Results (129)
Search Parameters:
Keyword: GroupPhotodecoloration of Methyl Orange Solution Assisted by ZrS3 Powders
Zirconium trisulfide ZrS3 is a representative of transition metal polysulfides containing sulfur as S–1 in polysulfide, usually disulfide S22– groups. Semiconductive zirconium trisulfide which absorbs visible light near UV edge was considered as a possible photocatalyst. We experimentally studied photodecoloration of methyl orange in presence of ZrS3. It was shown for the first time that…
Read MoreAn Empirical Study of Icon Recognition in a Virtual Gallery Interface
This paper reports on an empirical study (an extension of a pilot study) that analyses the design of icons in a German 3-D virtual art gallery interface. It evaluates the extent to which a sample of typical computer users from a range of ages, educational attainments and employments can interpret the meaning of icons from…
Read MoreExploring the use of Manual Liquid Based Cytology, Cell Block with Immunomarkers p16/ki67, VIA and HPV DNA Testing as a Strategy for Cervical Cancer Screening in LMIC
Cervical cancer is the 4th most common cancer in women in low to middle income group countries (LMIC). Various methods for screening cervical cancer are practiced, such as the Conventional Pap Smear (CPS), Liquid Based Cytology with its ancillary techniques like Cell Block with immunocytochemistry. VIA is another method which is being advocated as a…
Read MoreCharacteristic, Thermochemical Behaviors and Kinetic of Demineralized and Torrefied Empty Fruit Bunches (EFB)
A sequential pre-treatment of demineralization and torrefaction, was carried out on palm empty fruit bunches (EFB). EFB and demineralized EFB (DEFB) were torrefied in a vertical tubular reactor in the temperature range of 200 to 280 °C for 30 mins under nitrogen (flow rate:100 mL/min. The pretreated samples were characterized using proximate and ultimate analyses,…
Read MoreComplexity Drivers in Digitalized Work Systems: Implications for Cooperative Forms of Work
Digitalization changes the way people work to a considerable extent. It alters business models and process organizations of whole industries. The ensuing market dynamics and faster innovation cycles cause an increase in complexity. In this article, the interconnection of digitalization and complexity in work systems is analyzed. For this purpose, a framework for comparing relevant…
Read MoreUsing of the Flipped Classroom Learning with a Workshop Activity in Object-oriented Analysis and Design Course
A lot of research reported that the active learning, especially the flipped classroom learning has higher performance than the lecture-based learning called the traditional learning. Therefore, this research is experimented on the object-oriented analysis and design course. The objectives are to try the flipped classroom learning with the workshop activity in order to analyze learners’…
Read MoreSequential Card Activities of Recollect Experience for Elderly with Dementia
In this study, the authors propose a modified design of sequential card activities to recollect experience for the elderly with Dementia. The cards and App were designed to complement each other for Nostalgia-based support. Image and text are utilized to trigger memories that bring out shared experience from the patient. By using suitable trigger elements,…
Read MorePole-Changing Windings for Close Ratio and 1:N Ratio Using the 3//Y / 3//Y Method
Requirement for pole-changing motors emerged at the very early times of asynchronous motor design. Different solutions have been elaborated and some of them are generally used. One of these solutions in use is the so called pole phase modulation method. The so called 3 Y / 3 Y pole-changing winding being subject of this paper…
Read MorePsychoacoustical Approach in Soundscape Characterization
Four different soundscapes with different loudness and spectral distributions were recorded in Zagreb (capital of Croatia) and reproduced to two groups of listeners while they were performing a concentration demanding task – a simplified variation of the memory game. These two groups of test subjects listened to the same soundscapes but with different loudness distribution.…
Read MoreExperimental Investigation of Human Gait Recognition Database using Wearable Sensors
In this research human gait database is collected using different possible methods such as Wearable sensors, Smartphone and Cameras. For a gait recognition accelerometer data from wearable shimmer modules and smartphone are used. Data from different sensors location is compared to know which sensor location have better recognition rate. Different walking scenarios like slow, normal…
Read MoreEffect of Risperidone with Ondansetron to Control the Negative and Depressive Symptoms in Schizophrenia
To evaluate the effects of Ondansetron on the negative and depressive symptoms of patients with schizophrenia. A double-blind randomized control trial was conducted in 2016-17 in Lahore. 30 participants were included both in placebo and medicine group. The patients were assessed by using the Positive and Negative Syndrome Scale (PANSS) and Hamilton’s Rating Scale for…
Read MoreCommunity Detection in Social Network with Outlier Recognition
Exploring communities and outliers in Social Network is based on considering of some nodes have overlapped neighbor node within the same group as well as some nodes have no any link to the other node or have no any overlapped value. The existing approaches are based on the overlapping community detection method were only defined…
Read MoreCancer Mediating Genes Recognition using Multilayer Perceptron Model- An Application on Human Leukemia
In the present article, we develop multilayer perceptron model for identification of some possible genes mediating different leukemia. The procedure involves grouping of gene based correlation coefficient and finally select of some possible genes. The procedure has been successfully applied three human leukemia gene expression data sets. The superiority of the procedure has been demonstrated…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MoreA Perfect Ecosystem for Learning? Modern Thoughts for Organizing Higher Education
The background of the article lies in South Eastern Finland, in Lappeenranta, where an active University campus has attracted a group of ICT startups as well as SME’s in the field to collaboration. The novel education approach also has another remarkable role as a developer and source of innovation. An experimental development ecosystem (EDE), where…
Read MoreA Study on Isomorphic Properties of Circulant Graphs
denotes circulant graph of order for a set where Circulant graph is said to have the Cayley Isomorphism (CI) property if whenever is isomorphic to , there is some for which . In this paper, isomorphic properties of circulant graphs that includes Self-complementary circulant graphs; Type-2 isomorphism, a new type of isomorphism other than already known Adam’s isomorphism of circulant graphs and Cartesian product and factorization of…
Read MoreDiscovering Interesting Biological Patterns in the Context of Human Protein-Protein Interaction Network and Gene Disease Profile Data
The current advances in proteomic and transcriptomic technologies produced huge amounts of high-throughput data that spans multiple biological processes and characteristics in different organisms. One of the important directions in today’s bioinformatics research is to discover patterns of genes that have interesting properties. These groups of genes can be referred to as functional modules. Detecting…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read MoreA prospective design of a social assistive electronic system for the elderly
Aging is a natural process that progressively introduces limitations in a person’s life, which can have dramatic effects on the person’s lifestyle and wellbeing and in most cases is related to the strength of the person’s social bonds with the family and friends group. Therefore, it is important to maintain these bonds in the various…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MoreRadiation Hybrid Mapping: A Resampling-based Method for Building High-Resolution Maps
Abstract— The process of mapping large numbers of markers is computationally complex, as the increase of numbers of markers results in an exponential increase in the mapping runtime. Also, having unreliable markers in the dataset adds more complexity to the mapping process. In this research, we have addressed these two issues and proposed our solution.…
Read MoreAnalysis of Learning Development With Sugeno Fuzzy Logic And Clustering
In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…
Read MoreDevelopment of an automated vehicle stop system for cardiac emergencies
This paper describes the concept and configuration of a novel automated safety vehicle stop system, and a future prospect of the study. Intrinsic sudden death may cause traffic accident since such accidents sometimes involve not only the driver but also other traffic users such as passengers and pedestrians. Cardiovascular disease (CVD) is considered as a…
Read MoreOptimizing the Decoding Complexity of PEG-Based Methods with an Improved Hybrid Iterative/Gaussian Elimination Decoding Algorithm
This paper focuses on optimizing the decoding complexity of the progressive-edge-growth-based (PEG-based) method for the extended grouping of radio frequency identification (RFID) tags using a hybrid iterative/Gaussian elimination decoding algorithm. To further reduce the decoding time, the hybrid decoding is improved by including an early stopping criterion to avoid unnecessary iterations of iterative decoding for…
Read MoreMatrix Encryption Scheme
In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…
Read More
