Results (1523)
Search Parameters:
Keyword: SPTransfer Function Analysis of Fractional-Order Three-Dimensional Electrically Coupled Cell Network
In this paper, a novel method is proposed for the dynamic analysis of fractional- order three-dimensional electrically coupled cell network. In general, three- dimensional cell network is constructed by combining three one-dimensional circuit networks. Analysis method is based on the principles of the dynamic analysis with transfer function approximation. Although fractional-order three-dimensional circuit network model…
Read MoreEarly Detection of Alzheimer’s Using Digital Image Processing Through Iridology, An Alternative Method
Over the years, alternative medicine has carried out numerous systematic studies related to the ophthalmological field, specifically the eye. Studies that propose as support of analysis to the Iridology, which studies the alterations of the iris in correspondence with the organs of the human body. Thus, it presents the opportunity to investigate neuronal diseases related…
Read MoreCognitive Systems for Monitoring: Architectural View
The modern stage of information technology development is characterized by the acute need to use cognitive technologies for the solution of tasks of practice, in particular, in the sphere of real world objects monitoring and management. Practical usage of cognitive systems of monitoring is significantly limited to two factors now: operation at the level of…
Read MoreMultimedia Application Development With Islamic Critical Reflection Through 3-2-1 Technique for Novice Teacher Internship Program
The use of technology in the learning process has become the most significant point in helping teachers reaching the objectives of the learning. This study focuses on the use of multimedia by novice teachers in comprehending the internship program’s guidance. The Islamic Critical Reflection model is a new and innovative model in the field of…
Read MoreAnalysis of Fuzzy Data for the Selection of Ingredients of the Polymer Composition by Technical Functions in Quality Management
The task of fuzzy mathematical modeling of the composition of a polymer composition is singled out and formulated, as one of the types of chemical-technological systems for creating the theoretical foundations for managing the physicochemical properties of the material produced from this composition. Fuzzy data on the technical functions and concentration of individual ingredients that…
Read MoreMulti-Step Iteration Algorithm of Total Asymptotically Quasi-Nonexpansive Maps
In Banach spaces an iteration algorithm for two finite families of total asymptotically quasi-nonexpansive maps is introduced. Weak and strong convergence theorems of this algorithm to approximation common fixed points are proved by using suitable conditions. As well as, numerical example by using Mat-lab is given.
Read MoreAn Expanded Derivation of Suppressing Anisotropic Birefringence in a Rectangular Waveguide
Birefringence is a known property of anisotropic media where incidence of a single propagating wave on a biaxial boundary gives rise to what scientists refer to as an ordinary wave and extraordinary wave. This article explores the anisotropic electromagnetic theory that gives rise to the phenomenon of birefringence focusing on both ordinary and extraordinary plane…
Read MoreFlame Distribution and Attenuation in Narrow Channels Using Mathematical Software
The article of given research presents the mathematical and computer modeling of flame attenuation in narrow channels for different fire extinguishing and explosion suppression compositions. Such kind of flame distribution and attenuation could be considered for different media and channels but in this case it was considered for narrow channels. The effect on the combustion…
Read MoreWalker Ergonomic Design for Visually Impaired Elderly
The study proposed a self-driven guidance walker through user-oriented integration design. The common two-wheel drive performs left and right turn. By reducing the weight of the walker body, the durability of the battery can be increased. Secondly, we use a foldable structure so that the walker can be conveniently stored in a small space. A…
Read MoreStress Level Classification Using Heart Rate Variability
The research programme reported in this paper is set within the framework of our research under the theme of ICT support for Active Healthy Ageing (AHA). This longitudinal empirical research is focused on the study of the impact on the management of cardio-vascular disease if supported by sustained health monitoring using wearable connected devices. One…
Read MoreResourceful Residual Energy Consumption in TDMA Scheduling for IoT-based Wireless Sensor Network
Recently, wireless sensor network (WSN) gets more concern due to the robustness in the latest communication technology iteration such as big data, IoT and 5G. Such daily usage of these technologies includes smart home, smart farming, smart traffic control etc. Moreover, WSN becomes the best preference for mobile objects in data accumulating in a wild…
Read MoreAn Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador
Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…
Read MoreVowel Classification Based on Waveform Shapes
Vowel classification is an essential part of speech recognition. In classical studies, this problem is mostly handled by using spectral domain features. In this study, a novel approach is proposed for vowel classification based on the visual features of speech waveforms. In sound vocalizing, the position of certain organs of the human vocal system such…
Read MoreBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreRelational Databases Versus HBase: An Experimental Evaluation
Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…
Read MoreA Formal Ontology-based Framework Towards an Intelligent Temporal Scheduler
Time scheduling as seen in timetabling processes with few and/or competing resources has exposed complex interoperable time scheduling. Attempts to resolving these time scheduling processes has been undertaken, using several classical methods, with difficulty due to inherent complexities, constraints and conflicting issues. The use of ontology-based approaches to resolve time complexity is recently adopted due…
Read MoreEffects of The Low-Resolution 3D Video Clip on Cerebrum Blood Flow Dynamics
We have already succeeded in findings that stereoscopic video clips enhance brain activity. We herein increase the knowledge about the influence of 3D and blurred images on the human body, especially on brain activity. From of old, it has been pointed out that the motion sickness is induced by the blurred images. In this study,…
Read MoreDistribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field
The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreConversion of 2D to 3D Technique for Monocular Images using Papilio One
A 3D image adds realism in viewing experience and can assist in simplifying the graphical displays. A Third dimension supplement to the input can improve pattern recognition, and can be used for 3D scene reconstruction and robot navigation. Recently popularity of 3D hardware is also increased which makes it a hot topic. The production of…
Read MoreITSM Software Ranking for Small Medium Enterprises Based on ITIL V3 Quick Win Criteria using Fuzzy SIR Method
There are various software related to the implementation of IT Service Management (ITSM) for a company, including those that are open source and commercial. An input is needed for companies in determining what software to choose from various software, especially for small and medium enterprises (SMEs) that have limited human and financial resources. In this…
Read MoreEnabling the Edge – A method for dynamic virtualizable connections for 5G deployments
The telecommunications industry continues to move forward with plans for 5G service with rates including 6Gb/s followed by upgrade paths promising 20Gb/s. Despite advances in wireless technology associated with 5G roll-outs, there remains the problem of providing sufficient backhaul throughput and efficient handling of hand-off services within the relatively small projected cell boundaries that can…
Read MoreA New Model of Supplier’s Selection for Sustainable Supply Chain Management
In the last years, industrial company began to understand the central role that plays sustainable supplier selection (SSS) process for obtaining a sustainable supply chain (SSC). This paper proposes a new multi-criterion decision-making (MCDM) model for managers, which makes it possible to select the best suppliers who respect the sustainable development (SD) concept for a…
Read MoreVirtualization in Cloud Environment: Bandwidth Management
Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…
Read MoreA Critical Analysis of Topics in Software Architecture and Design
Software architecture and design is an important component in the software engineering field. This aspect of software engineering covers the functional and non-functional requirements of any system being proposed to be developed, while software architecture deals with non-functional requirements, software design entails the functional requirements. The objective of this paper is to critically analyze current…
Read More
