Results (290)
Search Parameters:
Keyword: SupportXMDD as Key Enabling Technology for Integration and Organizational Collaboration: Application to E-Learning Based on NRENs
Collaborative E-learning is highly dependent on the well functioning of a complex socio-technical system that comprises information technology and various social processes. Large-scale infrastructures like the National Research and Education Networks (NRENs) provide access to research and educational resources and provide collaboration between educational and research organizations, thus providing a set of essential services for…
Read MoreA Survey of Big Data Techniques for Extracting Information from Social Media Data
Data mined from social media can be used in a variety of methods. The goal of this paper is to explore some of the various methods of mining data from social media and the different areas of its applications. From the analysis of other studies, it was clear that methods such as text analysis, classification,…
Read MorePeculiar Stray Gassing Occurrences in Solar Photovoltaic Transformers during Service
Distributed Solar Photovoltaic (DSP) Plants are one of the fastest growing renewable energy systems in South Africa. The primary components forming an integral part of the point of common coupling (PCC) are, the inverter used to convert dc voltage to ac voltage and step-up transformers which step-up low voltage input to the desired output level.…
Read MoreIntegration Information Systems Design of Material Planning in the Manufacturing Industry using Service Oriented Architecture
PT XYZ has an Enterprise Resource Planning application that is used by the Planning Department to view stocks and plan production materials. Currently calculation of production materials takes more than 30 seconds just to export to Excel then a few minutes to adjust the data format to the planning form and the data used is…
Read MoreElectroencephalogram Based Medical Biometrics using Machine Learning: Assessment of Different Color Stimuli
A methodology of medical signal-based biometrics has been proposed in this paper for implementing a human identification system controlled by electroencephalogram in respect of different color stimuli. The advantage of biosignal based biometrics is that they provide more efficient operation in simple experimental condition to ensure accurate identification. Red, Green, Blue (primary colors) and Yellow…
Read MoreGripper Finger Design for Automatic Bottle Opener
This paper presents a design of parallel gripper finger for robotic dual-arm working with an automatic push-down bottle crown cork cap opener on ABB’s Yumi collaborative bartender robot. A safe gripper finger is made from ABS plastic by 3D printing for human-based interaction design for grasping and holding a glass bottle. Rack design and proposed…
Read MoreAssessment of the Municipal Solid Waste Transfer Stations Suitability in Harare, Zimbabwe
The suitability of incorporating waste transfer stations (WTS) in likely future Municipal Solid Waste Management (MSWM) systems for Harare city and neighbouring urban centres was assessed under this study. WTS will bring about location of landfills and other MSWM facilities further away from population centres, increasing recycling, reducing waste collection costs and burden on the…
Read MoreActual Traffic Based Load-Aware Dynamic Point Selection for LTE-Advanced System
Coordinated MultiPoint (CoMP) has been introduced for LTE-Advanced system to overcome the inter-cell interference problems and enhance the signal quality of cell-edge UEs (User Equipments). With such concept, the overall system performance should be improved considerably to support the significantly increasing amount of demand on data transmission via mobile communication that happens nowadays. Dynamic Point…
Read MoreDevelopment of an EEG Controlled Wheelchair Using Color Stimuli: A Machine Learning Based Approach
Brain-computer interface (BCI) has extensively been used for rehabilitation purposes. Being in the research phase, the brainwave based wheelchair controlled systems suffer from several limitations, e.g., lack of focus on mental activity, complexity in neural behavior in different conditions, and lower accuracy. Being sensitive to the color stimuli, the EEG signal changes promises a better…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read MoreA Framework for the Alignment of ICT with Green IT
The Public Administration is forced to transform itself by taking advantage of the contribution of ICT to in the process of reducing bureaucracy and increase transparency, promoting the dematerialization of processes, increasing the quality of online services, allowing greater ubiquity of access, reducing response times, in the search for improvement of the quality of life…
Read MoreImproved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach
Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…
Read MoreBlockchain Technology-Based Good Distribution Practice Model of Pharmacy Industry in Indonesia
Distribution is the main activity in integrated product supply chain management. In the pharmaceutical industry, the process of drug distribution is important because of the handling, storage, and distribution of medicinal products with good standards and quality. The problem that occurs in the pharmaceutical industry is the circulation of counterfeit drugs by related parties, for…
Read MoreChallenges in IoT Technology Adoption into Information System Security Management of Smart Cities: A Review
Sustainable urban development and utilization of Internet of Things (IoT) technology is driving cities globally to evolve into Smart Cities (SC). The power of IoT services and applications will enable public agencies to provide personalized services to the citizens and inevitably improves their much-needed quality of life. However, although the use of IoT technology proves…
Read MoreCombining ICT Technologies To Serve Societal Challenges
European counties continue to receive an increasing number of migrants and refugees from an also increasing number of both European and non-European countries. This results in a huge societal challenge which is societal inclusion of people speaking different languages and of diverse backgrounds. Key for their inclusion is job finding which comes with hurdles like…
Read MoreAn algorithm for Peruvian counterfeit Banknote Detection based on Digital Image Processing and SVM
In this work we propose an algorithm for Peruvian counterfeit banknotes detection. Our algorithm operates in banknotes with 50, 100 and 200 soles denominations that were manufactured from 2009 onwards. This algorithm offers an automatic diagnosis based on digital image processing and support vector machines (SVM). Current Peruvian counterfeit detection systems are specially designed to…
Read MoreAn Operational Responsibility and Task Monitoring Method: A Data Breach Case Study
As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…
Read MoreSimulating Get-Understand-Share-Connect Model using Process Mining
This paper presents the method of simulating the personal knowledge management (PKM) processes, based on Get-Understand-Share-Connect (GUSC) Model, using real event logs data from an online learning platform. The method used in here is process discovery and conformance, which are the process mining techniques. Having the model proven at granular level of multi-agent system, this…
Read MoreVariation in Self-Perception of Professional Competencies in Systems Engineering Students, due to the COVID -19 Pandemic
The objective of this article is to determine if the self-perception of professional competences has been affected, in systems engineering students, during the health emergency declared in Peru by Covid-19; The results will allow the public university of Peru to make corrective decisions and formulate proposals to improve the functioning of the variable under study.…
Read MoreDeaf Chat: A Speech-to-Text Communication Aid for Hearing Deficiency
Hearing impairments have a negative impact in the lives of individuals living with them and those around such individuals. Different applications and technological tools have been developed to help reduce this negative impact. Most mobile applications that have been developed that use Speech-to-Text technology have been inconsistent such that they are not inclusive of all…
Read MoreDiagnosis of Tobacco Addiction using Medical Signal: An EEG-based Time-Frequency Domain Analysis Using Machine Learning
Addiction such as tobacco smoking affects the human brain and thus causes significant changes in the brainwaves. The changes in brain wave due to smoking can be identified by focusing on changes in electroencephalogram pattern, extracting different time-frequency domain features. In this aspect, a laboratory-based study has been presented in this paper, for assessing the…
Read MoreComparison of Machine Learning Parametric and Non-Parametric Techniques for Determining Soil Moisture: Case Study at Las Palmas Andean Basin
Soil moisture is one of the most important variables to monitor in agriculture. Its analysis gives insights about strategies to utilize better a particular area regarding its use, i.e., pasture for cows (or similar), production forests, or even to answer what crops should be planted. The vertical structure of the soil moisture plays an important…
Read MoreOptimized use of RFID at XYZ University Library in Doing Auto Borrowing Book by Utilizing NFC Technology on Smartphone
NFC (Near Field Communication) is a contactless communication technology based on a radio frequency (RF) field using a base frequency of 13.56 MHz. NFC technology is perfectly designed to exchange data between two devices via simple touch gestures. RFID is the process of identifying an object directly by radio frequency. There are two important components…
Read MoreA Proposed Framework to Improve Containerization from Asia to North America
The constant market change and the critical role of the logistics process in the supply chain need to have special attention because it is an essential piece for the global business strategy. This paper presents an assessment of the processes of handling material from Asia suppliers to North America. The data utilized for the analysis…
Read MoreEnvironmental Entrepreneurship as an Innovation Catalyst for Social Change: A Systematic Review as a Basis for Future Research
There are pressures to adopt sustainable behaviour more so in generating profits and benefiting the society to accelerate green efforts through a green framework. The overarching goal of the paper is premised through various works of literature, building the ecosystem the elements highlighted by most researchers in the field of environmental entrepreneurship. The various models…
Read More
