rational functions and hyperbolic functions with arbitrary parameters. For the conversion of the partial differential equation to the ordinary differential equation, complex transformation method is used. Novel (Gʹ/G)-expansion…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreDetection of Vandalism in Wikipedia using Metadata Features – Implementation in Simple English and Albanian sections
In this paper, we evaluate a list of classifiers in order to use them in the detection of vandalism by focusing on metadata features. Our work is focused on two low resource data sets (Simple English and Albanian) from Wikipedia. The aim of this research is to prove that this form of vandalism detection applied…
Read MorePseudo-Analysis: Measures of General Conditional Information
The aim of this paper is to continue our study of information in the setting of Pseudo-Analysis. We shall present, by axiomatic way, the definition of measures of general conditional information and we shall study particular measure by using a system of functional equations in which it is present a pseudo-operation. We know that J.Aczel…
Read MoreEvaluation of Three Evaporation Estimation Techniques In A Semi-Arid Region (Omar El Mukhtar Reservoir Sluge, Libya- As a case Study)
In many semi-arid countries in the world like Libya, drinking water supply is dependent on reservoirs water storage. Since the evaporation rate is very high in semi-arid countries, estimates and forecasts of reservoir evaporation rate can be useful in the management of major water source. Many researchers have been investigating the suitability of estimates evaporation…
Read MoreA Clinical Review of Zika Virus (ZIKAV)
Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…
Read MoreEffects of the Metropolitan Civil Resilience Program: Comparison of the SAT Resilience Program and an Exercise Program
Purpose: To conduct preliminary research for developing a program to enhance resilience, a topic that has generated attention of late. Methods: We compared the Structured Association Technique (SAT) resilience program and an exercise program. The citizen’s lecture on stress management occurred 1 month after East Japan Earthquake, and the intervention was carried out in the afternoon of…
Read MorePower-Energy Simulation for Multi-Core Processors in Bench-marking
At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important…
Read MoreInternet of Things: An Evolution of Development and Research area topics
Internet of Things (IoT) is a hot topic in the Europe Union (EU). In the year of 2015 the EU established an Alliance of Internet of Things Innovation (AIOTI) and this alliance included the IoT European Research Cluster (IERC) on the Internet of Things in the work group 01. IERC was established in 2007 and…
Read MoreWireless Android Based Home Automation System
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…
Read MoreHow Effective is Using Lip Movement for Japanese Utterance Training
Lip movements have long been the subject of research. There are many methods of lip movement recognition, such as the calculation of the amount of movement compared to a matching face pattern. In a previous study, we investigated utterance recognition based on the power spectrum by focusing on lip movements, which is one aspect of…
Read MorePerformance of Surge Arrester Installation to Enhance Protection
The effects of abnormal voltages on power system equipment and appliances in the home have raise concern as most of the equipments are very expensive. Each piece of electrical equipment in an electrical system needs to be protected from surges. To prevent damage to electrical equipment, surge protection considerations are paramount to a well designed…
Read MoreSemantic modeling of portfolio assessment in e-learning environment
In learning environment, portfolio is used as a tool to keep track of learner’s progress. Particularly, when it comes to e-learning, continuous assessment allows greater customization and efficiency in learning process and prevents students lost interest in their study. Also, each student has his own characteristics and learning skills that must be taken into account…
Read MoreCross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs
To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…
Read MoreRecent Trends in ELM and MLELM: A review
Extreme Learning Machine (ELM) is a high effective learning algorithm for the single hidden layer feed forward neural networks. Compared with the existing neural network learning algorithm it solves the slow training speed and over-fitting problems. It has been used in different fields and applications such as biomedical engineering, computer vision, remote sensing, chemical process…
Read MoreA Novel Approach for Designing Mobile Native Apps
Mobile devices are differed from desktop based systems in terms of particular execution environment, constrained resources, and high mobility requirement. To overcome these shortcomings, various agile based methodologies are developed for native mobile applications such as Mobile-D, Scrum etc. These agile techniques are based on various phases and these phases begin from exploring, initializing and…
Read MoreOptimized Multi-focus Image Fusion Using Genetic Algorithm
Optical imaging systems or cameras have a convex lens with limited depth of field. So, multi-focus images are obtained when such systems are used to capture an image of a particular scene. These images are fused to get all-in-focus image. This paper proposes a new simpler method of multi-focus image fusion. Instead of decomposing input…
Read MoreA Web-Based Decision Support System for Evaluating Soil Suitability for Cassava Cultivation
Precision agriculture in recent times had assumed a different dimension in order to improve on the poor standard of agriculture. Similarly, the upsurge in technological advancement, most especially in the aspect of machine learning and artificial intelligence, is a promising trend towards a positive solution to this problem. Therefore, this research work presents a decision…
Read MoreThe Class Imbalance Problem in the Machine Learning Based Detection of Vandalism in Wikipedia across Languages
This paper analyses the impact of current trend in applying machine learning in detection of vandalism, with the specific aim of analyzing the impact of the class imbalance in Wikipedia articles. The class imbalance problem has the effect that almost all the examples are labelled as one class (legitimate editing); while far fewer examples are…
Read MoreSystem Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate
Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…
Read MoreAdaptive Intelligent Systems applied to two-wheeled robot and the effect of different terrains on performance
This work discuss two different intelligent controllers: Online Neuro Fuzzy Controller (ONFC) and Proportional-Integral-Derivative Neural Network (PID-NN). They were applied to maintain the equilibrium and to control the position of a two-wheeled robot prototype. Experiments were carried out to investigate the equilibrium control and movement of the two-wheeled robot first on flat terrain, then in…
Read MoreFIDIC Conditions of Subcontract as a Model for General Conditions of Subcontract in Pakistan
Fair allocation of risks in conditions of contract is pivotal for coordination, unhindered execution, dispute resolution and maintenance of positive relationship among the parties executing the contract. Pakistani construction industry despite subcontracting a large percentage of construction projects lacks standard conditions of subcontract and they are primarily based on the will of the prime contractor…
Read More
