Results (1696)
Search Parameters:
Keyword: FFGrid Connected Hybrid Solar and Diesel Generator Set: A Cost Optimization with HOMER
Extensive increases in electricity cost added to the numerous power outages encountered in developing countries has led to the deployment of hybrid energy supplies that mainly ensure continuity of power supply while attempting a reduction of electricity generation cost. This paper, specifically deals with the cost optimization of electricity generation from a grid connected hybrid…
Read MoreThe main characteristics of five distributed file systems required for big data: A comparative study
These last years, the amount of data generated by information systems has exploded. It is not only the quantities of information that are now estimated in Exabyte, but also the variety of these data which is more and more structurally heterogeneous and the velocity of generation of these data which can be compared in many…
Read MoreElectromagnetic Field and Lumped Circuit Analysis of Planar Transformer at Medium Frequency for Converter Application
High frequency planar transformer is a new type of transformer that operates at high frequency. Its significance is proved through its miniaturised features, high power density and other performances. The design of planar transformer needs to consider several fundamental factors, including core material, dimension of layers and winding pattern. As the volume decreases, extra attentions…
Read MoreVideo-frame Quality Improvement before Shot boundary Detection by using Logarithm, Wavelet and Contoulet Transform
Video shot boundary detection is important step for the research in the content analysis and retrieval fields. In this paper, firstly we presented an efficient method for Video-frame quality improvement to suppress flash occurred within video frame using logarithm, wavelet and contourlet transform. In addition, wavelet and contourlet transform also performed denoising. Secondly, for shot…
Read MorePerformance Evaluation of Associative Classifiers in Perspective of Discretization Methods
Discretization is the process of converting numerical values into categorical values. Contemporary literature study reveals that there are many techniques available for numerical data discretization. The performance of classification method is dependent on the exploitation of the data discretizing method. In this article, we investigate the effect of discretization methods on the performance of associative…
Read MoreTowards Optimality in Online Learning – The OLeCenT Approach
Higher Education Institutions (HEIs) employ Learning Management Systems (LMSs) primarily for greater efficiency, profitability, technological advancement or survival. The predominantly used LMSs, Moodle and Blackboard account for in excess of 60% usage by the top HEIs. However, the individual international regions do not necessarily bear the percentages of the overall total. Gaps are identified in…
Read MoreNetwork Intrusion Detection System using Apache Storm
Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various…
Read MoreTreadmill and Vision System for Human Gait Acquisition and Analysis
This paper presents a developed low cost system for human gait analysis. Two web cameras placed in opposite sides of a treadmill are used to acquire images of a person walking at different speeds on a treadmill, carrying a set of passive marks located at strategic places of its body. The treadmill also has passive…
Read MoreInterdisciplinarity to Integrate Knowledge in Engineering
This paper is an extension of work originally presented at the 2nd International Conference of the Portuguese Society for Engineering Education and aims to describe an interdisciplinarity teaching experiment involving three subjects of the scientific area of Mathematics and a fourth one in the area of Management. Using only one project, the students developed skills,…
Read MoreMultilingual evaluation of voice disability index using pitch rate
We propose the use of the pitch rate of free-form speech recorded by smartphones as an index of voice disability. This research compares the effectiveness of pitch rate, jitter, shimmer, and harmonic-to-noise ratio (HNR) as indices of voice disability in English, German, and Japanese. Normally, the evaluation of these indices is performed using long-vowel sounds;…
Read MoreDesigning a Smart Car Parking System (PoC) Prototype Utilizing CCTV Nodes: A vision of an IoT parking system via UCD process
Using smart parking systems has become very important, and particularly so for metropolitan areas, because of the benefits for drivers in many aspects, such as time, frustration, stress, and anger, in addition to the increased consumption of fuel while searching for a vacant parking space. This paper proposes a review of recent advances in sensing…
Read MoreCollision avoidance between a wheelchair front wheels and a step wall during step climbing using a care robot
This paper discusses a step climbing strategy using a wheelchair and a teleoperated care robot that avoids collisions between the wheelchair’s front wheels and the step wall. In our method, the two vehicles are connected and use the velocity difference between them to climb steps. Since the wheelchair’s front wheels, or another part of the…
Read MoreIGS: The Novel Fast IC Power Ground Network Optimization Flow Based on Improved Gauss-Seidel Method
With silicon technology further scaling, the switching activities together with GHz operation frequency greatly affects the power integrity by generating large IR-drop noises. Excessive IR-drop causes functional failures such as timing failure, abnormal reset and SRAM flipping. The PGN needs to be optimized to reduce IR-drop. The traditional EDA optimization routine repeats the steps such…
Read MoreSchizophrenia Prediction Using Integrated Imaging Genomic Networks
In order to increase the diagnosis accuracy of schizophrenia (SCZ) disease, it is essential to comprehensively employ complementary information from multiple types of data. It is well known that a network is a general method for analyzing relationships between patients, with its nodes representing patients and its edges showing relationships between them. In this study,…
Read MoreSystem Control Device Electronics Smart Home Using Neural Networks
The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system…
Read MoreA Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method
One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…
Read MoreAnalysis of Learning Development With Sugeno Fuzzy Logic And Clustering
In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…
Read MoreCollaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma
Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MoreLow-cost Hybrid Wheelchair Controller for Quadriplegias and Paralysis Patients
Wheelchair controller design is very important for handicapped users such as quadriplegia, amputee, paralyzed and elderly. The safe use, easiness, and comfort are an important factor that can directly affect the user’s social efficiency and quality of life. In this paper, the design, implementation, and test of a new low-cost hybrid wheelchair controller for quadriplegics…
Read MoreComputer Aided Classification using Support Vector Machines in Detecting Cysts of Jaws
Jaw cyst is one of the most common pathology observed in the field of dentistry. Early detection of the cystic lesion will help the surgeons to take appropriate therapeutic measures after a thorough diagnostic procedure. One of the challenging task for surgeons is to differentiate the cysts from the other pathologies. The appearance of these…
Read MoreDevelopment of an automated vehicle stop system for cardiac emergencies
This paper describes the concept and configuration of a novel automated safety vehicle stop system, and a future prospect of the study. Intrinsic sudden death may cause traffic accident since such accidents sometimes involve not only the driver but also other traffic users such as passengers and pedestrians. Cardiovascular disease (CVD) is considered as a…
Read MoreMulti Level Integrity Management in LTE/LTE-A Networks
The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…
Read MoreAugmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment
The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…
Read MoreData Error Detection and Recovery in Embedded Systems: a Literature Review
This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make…
Read More
