Results (1611)
Search Parameters:
Keyword: UseStability of Ionized Air Using Density Functional Theory (DFT) for High Voltage Engineering
In high voltage engineering, air is the one insulation gas that can ionized cause by electrical discharge. Air consisted of many gases such as O2, N2, CO2, H2, etc. In order to study the characteristic of the insulation gas, we can apply density functional theory (DFT) to determine gas ionization level such as charge distribution…
Read MoreBiometric System Vulnerabilities: A Typology of Metadata
This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…
Read MoreConfigurable Process Model: Discovery Approach from Event Logs
In the domain of business process management, the configurable process model is widely used to optimize time and cost of business process models design, which is known as the concept of “reuse”. Using process mining techniques for process model discovery helps to provide a better view on processes and improve quality of models. The majority…
Read MoreClassification Model of Contact Center Customers Emails Using Machine Learning
E-mail is one of the media services used at the contact center. The challenge faced by e-mail services is how to handle e-mails that enter large quantities every day efficiently to provide fast and appropriate service to customers. The purpose of this study is to find which method has the best accuracy in classifying emails…
Read MoreA Study on Development of Information and Communication Ethics Sensitivity Measurement for Elementary School Students
With advances in information and communication technologies and internet technologies, we have many benefits in our daily life. Most people have smart devices and use them for their work and leisure, and so on. However, these advances technologies brought us various side effects such as copyright violation, internet addiction, cybercrimes, personal information infringement, etc. In…
Read MoreComparative Study of Semantic and Keyword Based Search Engines
Day by day, the data on the web becomes very huge which makes it difficult to find relevant information. Search engines are one of the successful factors that can retrieve information from the Web. The process of seeking information by search engines helps users find information on the internet, however it is not an easy…
Read MoreConstrained Path Planning for Both Smooth Motion Profile and Stable Control
In our era, human and machine must share the same workspace in various plants such as warehouse logistics, material transportation, manufacturing factory or assisted human. The collaboration is essential to maintain the safe operation and the complete mission. In this paper, a design of anti-vibration scheme using Spline generator for grounded vehicle platform in human-machine…
Read MoreModelling the Methodology to Assess the Effectiveness of Distributed Information Systems
This research aims to develop the methodology to assess effectiveness of distributed information systems (hereinafter IS). The effectiveness of information systems is reviewed along with their reliability. The article underlines the importance of reliability assessment for large geographically distributed systems. We suggest the approach based on the hierarchical presentation of reliability scheme that constitutes the…
Read MoreRouting Protocols for VANETs: A Taxonomy, Evaluation and Analysis
VANET as a subclass of MANET is composed of a set of vehicles equipped with wireless transceivers, to build dynamic networks without the need of any pre-existing infrastructure. Over the last few decades, the area of routing protocols in VANETs has been extensively studied. Nevertheless, this area remains even more challenging due to some features…
Read MoreThe Financial Services Authority of Indonesia E-Reporting System Development Based on Metadata XBRL Taxonomy
The XBRL taxonomy has been proven to be able to restore various forms of redundancies and ambiguities in making financial reports from financial service institutions. However, the nature of XBRL which is oriented towards documents and based on XML makes the XBRL taxonomy difficult to use because the information cannot be directly read by ordinary…
Read MoreWindowing Accuracy Evaluation for PSLR Enhancement of SAR Image Recovery
Synthetic aperture radar (SAR) is an imaging device mounted on a moving platform. Its ability to identify a weak target from a nearby strong one depends upon the peak side lobe ratio (PSLR). This paper is intended to ameliorate such important ratio through the use of windowing of the transmitted pulse and studying the noise…
Read MoreA Blockchain-Based Architecture for Smart Healthcare System: A Case Study of Saudi Arabia
eHealth is the use of Information and Communication Technologies (ICT) to enhance health quality access. Health care innovations are an essential element of Vision 2030 and National Transformation Program (NTP) 2020 operational plan that will lead to an improvement in the quality of health care in Saudi Arabia. The objective of this paper is to…
Read MoreAdvanced Hybrid Energy Harvesting Systems for Unmanned Aerial Vehicles (UAVs)
The recent use of rotary-wing unmanned aerial vehicles (UAVs) has gained significant interest and continuously been implemented since they are used across the world for civilian, commercial, as well as military applications. The drawback of UAVs is the fight-time due to the limited battery capacity. Therefore, energy harvesting (EH), captured energy from the ambient environment…
Read MoreStoring and Transporting Hazardous Material, Logistics Strategies for Moroccan Companies
Companies manufacturing, using or transporting hazardous materials (HM) face risks at every link in their supply chain. Industrial activities related to this type of material expose not only the workers, but also the population and environment to serious risks. Logistic management and risk management are often considered independent. However, logistics choices related to hazardous materials…
Read MoreAlleviation of Nonlinear Impact Using PAPR Hybrid Technique in CO-OFDM Systems
Orthogonal Frequency Division Multiplexing (OFDM) is a modulation format that has recently attracted lots of consideration interior the long-haul fiber-optic transmission community. The most important advantage of optical OOFDM is its unlimited capability of canceling Inter-Symbol Interference (ISI) caused by Chromatic Dispersion (CD) and Polarization-Mode Dispersion (PMD). Specifically, Coherent OOFDM (CO-OFDM) presents a good and…
Read MorePerformance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. Due to the mobility-related instability of the paths between nodes and due to the limited buffer and energy resources, the ultimate objective of routing protocols in opportunistic…
Read MoreMulti-period Quadratic Programming Model for Sewon-Bantul Facultative Ponds Optimization
Treatment plants have been developed in many countries to handle wastewater, therefore, many pieces of researches have been conducted in order to optimize the outcomes. In this article, a mathematical optimization model was developed using quadratic programming approach to optimize the pollutant degradation at the domestic wastewater facultative stabilization ponds. The data used in this…
Read MoreNovel Cost Function based Motion-planning Method for Robotic Manipulators
In this paper an offline motion-planning algorithm is presented for robotic manipulators. In this method to solve the path-planning task, the Transition-based Rapidly-exploring Random Tree (T-RRT) algorithm was applied, that requires a cost-function over the search space. The goal of this cost-function is to keep distance between the actual position and configurations that cause collisions.…
Read MoreA Multi-Objective Voltage Optimization Technique in Distribution Feeders with High Photovoltaic Penetration
With increasing photovoltaic (PV) penetration on distribution feeders, voltage functions is always a challenge. To control these variations due to the intermittent nature of PV generation,many utility companies use the traditional voltage regulating devices such as ON/OFF load tap changers, voltage regulators, switched capacitor banks and reactors. The use of smart inverters (SI) has been…
Read MoreFire System for an Automated Electrical Substation via Programmable Logic Controller
This article presents the development of an automatism by means of a Programmable Logic Controller (PLC), for the Fire System of an Electric Substation; For this, the areas belonging to the electrical substation are initially described, where the automatism is developed, these being three; Patio area (Transformer location), Distribution board area and Control room. Then…
Read MoreMIMO Fractional Order Control of a Water Tank Plant
This work implements a MIMO (Multiple Input Multiple Output) FO (Fractional Order) control system for controlling the level and temperature of the water inside a tank by means of two inflow rates: cold and hot water, which are mixed to produce an outflow rate. Such a process exhibits coupling between inputs and outputs. A linear…
Read MoreFabrication of Glaze Material from Recycled Bottle Glass and Kaolin
This research aimed at developing a method of glaze material making from used glass bottle waste combined with kaolin. Then, the microstructure and hardness level of glaze products were characterized. Furnace heaters were used in research to heat glaze material by varying the holding time of 30, 45 and 60 minutes. The composition of glaze…
Read MoreA Comparative Study of Safety Leading and Lagging Indicators Measuring Project Safety Performance
The safety management system is recognized by safety leading and lagging indicators, and their correlation with injury rates. The background on this specific subject is vague in definition, labelling, and indicators measurement. The comparativeness between leading and lagging indicators have been introduced in the constructing safety performance projects evaluation. Safety performance leading indicators are the…
Read MoreBPMN4 Collaboration: An Extension for collaborative Business Process
Nowadays the collaboration of organizations, systems or services becomes more and more answered in practice. Indeed, organizations try to expand their service, other to satisfy the needs of their customers. Thus, the need to work collaboratively with other partners whether internally or externally becomes trivial. However, process modeling in a collaborative environment becomes heavy because…
Read MoreFuzzy Modelling using Firefly Algorithm for Phishing Detection
A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm…
Read More
