Results (149)
Search Parameters:
Keyword: BehaviorA Comparative Study of a Hybrid Ant Colony Algorithm MMACS for the Strongly Correlated Knapsack Problem
Metaheuristic hybridization has recently been widely studied and discussed in many research works as it allows benefiting from the strengths of metaheuristics by combining adequately the different algorithms. MMACS is a new hybrid ant colony optimization algorithm based on the foraging behavior of ants. This algorithm presents two hybridization levels. The first hybridization consists in…
Read MoreUsing Nullors to Modify Linear Model Parameters of Transistors in an Analog Circuit
Usually, after properly biasing an analog circuit we need to linearize its transistors in order to linearize the entire circuit for performance analysis and design. This linearization is done through modeling of devices, which is becoming more and more complicated as the electronic technology advances. This is not of course a major issue for circuit…
Read MoreUsing of the Flipped Classroom Learning with a Workshop Activity in Object-oriented Analysis and Design Course
A lot of research reported that the active learning, especially the flipped classroom learning has higher performance than the lecture-based learning called the traditional learning. Therefore, this research is experimented on the object-oriented analysis and design course. The objectives are to try the flipped classroom learning with the workshop activity in order to analyze learners’…
Read MoreA modular design process for developing humanoid mobile robot VieBot
This paper introduces a design process for developing a humanoid mobile robot, namely VieBot. Stemming from the design process, it is easy to adjust the design and extent robot behaviors to meet customer needs. Our key solution is to split the design into three modules related to robot behavior, kinematic computation and motion control. Base…
Read MoreAn Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics
Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…
Read MoreA Smart Mobile Application for Assisting Parents in Anti-Drug Support
Drug abuse problem is not a new problem, but it is still serious in Hong Kong. The emergence of hidden drug abuse youth has brought more difficulties to them and their parents. The usual ways of providing anti-drug abuse assistance are not sufficient to these types of young people. Intelligent methods have been developed to…
Read MoreMission Profile Analysis of a SiC Hybrid Module for Automotive Traction Inverters and its Experimental Power-loss Validation with Electrical and Calorimetric Methods
This paper investigates the efficiency benefits of replacing the Silicon diodes of a commercial IGBT module for the main inverter application of an electric vehicle with Silicon Carbide diodes, leaving the package, operating conditions and the system unchanged. This ensures that the comparison is directly between the chip technologies without any scope for discrepancies arising…
Read MoreVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read MoreNonresonance between the first two Eigencurves of Laplacian for a Nonautonomous Neumann Problem
We consider the following Neumann elliptic problem \( \left\{ \begin{array}{rl} -\Delta u =\alpha\,m_{1}(x)\,u+m_{2}(x)\,g(u)+h(x)\quad & in \: \Omega,\\ \quad\\ \frac{\partial u}{\partial\nu} = 0\qquad\qquad\qquad\qquad\qquad\qquad\quad& on\: \partial\Omega. \end{array} \right. \) By means of Leray-Schauder degree and under some assumptions on the asymptotic behavior of the potential of the nonlinearity g, we prove an existence result for our equation…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreDiscovering Interesting Biological Patterns in the Context of Human Protein-Protein Interaction Network and Gene Disease Profile Data
The current advances in proteomic and transcriptomic technologies produced huge amounts of high-throughput data that spans multiple biological processes and characteristics in different organisms. One of the important directions in today’s bioinformatics research is to discover patterns of genes that have interesting properties. These groups of genes can be referred to as functional modules. Detecting…
Read MoreThree-Dimensional EEG Signal Tracking for Reproducible Monitoring of Self-Contemplating Imagination
Electroencephalography (EEG) can globally monitor neural activity in millisecond scale, which is critical for identifying causality of human brain functions and mechanisms. However, to obtain accurate EEG stimulation-response relationship one usually needs to repeat multiple-ten times of stimulation-response recording to average out background signals of other irreverent brain activities, making real-time monitoring difficult to be…
Read MorePlanning an Availability Demonstration Test with Consideration of Confidence Level
The full service life of a technical product or system is usually not completed after an initial failure. With appropriate measures, the system can be returned to a functional state. Availability is an important parameter for evaluating such repairable systems: Failure and repair behaviors are required to determine this availability. These data are usually given…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read MoreEffect of Cold Drawing Pass Schedule on Mechanical Properties and Microstructure of ST 52 during Cold Drawing of Seamless Tubes and its Influence on Springback
In-elastic recovery behavior of seamless tube material has been investigated by uniaxial tensile tests. Unloading Stress–Strain curves obtained under different passes of cold drawing process shows that the percentage of in-elastic recovery to the total recovery increased with plastic deformation. This paper is an experimental study that shows Young’s Modulus decreases with plastic strain for…
Read MoreA novel model for Time-Series Data Clustering Based on piecewise SVD and BIRCH for Stock Data Analysis on Hadoop Platform
With the rapid growth of financial markets, analyzers are paying more attention on predictions. Stock data are time series data, with huge amounts. Feasible solution for handling the increasing amount of data is to use a cluster for parallel processing, and Hadoop parallel computing platform is a typical representative. There are various statistical models for…
Read MoreAnalysis of Learning Development With Sugeno Fuzzy Logic And Clustering
In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreModelization of cognition, activity and motivation as indicators for Interactive Learning Environment
In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…
Read MoreOptimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria
A method for optimal sizing of hybrid system consisting of a Photovoltaic (PV) panel, diesel generator, Battery banks and load is considered in this paper. To this end a novel approach is proposed. More precisely a methodology for the design and simulation of the behavior of Hybrid system PV-Diesel-Battery banks to electrify an isolated rural…
Read MoreVerifying the Detection Results of Impersonation Attacks in Service Clouds
A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…
Read MoreFault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter
The paper describes the results of the system analysis of various options of electric inverter topologies for the use in the traction drive of an electrical helicopter. The paper explains the optimal choice, in terms of the design requirements and future operational conditions, and the type and topology of the electric inverter to supply the…
Read MoreRepresentation of Clinical Information in Outpatient Oncology for Prognosis Using Regression
The determination of length of survival, or prognosis, is often viewed through statistical hazard models or with respect to a future reference time point in a classification approach (e.g., survival after 2 or 5 years). In this research, regression was used to determine a patient’s prognosis. Also, multiple behavioral representations of clinical data, including difference…
Read More
