Results (301)
Search Parameters:
Keyword: ApplicationsDeaf Chat: A Speech-to-Text Communication Aid for Hearing Deficiency
Hearing impairments have a negative impact in the lives of individuals living with them and those around such individuals. Different applications and technological tools have been developed to help reduce this negative impact. Most mobile applications that have been developed that use Speech-to-Text technology have been inconsistent such that they are not inclusive of all…
Read MoreMobile Application Design for Student Learning
The research objectives were to identify, analyze needs, as well as designing a mobile application for student online learning at PT. Ruang Raya Indonesia, particularly in the process of working on tasks assigned by the teacher. The methods used in this research are data collection method using Slovin theory, systems analysis by focusing on the…
Read MoreSome Results on Fixed Points Related to \( \phi-\psi \) Functions in JS – Generalized Metric Spaces
In this paper are shown some new results on fixed point related to a φ – ψ contractive map in JS – generalized metric spaces X. It proves that there exists a unique fixed point for a nonlinear map f:X→X, using two altering distance functions. Furthermore, it gives some results which related to a couple…
Read MoreThe Role of RFID in Green IoT: A Survey on Technologies, Challenges and a Way Forward
The Internet of Things (IoT) is a technology that enables communication between everyday life using different sensor actuators that work together to identify, capture, and distribute critical data from the planet. Massive machines and devices are therefore linked and communicate with them. The use of resources in this area presents new challenges for this technology.…
Read MoreEfficient and Scalable Ant Colony Optimization based WSN Routing Protocol for IoT
IoT integrates and connects intelligent devices or objects with varied architectures and resources. The number of IoT devices is growing exponentially. Due to the massive wave of IoT objects, their diversity and heterogeneity among their architectures, the existing communication protocols for wireless networks become ineffective in the context of IoT. Wireless Sensor Network (WSN) has…
Read MoreHigh-Performance Computing: A Cost Effective and Energy Efficient Approach
The world is witnessing unprecedented advancements in ICT (Information & Communication Technology) related fields. These advancements are further boosted with the emergence of big data. It goes without saying that big data requires two major operations: storage and processing. The latter is usually provided through High-Performance Computing (HPC) which is delivered through two main venues:…
Read MoreNemoSuite: Web-based Network Motif Analytic Suite
Biological networks represent biological systems, and various graph analysis algorithms have been applied to solve various real-world problems. Network motif analysis, as one of network analyses, is detecting frequently and uniquely over-occurring subgraph patterns in a network. The detection process requires high computational resources, and various tools have been developed to provide efficient solutions. However,…
Read MoreComparative Study Between Three Methods for Optimizing the Power Produced from Photovoltaic Generator
The technics of maximum power point tracking is widely used in solar photovoltaic energy and electric power system applications. Traditionally, these technics are based on conventional methods like perturb and observe and incremental conductance. In this work, three methods based on particle swarms optimization, incremental conductance and adaptive neuro fuzzy inference system are presented. A…
Read MoreSH-CNN: Shearlet Convolutional Neural Network for Gender Classification
Gender detection and age estimation become an active research area and a very important field today, wish has been widely used in various applications including them: biometrics, social network, Targeted advertising, access control, human-computer interaction, electronic customer, etc. The need to further improve the recognition or classification rate keeps increasing day after day. In this…
Read MoreEmpirical Probability Distributions with Unknown Number of Components
We consider the estimation of empirical probability distributions, both discrete and continuous. We focus on deriving formulas to estimate number of categories for the discrete distribution, when the number of categories is hidden, and the means and methods to estimate the number of components in the Gaussian mixture model representing a probability density function given…
Read MorePriority-based Scheduling Algorithm for NOMA-integrated V2X
The fifth-generation (5G) wireless system was implemented due to the massive connectivity, especially Internet of Things (IoT) including industrial automation, Vehicle to Everything (V2X) communications, which is shelter an extensive range of applications services and use cases and Intelligent Transportation Systems (ITS). A cellular Non-Orthogonal Multiple Access (NOMA) based on radio resource allocation schemes need…
Read MoreA Model-Driven Approach for Reconfigurable Systems Development
Reconfigurable systems are considered as promising technology that enables the design of more flexible and dynamic applications. However, actually existent design flows are either low-level (so complex) or they lack support for automatic synthesis. In this paper, we present an ontology-based modeling approach for reconfigurable systems. Our approach is based on model-driven engineering process and…
Read MoreSocial Influence Factor of e-Tourism Application Case Study University Student
The income generated from the tourism sector exhibits the main driving force for national revenues in Indonesian. Based on data from the Ministry of Tourism in Indonesia, it turns out that the potential tourist category originated from the cluster of college students or school-aged cohort. In this line, social media signifies a similar age of…
Read MoreDeterminism of Replicated Distributed Systems–A Timing Analysis of the Data Passing Process
Fault-tolerant applications are created by replicating the software or hardware component in a distributed system. Communications are normally carried out over an Ethernet network to interact with the distributed/replicated system, ensuring atomic multicast properties. However, there are situations in which it is not possible to guarantee that the replicas process the same data set in…
Read MoreMulti-Directional Light Sensing Using A Rotating Sensor
The performance of indoor illumination control in many applications, such as in an intelligent building, relies on the quality of the light sensors. In many cases, the light level is not uniform and depends on the direction of the illumination source. It usually requires multiple sensors set up in different directions to gather the overall…
Read MoreThe Effect of E-Service Quality on Customer Satisfaction and Loyalty (Case Study at E-Marketplace XYZ in Indonesia)
Online transactions make it easy for people to get products or sell the products through online applications. The success and failure of online sales depends on how satisfied and loyal the customer is to the service of the product or business which can certainly influence and increase competition between the online sales industry. Based on…
Read MoreAutomated Extraction of Heavyweight and Lightweight Models of Urban Features from LiDAR Point Clouds by Specialized Web-Software
3D city modeling may be considered as one of the key applications, that are provided by the Automated Feature Extraction (AFE) techniques from LiDAR data. The authors attempt to prove that with growing availability of LiDAR surveying methods the resulted 3D city models become the most significant modeled features for any urban environment. Our paper…
Read MoreEffective Segmented Face Recognition (SFR) for IoT
Face recognition technology becoming pervasive in the fields of computer vision, image processing, and pattern recognition. However, face recognition accuracy rates will decrease if training is done on disguised images with covered objects on a face area. This paper aims to propose a state-of-the-art face recognition methodology which could be applied in Internet of Things…
Read MoreEvaluating the Impact of Semantic Gaps on Estimating the Similarity using Arabic Wordnet
Knowledge-based approach is wield used in various NLP applications. For example, to evaluate the semantic similarity between words, the semantic evidence in lexical ontologies (wordnets) is commonly used. The success of the English WordNet (EnWN) in this domain has inspired the creation of several wordnets in different languages, including the Arabic WordNet (ArWN). The English…
Read MoreC-Band FMCW Radar Design and Implementation for Breathing Rate Estimation
In this paper, a portable Frequency Modulated Continuous Wave (FMCW) radar system was designed and implemented for human movements and breathing detection. The radar operates with a frequency band ranges from 4.7 to 4.9GHz. The radar sub-systems were designed and simulated using up to date computer-aided-design tools before implementation. The Voltage Controlled Oscillators (VCO), high…
Read MoreAn Overview on CryptDb and Word2vec Approaches
Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…
Read MoreLaser Deprocessing Technique and its Application to Physical Failure Analysis
This paper is an extension of work originally presented in IPFA 2019. In the original work, a new memory bit-counting method in physical failure analysis (PFA) using laser deprocessing technique (LDT) is introduced. In the present paper, LDT will be further exploited and the methodology applied to PFA will be fully discussed. Compared to the…
Read MoreSynthesis of SQL Queries from South African Local Language Narrations
English remains the language of choice for database courses and widely used for instruc- tion in nearly all South African universities, and also in many other countries. Novice programmers of native origins are mostly taught Structured Query Language (SQL) through English as the medium of instruction. Consequently, this creates a myriad of problems in understanding…
Read MoreFeature Extractors Evaluation Based V-SLAM for Autonomous Vehicles
Visual Simultaneous Localization and Mapping known as V-SLAM, is an essential task for autonomous vehicles. It can be carried out using several sensors, in particular with on board cameras. To locate a vehicle, SLAM algorithms are based on two main tasks. The first task (front-end kernel) is intended to process images in order to provide…
Read MoreTolerance of Characteristics and Attributes in Developing Student’s Academic Achievements
The purpose of this research is to study the relevance of factors for the analysis of the effectiveness of suitable educational institutions that illustrate the significance of the characteristics and attributes of the student’s academic achievements and to identify the acceptance and tolerance of each attribute, which supports lifelong learning. The data used in this…
Read More
