Results (2107)
Search Parameters:
Keyword: ATEEnabling the Edge – A method for dynamic virtualizable connections for 5G deployments
The telecommunications industry continues to move forward with plans for 5G service with rates including 6Gb/s followed by upgrade paths promising 20Gb/s. Despite advances in wireless technology associated with 5G roll-outs, there remains the problem of providing sufficient backhaul throughput and efficient handling of hand-off services within the relatively small projected cell boundaries that can…
Read MoreEffects of Different Activation Functions for Unsupervised Convolutional LSTM Spatiotemporal Learning
Convolutional LSTMs are widely used for spatiotemporal prediction. We study the effect of using different activation functions for two types of units within convolutional LSTM modules, namely gate units and non-gate units. The research provides guidance for choosing the best activation function to use in convolutional LSTMs for video prediction. Moreover, this paper studies the…
Read MoreDesigning IT Blue Print Academic System on Higher Education with Togaf
STIE XYZ is one of the universities of economics that has not been optimal in the use of information technology. IT implementation is applied when there are urgent and sudden needs. So it is not planned carefully according to the development needs of this educational institution. Therefore many patchy applications are created. As the consequence,…
Read MoreApplication of The Half-Sweep Egsor Iteration for Two-Point Boundary Value Problems of Fractional Order
The point of this study is to explore and elucidating the performance of the four-point Half-Sweep EGSOR (4HSEGSOR) iterative method to solve fractional two-point boundary value problems by using Caputo’s fractional operator and family of finite differences (FD) schemes. To apply the iterative methods, linear system needs to be constructed via the discretization process with…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreVirtualization in Cloud Environment: Bandwidth Management
Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…
Read MoreParallel Hybrid Testing Tool for Applications Developed by Using MPI + OpenACC Dual-Programming Model
Building massively parallel applications has become increasingly important with coming Exascale related technologies. For building these applications, a combination of programming models is needed to increase the system’s parallelism. One of these combinations is the dual-programming model (MPI+X) which has many structures that increase parallelism in heterogeneous systems that include CPUs and GPUs. MPI +…
Read MoreNonlinear Analytic Modeling for Novel Linear Variable Reluctance Motors
In this paper, an analytical modeling is proposed to compute the static and dynamic characteristics of linear variable reluctance motors with taking account of the saturation and the non-linearity of the magnetic circuit. The proposed model is based on the Fourier series expression of the phase flux in which the variation of the linkage flux…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreDevelopment & Implementation of Smart Vehicle Over Speeding Detector using IoT
Nowadays over speeding is one of the most common traffic violations. Generally, over speeding is the result of restless and bad behavior of drivers. As the accident rates are increasing it is important to develop and implement a system which can automatically detect and report over speeding to the traffic control authorities as early as…
Read MoreFeature Selection for Musical Genre Classification Using a Genetic Algorithm
Music genre classification is an important multimedia research domain, including aspects of music piece representation, distances between genres, and categorization of music databases. The objective of this study was to develop a model for automatic classification of musical genres from audio data by using features from low-level time and frequency domains. These features can highlight…
Read MoreFrequency-Based Design of Electric System for Off-shore Wind Power Plant (OWPP)
The paper presents a novel concept of design of electric system for Off-shore Wind Power Plant (OWPP) based on frequency. In the literature, a new transmission system i.e. Fractional Frequency Transmission System (FFTS) has been proposed as an economic alternative to High Voltage AC (HVAC) and High Voltage DC (HVDC) for power transmission from Off-shore…
Read MoreEducational Domain Management Knowledge Content Identification and Knowledge Updating Method, Based on Enterprise Management Information Interactions
The aim of this paper is to develop the educational domain management knowledge content identification and knowledge updating method, based on formal descriptions of enterprise management information interactions. This is very important because the progress of modern science leads to the emergence of new factual or conceptual knowledge. There is a need for proper methods…
Read MoreAutomatic Stitching of Medical Images Using Feature Based Approach
Image stitching is a process of creating a panoramic image by combining multiple images that have overlapping regions of the same scene. It is a challenging topic in image processing, multimedia, and medical applications. The proposed system can be applied in medical applications for scoliosis operations and other long limb operations. The problem of the…
Read MoreDeep Feature Representation for Face Sketch Recognition
Face sketch recognition aims at matching face sketch images to face photo images. The main challenge lies in modality discrepancy between face photo and sketch images. In this work, we propose a new facial sketch-to-photo recognition approach by adopting VGG-Face deep learning network, with which face images can be represented by compact and highly discriminative…
Read MoreA Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models and Business Models
Cloud computing is an exceptional paradigm, which is facilitating the developments and utilization of resources over the internet. Fog computing operates at the edge of the network saving bandwidth, by not sending all information to the cloud, while edge computing does processing of data at the edge of the cloud. Edge computing reduces the distance…
Read MoreNovel CPW-fed UWB antenna for X-band applications
An ultra-wideband (UWB) printed antenna (PMA) powered by a compact coplanar waveguide (CPW) is featured. The propounded antenna is supposed to cover the UWB range from 7 GHz to 10 GHz, with return loss values below -10 dB in the whole frequency range, for X-band applications, often used for dense satellite communications. The 30 x…
Read MoreA Spectrum Sharing based Metering Infrastructure for Smart Grid Utilizing LTE and WiFi
In advanced metering infrastructure (AMI) of smart grid, WiFi is an appropriate choice for its bidirectional communication requirement to transmit data to the billing center. But, WiFi functions in the free spectrum bands and LTE also requires to use the same free bands for its network expansion being licensed spectrum is limited and expansive. LTE…
Read MoreA Relation Extraction System for Indian Languages
Relation Extraction is an important subtask of Information Extraction that involves extracting significant facts from natural language text. Extracting structured information from the plaintext is the ultimate goal of IE systems. The Indian language content on the internet is increasing day to day. Extracting relevant information from this huge unstructured data is a challenging task…
Read MoreCoupling of Local and Global Quantities by A Subproblem Finite Element Method – Application to Thin Region Models
A method for coupling of local and global fields related to currents, voltages and magnetic fields in magnetodynamic problems is developed in the frame of the finite subproblem finite element method. The method allows to correct the errors arising from thin conducting regions, that replace volume thin regions by surfaces but neglect border effects in…
Read MoreTechnical and Economic Merits Resulting from Power Systems Interconnection
In this paper, the impact of interconnection among isolated and dispersed electric power systems have been Investigated and analyzed. Therefore, the methodology proposed in this work is implemented in three real electric power systems in the western part of Saudi Arabia (designated as I, II and III). The outcome of this study revealed positive benefits…
Read MoreHigh-Temperature Optical Characterization of Wide Band Gap Light Emitting Diodes and Photodiodes for Future Power Module Application
A systematic study of wide bandgap (WBG) based light emitting diodes (LEDs) and photodiodes (PDs) were conducted for the assessment of modular integration of optoelectronic devices into power modules. The temperature dependence of the photoluminescence (PL) efficiency of Indium gallium nitride/Gallium nitride (InGaN/GaN) multiple quantum wells (MQWs) material was studied from 10 to 800 K.…
Read MoreThe Chimera and the Cyborg
High Performance Computing (HPC) systems offer excellent metrics for speed and efficiency when using bare metal hardware, a high speed interconnects, and massively parallel applications. However, this leaves out a significant portion of scientific computational tasks, namely high throughput computing tasks that can be trivially parallelized and scientific workflows that require their own well-defined software…
Read MoreManaging and Optimizing Quality of Service in 5G Environments Across the Complete SLA Lifecycle
The 5G is the fifth generation of mobile broadband, cellular technologies, and networks that promises a major change in mobility by evolving connected business realities. In such an emerging environment, reliable Service Level Agreements (SLA) and anticipation of breaches of Service Level Objectives (SLO) become compulsory. Thus, guaranteeing the required service quality, while also ensuring…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read More
