Results (1507)
Search Parameters:
Keyword: CatAnalysis Refactoring with Tools
The drive for this report is to inaugurate the innumerable techniques espoused by the refactoring tools in coding development. The software product is a very complex and time-consuming process of development. Difficulty understanding and maintaining poorly designed software systems Software maintenance can take up to 50% of total development costs for software production. As a…
Read MoreAnalysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud
In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…
Read MoreA Novel Technique for Enhancing Color of Undersea Deblurred Imagery
Exploring the ocean underneath has always been an area of great scientific and environmental concern. However, the study of underwater environment was very difficult due to the extreme conditions. Undersea descriptions undergo severe distortion attributed to absorptive as well as scattering properties. Absorption substantially removes illumination, whereas a ray of light redirected in several path…
Read MoreVisualizing Affordances of Everyday Objects Using Mobile Augmented Reality to Promote Safer and More Flexible Home Environments for Infants
This study presented a prototype augmented reality (AR) application that helps visualize the affordances of everyday objects for infants in their home environments to prevent accidents and promote development. To detect and visualize affordances, we observed 16 infants regarding how they perceive and handle common objects from 4 to 12 months of age in their…
Read MoreSimilarity-based Resource Selection for Scientific Workflows in Cloud Computing
There are high expectations for commercial cloud services as an economical computation resource when executing scientific computing workflows, for which the computation is increasing on a daily basis. However, no method has been developed for determining whether a scientific computing workflow can be executed at a low usage cost, and thus scientists have difficulty in…
Read MoreA Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques
Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…
Read MoreHolistic Access Control and Privacy Infrastructure in Distributed Environment
This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…
Read MoreLow-Dimensional Spaces for Relating Sensor Signals with Internal Data Structure in a Propulsion System
Advances in technology have enabled the installation of an increasing number of sensors in various mechanical systems allowing for more detailed equipment health monitoring capabilities. It is hoped the sensor data will enable development of predictive tools to prevent system failures. This work describes continued analysis of sensor data surrounding a seizure of a turbocharger…
Read MoreA Comparative Study of a Hybrid Ant Colony Algorithm MMACS for the Strongly Correlated Knapsack Problem
Metaheuristic hybridization has recently been widely studied and discussed in many research works as it allows benefiting from the strengths of metaheuristics by combining adequately the different algorithms. MMACS is a new hybrid ant colony optimization algorithm based on the foraging behavior of ants. This algorithm presents two hybridization levels. The first hybridization consists in…
Read MoreEmotional Impact of Suicide on Active Witnesses: Predicting with Machine Learning
Predicting the impact of suicide on incidental witnesses at an early stage helps to avert the possible side effect. When suicide is committed in public, incidental observers are left to grapple with it. In many cases, these incidental witnesses tend to experience the emotional side effect with time. In this study, we employed a Machine…
Read MoreDifference in Speech Analysis Results by Coding
Mental health disorder is becoming a social problem, and there is a need for technology that can easily check for states of stress and depression as a countermeasure. Conventional methods of diagnostic support and screening include self-administered psychological tests and use of biomarkers. However, there are problems such as burden on subjects, examination costs, dedicated…
Read MoreEconomic and Social Sustainability for Iraqi Middle Provinces
This research is part of a study concerned with building an integrated framework for development of sustainable urban planning in Iraqi provinces. Seven Iraqi middle provinces are covered in this study. The aim of the study is to determine, measure and evaluate economic and social sustainability in the Iraqi middle provinces. The stages to achieve…
Read MoreUsing Nullors to Modify Linear Model Parameters of Transistors in an Analog Circuit
Usually, after properly biasing an analog circuit we need to linearize its transistors in order to linearize the entire circuit for performance analysis and design. This linearization is done through modeling of devices, which is becoming more and more complicated as the electronic technology advances. This is not of course a major issue for circuit…
Read MoreImproved DTC Control Strategy of B12 Inverter Fed BLDC Motor Drives Considering Commutation Torque Dips
In most industrial high-power applications, the brushless DC (BLDC) motor is connected to multi-level inverters specially the three-level NPC inverters (B12). Torque ripple is a critical issue in BLDC motor drives. Accordingly, minimizing the ripple produced in the torque is necessary to enhance the BLDC motor drive performances. This paper aims to develop two direct…
Read MoreElliptical Printed Dipole Antenna Design using ANN Based on Levenberg–Marquardt Algorithm
A design of elliptical printed dipole antenna based on neural network approach is presented in this paper for recent WiMAX, Bluetooth, WLAN, LTE, and future 5G applications. The dipole patch is printed on top of substrate which has relative permittivity of 2.2 and 0.787mm of thickness. The elliptical dipole antenna is single band and the…
Read MoreVirtual Watershed System: A Web-Service-Based Software Package For Environmental Modeling
The physically-based environmental model is a crucial tool used in many scientific inquiries. With physical modeling, different models are used to simulate real world phenomena and most environmental scientists use their own devices to execute the models. A complex simulation can be time-consuming with limited computing power. Also, sharing a scientific model with other researchers…
Read MoreNonLinear Control via Input-Output Feedback Linearization of a Robot Manipulator
This paper presents the input-output feedback linearization and decoupling algorithm for control of nonlinear Multi-input Multi-output MIMO systems. The studied analysis was motivated through its application to a robot manipulator with six degrees of freedom. The nonlinear MIMO system was transformed into six independent single-input single-output SISO linear local systems. We added PD linear controller…
Read MoreCharacteristic, Thermochemical Behaviors and Kinetic of Demineralized and Torrefied Empty Fruit Bunches (EFB)
A sequential pre-treatment of demineralization and torrefaction, was carried out on palm empty fruit bunches (EFB). EFB and demineralized EFB (DEFB) were torrefied in a vertical tubular reactor in the temperature range of 200 to 280 °C for 30 mins under nitrogen (flow rate:100 mL/min. The pretreated samples were characterized using proximate and ultimate analyses,…
Read MoreModified HOG Descriptor-Based Banknote Recognition System
This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…
Read MoreRecent Advances in Intelligent-Based Structural Health Monitoring of Civil Structures
This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…
Read MoreQ-Learning versus SVM Study for Green Context-Aware Multimodal ITS Stations
Intelligent Transportation Systems (ITS) applications can take big advantage of Context Awareness approaches. Parameters such as user mobility, passengers comfort reaction and pollution emission levels (CO2) can enrich such applications during the decision making phase. Moreover, the expanding in ITS services offers great opportunities for travelers to find the best route to reach their destinations…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreA Model of EM Fields from Static Data for Moving Conducting Cylinder
The effect of rotation and translation of an electromagnetic (EM) scatterer upon the scattered field is studied for the case of TM polarization. The Franklin and Lorenz transformations are used to analyze the phase and the magnitude of the backscattered field during the movement of the scatterer. Also, a new model is presented that simulates…
Read MoreThe Model Development of an Effective Triggering System of Production Kanban Size towards Just-In-Time (JIT) Production
The contents of this article consist of an extension original work presented at the 4th International Conference on Control, Automation and Robotics (ICCAR 2018) and aims to develop the systematic model of an effective triggering system of production Kanban size towards Just-In-Time (JIT) production system. The developed model was introduced based on the philosophy of…
Read MoreProposed System of New Generation LMS Using Visual Models to Accelerate Language Acquisition
Language skill is a rule-like operation, based on generalized connections. The main property of language skills is awareness. They are formed with conscious mastery of the language means of communication (phonetic, lexical and grammatical). Language acquisition is a complex process which includes a large number of different parameters. Therefore, the study and improvement of language…
Read More
