Results (653)
Search Parameters:
Keyword: AnalysisThermal Performance Analysis of Parabolic Trough Solar Collector System in Climatic Conditions of Errachidia City, Morocco
The water heating with parabolic trough solar collectors (PTC) is a very widespread and at the same time quite promising solar technology. However, PTC presents several problems in terms of the profitability of water heating. For this reason, our study of water heating with PTC collectors consists of two main parts. In the first part,…
Read MoreTransient Analysis of a Line-Start Synchronous Reluctance Motor with Symmetrical Distributed Brass Rotor Bars
In this paper, the performance evaluation of a line-start three-phase Synchronous Reluctance Motor (SynRM) with symmetrical distributed brass rotor bars is presented. The machine, which has been designed from a conventional three-phase induction motor (IM) NEMA frame stator is proposed as an alternative to a squirrel cage induction motor (SCIM). The 2D Finite Element Analysis…
Read MoreAnalysis of Security-Reliability Trade-off for Multi-hop Cognitive Relaying Protocol with TAS/SC Technique
This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage probability (OP)) for a multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, in presence of a multi-antenna eavesdropper. In the considered protocol, all primary and secondary terminals are equipped with multiple antennas, and they employ transmit antenna selection (TAS)…
Read MorePerformance Analysis of Grid-Connected PV Rooftop, at Sakon Nakhon Province, Thailand
The performance ratio (PR) based on IEC 61724 standard is calculated under the influence of seasonal variations and the capability of the system. On the other hand, The National Renewable Energy Laboratory (NREL) of the U.S. Department of Energy proposed the weather-corrected performance ratio (PRcorr). This PRcorr index calculates the performance of the PV system…
Read MorePerformance Analysis of Go-Back-N ARQ Protocol Used in Data Transmission Over Noisy Channels
Automatic Repeat reQuest (ARQ) protocols are used to control transmission errors in data communications. They are used at Data Link Control (DLC) sublayer of Data Link Layer (DLL) of OSI (Open Systems Interconnection) network model to achieve flow and error control and provide smooth and reliable transmission between network nodes. ARQ protocols use acknowledgments and…
Read MoreSurvey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB
Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…
Read MoreExploring the Performance Characteristics of the Naïve Bayes Classifier in the Sentiment Analysis of an Airline’s Social Media Data
Airline operators get much feedback from their customers which are vital for both operational and strategic planning. Social media has become one of the most popular platforms for obtaining such feedback. However, to analyze, categorize, and generate useful insight from the huge quantity of data on social media is not a trivial task. This study…
Read MoreContribution in Private Cloud Computing Development based on Study and KPI Analysis
The preset paper describes a contributes in the implementation of private Cloud Computing. Exhaustive study made validates Cloud environment creation and successful deployed Solution Configuration choice. Related solution ensures a good investment that reduces energy costs of the data center, minimizes network traffic cost proven as an NP-hard problem. In addition, each virtual machine (VsM)…
Read MoreMeasurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia
The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…
Read MoreBalance as One of the Attributes in the Customer Segmentation Analysis Method: Systematic Literature Review
The banking industry is very competitive. To utilize the information, they have in order to be a competitive advantage winner is reasonably very crucial for the company. At present, the company does not only focus on the company’s strategy that prioritizes products (e.g. product or service oriented), however also necessitates to focus on the company’s…
Read MoreAnalysis of Local Rainfall Characteristics as a Mitigation Strategy for Hydrometeorology Disaster in Rain-fed Reservoirs Area
The Gembong reservoir in Pati Regency, Java, Indonesia is a rain-fed reservoir, which experiences a depletion of it carrying capacity. The characteristic of local rainfall is one of the important factors in assessing the potential of hydrometeorology disasters in its area. Sedimentation in watersheds and reservoirs has covered water sources, so local rainfall determines the…
Read MoreAnalysis and Improvement of an Innovative Solution Through Risk Reduction: Application to Home Care for the Elderly
The increase in the number of elderly people requires multiple efforts to maintain their well-being and health. A wide variety of products and services have been created to enable seniors to live at home for as long as possible. The market success of these solutions depends on acceptance by the different stakeholders. Older people are…
Read MorePerformance Analysis of Joint Precoding and Equalization Design with Shared Redundancy for Imperfect CSI MIMO Systems
Analytical researches on a potential performance of multipath multiple-input multiple-output (MIMO) systems inspire the development of new technologies that decompose a MIMO channel into independent sub-channels on the condition of constrained transmit power. Moreover, in current studies of inter-symbol interference (ISI) MIMO systems, there is an assumption that channel state information (CSI) at receivers and/or…
Read MoreUniversity Students Result Analysis and Prediction System by Decision Tree Algorithm
The main assets of universities are students. The performance of students plays a vital role in producing excellent graduate students who will be the future viable leader and manpower in charge of a country’s financial and societal progress. The purpose of this research is to develop a “University Students Result Analysis and Prediction System” that…
Read MoreDesign, Implementation and Performance Analysis of a Dual Axis Solar Tracking System
This study presents the design and construction of the Dual Axis Solar Tracking System to ensure maximum energy gain. The solar tracking system will automatically follow the sun’s position to maximize the intensity of the light emitted from the sun. When the light intensity decreases, the system automatically changes its direction to get the maximum…
Read MoreA Novel Hybrid Method for Segmentation and Analysis of Brain MRI for Tumor Diagnosis
It is difficult to accurately segment brain MRI in the complex structures of brain tumors, blurred borders, and external variables such as noise. Much research in developing as well as developed countries show that the number of individuals suffering tumor of the brain has died as a result of the inaccurate diagnosis. The proposed article,…
Read MoreAnalysis of the Blockchain for Adoption in Electronic Commerce Management in Ecuador
The document describes the advancement of technology in commercial negotiations and functionality for various electronic transactions in Ecuador, with the aim of analyzing the blockchain and its adoption in managing e-commerce. The quantitative approach with a deductive and descriptive method has been used to identify the benefits in transactional activities and data security, both customers…
Read MoreActigraph Analysis of Elderly Dementia Patients During Phototherapy Using Non-Linear Analysis
Dementia is one of the three primary diseases that increases the level of nursing care required for the elderly. Dementia can lead to an increased burden not only on those who have contracted it, but also their families and the surrounding environment; initiatives for preventing dementia and slowing the decline of cognitive function are expected…
Read MoreAnalysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador
Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…
Read MoreDeterminants of Students’ Actual use of the Learning Management System (LMS): An Empirical Analysis of a Research Model
This study built and tested a research model to determine the determinants that impact students’ actual use of the learning management system. A survey questionnaire was used to gather data from 148 university students who used LMS in their course of study. The structural equation model was used to analyze quantitative data. The study revealed…
Read MoreAnalysis of Two-Dimensional Electron Gas Formation in InGaAs-Based HEMTs
In this study, a theoretical simulation was performed using the Schrodinger-Poisson method to elucidate the formation factors for two-dimensional electron gas in InGaAs-based HEMTs. No visible change was observed in the carrier density and the potential shape. The inflection point of the energy level and the agreement of the energy level in each dimension were…
Read MoreComparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy
Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…
Read MoreOptimal Flow Analysis of a Unified Energy System with Effects of P2G
The reformation of energy hubs has significantly augmented the apprehensions about the levels of dependency between different energy sources which often can also be discussed as independent systems conventionally. This research brings focus on the formulation and analysis of an integrated system with bi-directional energy conversions and its effects on the stability of the system…
Read MoreA Comparative Analysis of ARIMA and Feed-Forward Neural Network Prognostic Model for Bull Services
Bull service is the natural copulation by a purebred male carabao with a female counterpart. This is part of the bull loan agenda of the Philippine Carabao Center-Visayas State University (PCC-VSU), one of the 12 regional centers of PCC. For the past years, PCC-VSU used averaging of bull services count of previous years and sometimes…
Read MoreA Critical Analysis of Usability and Learning Methods on an Augmented Reality Application for Zoology Education
In recent years, research has been conducted focused on the use of technologies in the classroom, but one of the main problems is to demonstrate that the use of this technology favors learning compared to traditional methods. One of these technologies is augmented reality that allows seeing virtual objects superimposed in the real world, but…
Read More
