Results (1510)
Search Parameters:
Keyword: CoMPDeep venous thrombus characterization: ultrasonography, elastography and scattering operator
A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreLow Probability of Interception Beampattern Using Frequency Diverse Array Antenna
Frequency diverse array (FDA) antenna employs a small frequency increment, as compared with the carrier frequency, across antenna array elements. The use of a frequency increment generates an array factor that is dependent on angle, time, and the range and this yields a range and angle dependent beampattern. In this paper, a transmit array beamforming…
Read MoreDetailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model
In urban, rural and indoor applications, diffraction mechanism is very important to predict the field strength and calculate the coverage accurately. The diffraction mechanism takes place on NLOS (non-line-of-sight) cases like rooftop, vertex, corner, edge and sharp surfaces. S-UTD-CH model computes three type of electromagnetic wave incidence such as direct, reflected and diffracted waves, respectively.…
Read MoreTransmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets
Frequency diverse array (FDA) employs a small frequency increment across its array elements to provide range, angle and time dependent beampattern. In most radar systems, FDA with linear frequency offsets have been employed. But, its transmit beampattern is coupled in range and angle dimensions, which may degrade the output signal-to-interference-plus-noise ratio performance. Note that nonlinear…
Read MoreEvaluation of Three Evaporation Estimation Techniques In A Semi-Arid Region (Omar El Mukhtar Reservoir Sluge, Libya- As a case Study)
In many semi-arid countries in the world like Libya, drinking water supply is dependent on reservoirs water storage. Since the evaporation rate is very high in semi-arid countries, estimates and forecasts of reservoir evaporation rate can be useful in the management of major water source. Many researchers have been investigating the suitability of estimates evaporation…
Read MoreProposal of a congestion control technique in LAN networks using an econometric model ARIMA
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read MorePower-Energy Simulation for Multi-Core Processors in Bench-marking
At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important…
Read MoreUsing Naming Patterns for Identifying Architectural Technical Debt
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…
Read MoreWireless Android Based Home Automation System
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…
Read MoreHow Effective is Using Lip Movement for Japanese Utterance Training
Lip movements have long been the subject of research. There are many methods of lip movement recognition, such as the calculation of the amount of movement compared to a matching face pattern. In a previous study, we investigated utterance recognition based on the power spectrum by focusing on lip movements, which is one aspect of…
Read MoreReal Time Implementation of an Improved Hybrid Fuzzy Sliding Mode Observer Estimator
This paper extends some of our research results disseminated in the most recent awarded international conference paper concerning the implementation in real time of a sliding mode observer state estimator. For the same case study developed in the conference paper, more precisely a DC servomotor angular speed control system, we extend the proposed concept of…
Read MoreTheoretical Expression of the Balance Function during Galvanic Vestibular Stimulation in Dual Space
A method to construct a stochastic differential equation describing a non-Gaussian process in a stationary state and to obtain a static potential function in terms of the temporal average is proposed. However, it has been suggested that the potential function changes temporally through some analysis of climatic change. In this paper, a mathematical model of…
Read MoreDevelopment of a new lines of sight analyzer while playing sport
The Olympics will be held in Tokyo in 2020, and the training of the athlete using technology has been gaining attention. In an effort to refine the competitive ability of top athletes by evaluating their performance objectively, we have focused on eye movement and head movement. Since the field of view moves according to the…
Read MoreSemantic modeling of portfolio assessment in e-learning environment
In learning environment, portfolio is used as a tool to keep track of learner’s progress. Particularly, when it comes to e-learning, continuous assessment allows greater customization and efficiency in learning process and prevents students lost interest in their study. Also, each student has his own characteristics and learning skills that must be taken into account…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read MoreA Survey of Text Mining in Social Media: Facebook and Twitter Perspectives
Text mining has become one of the trendy fields that has been incorporated in several research fields such as computational linguistics, Information Retrieval (IR) and data mining. Natural Language Processing (NLP) techniques were used to extract knowledge from the textual text that is written by human beings. Text mining reads an unstructured form of data…
Read MoreMobi-Sim: An Emulation and Prototyping Platform for Protocols Validation of Mobile Wireless Sensors Networks
The objective of this paper is to provide a new simulator framework for mobile WSN that emulate a sensor node at a laptop i.e. the laptop will model and replace a sensor node within a network. This platform can implement di?erent WSN routing protocols to simulate and validate new developed protocols in terms of energy…
Read MoreCross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs
To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…
Read MoreFrame Filtering and Skipping for Point Cloud Data Video Transmission
Sensors for collecting 3D spatial data from the real world are becoming more important. They are a prime research area topic and have applications in consumer markets, such as medical, entertainment, and robotics. However, a primary concern with collecting this data is the vast amount of information being generated, and thus, needing to be processed…
Read MoreRecent Trends in ELM and MLELM: A review
Extreme Learning Machine (ELM) is a high effective learning algorithm for the single hidden layer feed forward neural networks. Compared with the existing neural network learning algorithm it solves the slow training speed and over-fitting problems. It has been used in different fields and applications such as biomedical engineering, computer vision, remote sensing, chemical process…
Read MoreOptimized Multi-focus Image Fusion Using Genetic Algorithm
Optical imaging systems or cameras have a convex lens with limited depth of field. So, multi-focus images are obtained when such systems are used to capture an image of a particular scene. These images are fused to get all-in-focus image. This paper proposes a new simpler method of multi-focus image fusion. Instead of decomposing input…
Read MoreOperational Efficiencies and Simulated Performance of Big Data Analytics Platform over Billions of Patient Records of a Hospital System
Big Data Analytics (BDA) is important to utilize data from hospital systems to reduce healthcare costs. BDA enable queries of large volumes of patient data in an interactively dynamic way for healthcare. The study objective was high performance establishment of interactive BDA platform of hospital system. A Hadoop/MapReduce framework was established at University of Victoria…
Read MoreThe Class Imbalance Problem in the Machine Learning Based Detection of Vandalism in Wikipedia across Languages
This paper analyses the impact of current trend in applying machine learning in detection of vandalism, with the specific aim of analyzing the impact of the class imbalance in Wikipedia articles. The class imbalance problem has the effect that almost all the examples are labelled as one class (legitimate editing); while far fewer examples are…
Read MoreSystem Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate
Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…
Read More
