Results (1602)
Search Parameters:
Keyword: AppSimulation-Optimisation of a Granularity Controlled Consumer Supply Network Using Genetic Algorithms
The decision support systems regarding the Supply Chains (SCs) management services can be significantly improved if an effective viable method is utilised. This paper presents a robust simulation optimisation approach (SOA) for the design and analysis of a granularity controlled and complex system known as Consumer Supply Network (CSN) incorporating uncertain demand and capacity. Minimising…
Read MoreStudy on CD ROADM Contention Blocking
Service providers are transferring their static optical transport networks from semi-permanent connections to agile automatic switched optical networks (ASON) with dynamic optical connection provisioning and restoration. To achieve this goal, service providers are looking for flexible optical network ROADMs with CDC capabilities. Although many contention scenarios during network connection provisioning and restoration have been illustrated,…
Read MoreAn Integrated & Secure System for Wearable Devices
Health services are under increasing pressure to reduce large waiting times for appointments. The delayed diagnosis of a human illnesses could have profound consequences for the patient. The large waiting times may be attributed to lack of data, the accuracy of the data or the timeliness of the availability of the data. In addition to…
Read MoreAnalysis of Garri Frying Machine Manufacturing in Nigeria: Design Innovation
Production of garri (edible processed and granulated form of cassava) and sustaining the production process has become so laborious, time consuming, and predisposes one to some form of danger, especially as it concerns the hot fire that one is disposed to during the process. In west African tradition, where this garri serves as one of…
Read MoreUsing Fuzzy PD Controllers for Soft Motions in a Car-like Robot
This paper deals with the control problem for nonholonomic wheeled mobile robots moving on the plane, and in particular, the use of a Fuzzy controller technique for achieving a given motion task which consists of following a rectilinear trajectory until an obstacle occurs on the path. After a background part, in which the fundamental knowledge…
Read MoreModeling an Energy Consumption System with Partial-Value Data Associations
Many existing system modeling techniques based on statistical modeling, data mining and machine learning have a shortcoming of building variable relations for the full ranges of variable values using one model, although certain variable relations may hold for only some but not all variable values. This shortcoming is overcome by the Partial-Value Association Discovery (PVAD)…
Read MoreSemi-Autonomous Robot Control System with an improved 3D Vision Scheme for Search and Rescue Missions. A joint research collaboration between South Africa and Argentina
Rescue operations require technology to assist the rescue process. The robotic technology in these missions is becoming very important. The important aspects investigated in this study are the integration of a mechatronic system that will allow for a robotic platform with a vision system. The research collaboration between Argentina and South Africa is discussed, with…
Read MoreMetaheuristics for Solving Facility Location Optimization Problem in Lagos, Nigeria
Facility location problem is a problem that many organizations still face today because of its increasing constraints and objectives. Decision makers want this problem solved in order to maximize profit and as such, it became a field of interest to many computer scientists over the years. The solution tool used by these scientists; a function…
Read MoreEmergence of Fun Emotion in Computer Games -An experimental study on fun elements of Hanafuda-
In recent years, research on game AI has expanded, and now it has become possible to construct even AI of complex games. In accordance with this trend, we constructed the AI of the Hanafuda with a certain degree of complexity. Because of applying the method used in other games to the ball game, we could…
Read MoreStudent Performance Evaluation Using Data Mining Techniques for Engineering Education
In this research work, we are implementing a student performance evaluation model using Mamdani Fuzzy Inference System (FIS) and Neuro Fuzzy system and comparing the results with classical averaging method for Network Analysis (NA) course studied by third semester Electronics and Communication Engineering students. This work explains the designing of scoring rubrics using Bloom’s levels…
Read More3D Reconstruction of Monuments from Drone Photographs Based on The Spatial Reconstruction of The Photogrammetric Method
Due to their efficient flight control systems and their camera of high quality modern drones can fly precisely and take aerial photos of high resolution. Although these multi-rotor devices are not able to fly long distances yet, they are very efficient instruments for taking aerial photographs of their proximate environment. As they are able to…
Read MoreComputational Techniques to Recover Missing Gene Expression Data
Almost every cells in human’s body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. However, it is a very expensive and time consuming task. Using computational methods can help biologists to…
Read MoreiSensA – A System for Collecting and Integrating Sensor Data
The idea of monitoring several types of parameters in various environments has been motivating significant research works in Internet of Things (IoT). This paper presents the design and construction of iSensA, a system for integrating and collecting information from sensors. The solution implements a multi-sensor monitoring system and then expands the monitoring concept to an…
Read MoreA Wi-Fi based Architecture of a Smart Home Controlled by Smartphone and Wall Display IoT Device
In this age of smart devices, many people are carrying a smartphone with them all the time. When they are at home, most of them are connected with the home Wi-Fi network. In this paper, a Wi-Fi network based architecture is proposed to control home appliances using a smartphone and also with a touchscreen-based wall…
Read MoreGuidance Law Based on Line-of-Sight Rate Information Considering Uncertain Modeled Dynamics
Proportional navigation (PN) is a widely-used guidance law for missiletarget engagement. The goal of the missile intercept problem is to reduce the closest distance between the missile and target by diminishing the line-of-sight rate (LOS rate). In general, PN guidance law necessitates information of the LOS rate and missile velocity. The closing velocity (relative approaching…
Read Morecv4sensorhub – A Multi-Domain Framework for Semi-Automatic Image Processing
Although there are many research domains with very good software support and workflow automation, there are even more which do not have it: software development is too expensive to create domain specific applications for every research topic. This leaves many domain experts to work for example with general purpose image processing and statistics tools. Many…
Read MoreAnalysis Refactoring with Tools
The drive for this report is to inaugurate the innumerable techniques espoused by the refactoring tools in coding development. The software product is a very complex and time-consuming process of development. Difficulty understanding and maintaining poorly designed software systems Software maintenance can take up to 50% of total development costs for software production. As a…
Read MoreImpacts of Synchronous Generator Capability Curve on Systems Locational Marginal Price through a Convex Optimal Power Flow
This paper deals about an application of optimal power flows (OPF) constrained with synchronous generator capability curve for power market analysis (SGCC). OPF main features gather in its mathematical formulation non-convexity, non-linearity, and it shows to be a hard to solve optimization problem. In some operational scenarios, SGCC can limit power flows bringing the theoretical…
Read MoreMasonry Walls Behavior in Predominant Frames Structures
This was a study on the behavior of a confined masonry bearing wall in a medium height dual building. This wall had to be placed at one corner of the building. It had to be a masonry wall, not to be too stiff and drag the rigidity center too far from the building’s center. The…
Read MoreAnalysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud
In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…
Read MoreVisualizing Affordances of Everyday Objects Using Mobile Augmented Reality to Promote Safer and More Flexible Home Environments for Infants
This study presented a prototype augmented reality (AR) application that helps visualize the affordances of everyday objects for infants in their home environments to prevent accidents and promote development. To detect and visualize affordances, we observed 16 infants regarding how they perceive and handle common objects from 4 to 12 months of age in their…
Read MoreSimilarity-based Resource Selection for Scientific Workflows in Cloud Computing
There are high expectations for commercial cloud services as an economical computation resource when executing scientific computing workflows, for which the computation is increasing on a daily basis. However, no method has been developed for determining whether a scientific computing workflow can be executed at a low usage cost, and thus scientists have difficulty in…
Read MoreA Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques
Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…
Read MoreHolistic Access Control and Privacy Infrastructure in Distributed Environment
This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…
Read MoreFuzzy Uncertainty Management in Multi-Shift Single-Vehicle Routing Problem
Our research deals with the single-vehicle routing problem (VRP) with multi-shift and fuzzy uncertainty. In such a problem, a company constantly uses one vehicle to serve demand over a scheduling period of different work shifts. Our issue relies on a routing problem in maintenance jobs, where a crew executes jobs in different sites. The crew…
Read More
