Results (1523)
Search Parameters:
Keyword: SPMedium Height Dual Buildings with Masonry and Concrete Walls in High Seismic Areas
This is a comparative study on the behavior of a dual medium height building with different walls solutions, in a high seismic area (Bucharest, Romania). The main feature of those buildings is the placement of load bearing walls on the perimeter of the building. This is done to limit the lateral displacement when the structure…
Read MoreGuidance Law Based on Line-of-Sight Rate Information Considering Uncertain Modeled Dynamics
Proportional navigation (PN) is a widely-used guidance law for missiletarget engagement. The goal of the missile intercept problem is to reduce the closest distance between the missile and target by diminishing the line-of-sight rate (LOS rate). In general, PN guidance law necessitates information of the LOS rate and missile velocity. The closing velocity (relative approaching…
Read MoreLinear Evaluation on Weak Story Medium Rise Structures Placed in High Seismic Areas
The paper shows the influence of nonbearing masonry walls for medium rise framed buildings placed at higher stories but not at the ground floor. The building studied here is a hotel that will be built in Bucharest, Romania. This is a high seismic area according to the seismic codes in force. The structure is composed…
Read Morecv4sensorhub – A Multi-Domain Framework for Semi-Automatic Image Processing
Although there are many research domains with very good software support and workflow automation, there are even more which do not have it: software development is too expensive to create domain specific applications for every research topic. This leaves many domain experts to work for example with general purpose image processing and statistics tools. Many…
Read MoreAnalysis Refactoring with Tools
The drive for this report is to inaugurate the innumerable techniques espoused by the refactoring tools in coding development. The software product is a very complex and time-consuming process of development. Difficulty understanding and maintaining poorly designed software systems Software maintenance can take up to 50% of total development costs for software production. As a…
Read MoreA Development of Agility Mode in Cardiopulmonary Resuscitation Learning Support System Visualized by Augmented Reality
This paper showed visualization of technics about cardiopulmonary resuscitation contributed to acquiring the skills and understanding them. Especially, this system is focused on the individuality in each object (men, women, and babies) There are problems of a general cardiopulmonary resuscitation (CPR) training because learners are generally taught by instruction based on a subjective judgment. Because…
Read MoreAnalysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud
In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…
Read MoreA Resolution-Reconfigurable and Power Scalable SAR ADC with Partially Thermometer Coded DAC
Power consumption is becoming more and more important in the Internet of Things (IOT). The ADC is the main power hungry in multi-sensor electronic systems and effectively reducing ADC power consumption without affecting ADC characteristics is an important. This paper is extended from the conference paper. The segmented SAR ADC presents reconfigurable 9 to 12-bit…
Read MoreVisualizing Affordances of Everyday Objects Using Mobile Augmented Reality to Promote Safer and More Flexible Home Environments for Infants
This study presented a prototype augmented reality (AR) application that helps visualize the affordances of everyday objects for infants in their home environments to prevent accidents and promote development. To detect and visualize affordances, we observed 16 infants regarding how they perceive and handle common objects from 4 to 12 months of age in their…
Read MoreA Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques
Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…
Read MoreFuzzy Uncertainty Management in Multi-Shift Single-Vehicle Routing Problem
Our research deals with the single-vehicle routing problem (VRP) with multi-shift and fuzzy uncertainty. In such a problem, a company constantly uses one vehicle to serve demand over a scheduling period of different work shifts. Our issue relies on a routing problem in maintenance jobs, where a crew executes jobs in different sites. The crew…
Read MoreTowards Adoption of Authentication and Authorization in Identity Management and Single Sign On
Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…
Read MoreNumerical Simulation of One Pavement Structure of Polyethylene Terephthalate Submitted to Static Point Loads
Plastic is highly polluting nowadays and is found in many disposable elements used for people. Plastic materials are disposed inadequately and large quantities of them become pollution in the ground, water, and air, affecting plants and animals. Most of the plastic is Polyethylene Terephthalate (PET) which is used in many activities. Resistance, support capacity, and…
Read MoreUsing Nullors to Modify Linear Model Parameters of Transistors in an Analog Circuit
Usually, after properly biasing an analog circuit we need to linearize its transistors in order to linearize the entire circuit for performance analysis and design. This linearization is done through modeling of devices, which is becoming more and more complicated as the electronic technology advances. This is not of course a major issue for circuit…
Read MoreImproved DTC Control Strategy of B12 Inverter Fed BLDC Motor Drives Considering Commutation Torque Dips
In most industrial high-power applications, the brushless DC (BLDC) motor is connected to multi-level inverters specially the three-level NPC inverters (B12). Torque ripple is a critical issue in BLDC motor drives. Accordingly, minimizing the ripple produced in the torque is necessary to enhance the BLDC motor drive performances. This paper aims to develop two direct…
Read MoreEffect of Various Parameters for Temperature Distribution in Human Body: An Analytic Approach
This paper is the extension of the work originally presented in 2nd International Conference on Man and Machine Interfacing (MAMI 2017) and the paper of Yue et al. The present study aims at observing the effect of various parameters on temperature distribution profiles at various environmental temperature, tissue thermal conductivities, metabolic rates, blood perfusion rates,…
Read MoreAn Approach for Determining Rules used to Select Viable Junction Design Alternatives Based on Multiple Objectives
Transport planners and engineers frequently face the challenge to determine the best design for a specific junction. Many road design manuals provide guidelines for the design and evaluation of different junction alternatives, however these mostly refer to specialized software in which the performances of design alternatives can be modelled. In the first stage of the…
Read MoreThe Effect of Fluence Variations of Nd:YAG Laser Ablation and Sample Condition on Human Tooth
Nd:YAG laser has shown some potential to be used in dental practice replacing the conventional method. In particular, it can be used to modify the tooth surface by the ablation process. The laser provides an ability to accurately deliver a significant amount of energy into a confined region. Thus, alteration of the sample surface and…
Read MoreCharacteristic, Thermochemical Behaviors and Kinetic of Demineralized and Torrefied Empty Fruit Bunches (EFB)
A sequential pre-treatment of demineralization and torrefaction, was carried out on palm empty fruit bunches (EFB). EFB and demineralized EFB (DEFB) were torrefied in a vertical tubular reactor in the temperature range of 200 to 280 °C for 30 mins under nitrogen (flow rate:100 mL/min. The pretreated samples were characterized using proximate and ultimate analyses,…
Read MoreQ-Learning versus SVM Study for Green Context-Aware Multimodal ITS Stations
Intelligent Transportation Systems (ITS) applications can take big advantage of Context Awareness approaches. Parameters such as user mobility, passengers comfort reaction and pollution emission levels (CO2) can enrich such applications during the decision making phase. Moreover, the expanding in ITS services offers great opportunities for travelers to find the best route to reach their destinations…
Read MoreThe Value of Integrating MSRP Protocol in E-learning Platforms of Universities
The proposed solution is intended for virtual universities wishing to improve their distance learning platforms. These enhancements include the instructional content model, how to deliver courses to students, and how to evaluate students’ knowledge. With this solution that improves the functionality of Moodle, virtual classes now include new features such as the transfer of heavy…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreEnhancing the Energy/Power Efficiency of a DC Distribution Grid for Residential Buildings via Modular Architecture of DC/DC Solid State Transformers
DC power is apparently attempting to breach into the power system – the system which it once lost to the AC power paradigm. DC is already present in the generation, transmission and utilization sides of the system, leaving distribution as the only area where it has not shown any significant presence – this may be…
Read MoreA Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments
Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…
Read MoreTowards an Efficient Federated Cloud Service Selection to Support Workflow Big Data Requirements
Cloud Computing is considered nowadays an attractive solution to serve the Big Data storage, processing, and analytics needs. Given the high complexity of Big Data workflows and their contingent requirements, a single cloud provider might not be able alone to satisfy these needs. A multitude of cloud providers that offer myriad of cloud services and…
Read More
