Results (1649)
Search Parameters:
Keyword: POSAutomating Hostel Telephone Systems
Residential schools can be a great place for students to learn and develop a different set of skills if the right environment is given to the child. Constant communication with parents can help the child to stay motivated and feel comfortable away from home, hence schools tend to provide various solutions to allow the student…
Read MoreA New Study Performance Control of PMSMs: Validity Abacus Approach
This paper is an extension of work originally presented in conference name” Study Performance of Speed Tracking Control with Frequency and Amplitude Dependence”. Though many PMSMs (Permanent Magnet Synchronous Motor) control approach have already been published, little endeavors have been invested in the study of speed tacking control with frequency or amplitude dependence. The use…
Read MoreA Method for Generating, Evaluating and Comparing Various System-level Synthesis Results in Designing Multiprocessor Architectures
Multiprocessing can be considered the most characteristic common property of complex digital systems. Due to the more and more complex tasks to be solved for fulfilling often conflicting requirements (cost, speed, energy and communication efficiency, pipelining, parallelism, the number of component processors, etc.), different types of component processors may be required by forming a so…
Read MoreExperimental Software Solution for Estimation of Human Body Height using Homography and Vanishing point(s)
The principal goal of this paper is the development of the experimental software solution for the extraction of dimensional unit from the uncalibrated image. Existing techniques are analyzed and also partially utilized in presented approach as an aid in the extraction process. The design of two different approaches was proposed, these were later implemented and…
Read MoreAn enhanced Biometric-based Face Recognition System using Genetic and CRO Algorithms
Face recognition is one of the most well-known biometric methods. It is a technique used for identifying individual from his face. The recognition process takes the face and compares it with the one stored in the database for recognizing it. Many methods were proposed to achieve that. In this paper, a new technique is proposed…
Read MoreEffect of Risperidone with Ondansetron to Control the Negative and Depressive Symptoms in Schizophrenia
To evaluate the effects of Ondansetron on the negative and depressive symptoms of patients with schizophrenia. A double-blind randomized control trial was conducted in 2016-17 in Lahore. 30 participants were included both in placebo and medicine group. The patients were assessed by using the Positive and Negative Syndrome Scale (PANSS) and Hamilton’s Rating Scale for…
Read MoreTowards Process Standardization for Requirements Analysis of Agent-Based Systems
The development of agent-based systems is negatively impacted by the lack of process standardization across the major development phases, such as the requirements analysis phase. This issue creates a key barrier for agent technology stockholders regarding comprehending and analyzing complexity associated with these systems specifications. Instead, such fundamental low-level infrastructure is loosely attended to in…
Read MoreRevealing Strengths, Weaknesses and Prospects of Intelligent Collaborative e-Learning Systems
The rapid evolution of Collaborative e-Learning Systems migrates to the use of new technologies such the artificial intelligence (AI). In this context, the role of AI in increasing the quality of learning and making it more productive, persistent and efficient. In addition, it can accomplish repetitive and complex tasks in record time and unmatched accuracy.…
Read MoreEffects of Dielectric Properties of the Material located inside Multimode Applicator on Microwave Efficiency
During microwave heating of materials, the efficiency of microwave heating depends on the materials’ dielectric property, shapes and sizes of the material, materials’ position inside the applicator, operating frequency, level of input power, specific heat capacity, number and position of waveguide over the applicator, size and geometry of applicator etc. This paper examines the effects…
Read MoreEffects of Cinnamon on Diabetes
Diabetes is a condition of the body in which blood sugar level is higher than the normal average value. It is considered as a major cause of morbidity worldwide. According to the data reported in 2015,420 million people had diabetes worldwide, type 2 diabetes account for 85% of these cases. This shows 9.2% of the…
Read MoreEAES: Extended Advanced Encryption Standard with Extended Security
Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…
Read MoreA Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security
During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…
Read MoreUsing Input Impedance to Calculate the Efficiency Numerically of Series-Parallel Magnetic Resonant Wireless Power Transfer Systems
Analysis of magnetic resonant wireless power transfer systems aims to achieve maximum efficiency of the power transfer. From the analysis we wish to derive the maximum power and the frequency at which this occurs. This paper presents a method to estimate these two required values and to achieve this requires the solution of the input…
Read MorePerformance improvement of a wind energy system using fuzzy logic based pitch angle control
The pitch angle controller maintains the aerodynamic captured power at rated level when the wind speed is above the rated speed. Besides, it can also improve the transient stability occurring in the wind energy system (WES). This paper, therefore, proposes an effective pitch angle control strategy that can deliver the conditioned output power in windy…
Read MoreDesign of True Random Numbers Generators with Ternary Physical Unclonable Functions
Memory based ternary physical unclonable functions contain cells with fuzzy states that are exploited to create multiple sources of physical randomness, and design true random numbers generators. A XOR compiler enhances the randomness of the binary data streams generated with such components, while a modulo-3 addition enhances the randomness of the native ternary data streams,…
Read MoreA Comparison of MIMO Tuning Controller Techniques Applied to Steam Generator
This work presents a comparison between controller tuning methods for a multivariable steam generator. Controller tuning has a remarkable impact on closed loop performance. Methods selected were Single-Loop Tuning (SLT), Biggest Log Modulus Tuning (BLT), Sequential Return- Difference (SRD) and Structured H(inf) Synthesis (S-H(inf)). Method assessment takes into account set-point tracking, disturbance rejection, tuning effort and…
Read MoreExperimental Results and Numerical Simulation of the Target RCS using Gaussian Beam Summation Method
This paper presents a numerical and experimental study of Radar Cross Section (RCS) of radar targets using Gaussian Beam Summation (GBS) method. The purpose GBS method has several advantages over ray method, mainly on the caustic problem. To evaluate the performance of the chosen method, we started the analysis of the RCS using Gaussian Beam…
Read MoreDirect Torque Control Strategy Based on the Emulation of Six-Switch Inverter Operation by a Four-Switch Inverter Using an Adaptive Fuzzy Controller
This paper presents a novel direct torque control (DTC) strategy aimed to four-switch three-phase (FSTP) inverter-fed an interior permanent magnet synchronous machine (IPMSM), using a fuzzy logic toolbox in speed control loop. In fact, the introduced DTC approach is based on the emulation of the operation of the standard six-switch three-phase (SSTP) inverter. This fact…
Read MoreEfficient Alignment of Very Long Sequences
We consider the problem of aligning two very long biological sequences. The score for the best alignment may be found using the Smith-Waterman scoring algorithm while the best alignment itself may be determined using Myers and Miller’s alignment algorithm. Neither of these algorithms takes advantage of computer caches to obtain high efficiency. We propose cache-efficient…
Read MoreOntology Modeling of Social Roles of Users in Mobile Computing Environments
Today, computing devices of various types with wireless interconnections are used for diverse tasks and increasingly in ad hoc manners. It is not always obvious which devices are present, reachable, and connected when users and their devices are mobile. In such mobile computing environment, the number of registered lines on the network via network operators…
Read MoreWhich User of technology? Perspectivising the UTAUT model by application of the SFL language Pronoun System towards a systems perspective of technology acceptance and use
This study applies systemic functional linguistics (SFL) as complementary framework of analysis of technology acceptance models (TAMs). The purpose is to bridge research methodology language in international business (IB) studies and engineering management science. Currently TAMs and its consolidated version, the Unified Theory of Acceptance and Use of Technology (UTAUT) provides for a typology of…
Read MoreDesign and Implementation of Closed-loop PI Control Strategies in Real-time MATLAB Simulation Environment for Nonlinear and Linear ARMAX Models of HVAC Centrifugal Chiller Control Systems
The objective of this paper is to investigate three different approaches of modeling, design and discrete-time implementation of PI closed-loop control strategies in SIMULINK simulation environment, applied to a centrifugal chiller system. Centrifugal chillers are widely used in large building HVAC systems. The system consists of an evaporator, a condenser, a centrifugal compressor and an…
Read MoreSteganography System with Application to Crypto-Currency Cold Storage and Secure Transfer
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…
Read MoreWhat Should Be Considered for Acceptance Mobile Payment: An Investigation of the Factors Affecting of the Intention to Use System Services T-Cash
E-Money mobile payments, also called digital money, are electronic payments, payment transactions using an Internet network integrated with NFC-enabled smartphones and prepaid cards. In Indonesia not only banks that issue e-money products, telecom operators from Telkomsel also issued an e-money product called T-cash. T-cash is a new innovation of electronic money presented by Telkomsel. The…
Read MoreFrameworks for Performing on Cloud Automated Software Testing Using Swarm Intelligence Algorithm: Brief Survey
This paper surveys on Cloud Based Automated Testing Software that is able to perform Black-box testing, White-box testing, as well as Unit and Integration Testing as a whole. In this paper, we discuss few of the available automated software testing frameworks on the cloud. These frameworks are found to be more efficient and cost effective…
Read More
