Results (1693)
Search Parameters:
Keyword: FFSolving the Capacitated Network Design Problem in Two Steps
In this paper, we propose a two steps-based algorithm to solve the modular link version of the Capacitated Network Design Problem (CNDP) which consists to determine the optimal network that guarantees the routing of a set of commodities. In our proposition, CNDP is divided into two sub-problems: Network Design problem (NDP) and Network Loading Problem…
Read MoreMatrix Encryption Scheme
In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…
Read MoreGestural Interaction for Virtual Reality Environments through Data Gloves
In virtual environments, virtual hand interactions play a key role in interactivity and realism allowing to perform fine motions. Data glove is widely used in Virtual Reality (VR) and through simulating a human hands natural anatomy (Avatar’s hands) in its appearance and motion is possible to interact with the environment and virtual objects. Recently, hand…
Read MoreSynthesis of Important Design Criteria for Future Vehicle Electric System
In this article, we give a brief overview of future trends and corresponding stakeholder requests regarding the design of automotive electric and electronic (e/e)-architectures. While today’s optimization is mainly based on the static design criteria of unit costs and weight, three dynamic design criteria are considered decisive factors in the future: voltage stability, vehicle energy…
Read MoreChikungunya virus; Review of Epidemiology and Outbreak in Pakistan
Chikungunya virus (CHIKV) is mosquito-borne, alpha virus. It causes acute fever and acute and chronic musculoskeletal pain in humans. CHIKV has spread to 22 countries including Pakistan resulting in hundreds of thousands of death across the world. International travel stands out as one of the major risk factors for rapid global spread of the disease.…
Read MoreDirectional Antenna Modulation Technique using A Two-Element Frequency Diverse Array
Direction dependent antenna modulation (DAM), as a potential physical-layer security technique, is able to enhance the security of wireless communication systems by virtue of the capability of its direction-dependent signal modulation format transmission. In this paper, DAM using frequency diverse array (FDA) to produce the modulation is presented. By phase shifting each element, the desired…
Read MoreFire extinguishing system in large underground garages
In the work is considered an acceptable constructive scheme from a practical point of view at fire extinguishing in underground garages. The garage space is divided into quadrants which covering, for example, 2 cars. In case of ignition on one of them, a sprinkler nozzle system is triggered by the effect of the vertical convective…
Read MoreEnabling Toy Vehicles Interaction With Visible Light Communication (VLC)
An effective communication among the road users is crucial for safety precautions. Nowadays, a light emitting diode (LED) are commonly installed on a motor vehicle as the lighting system. The LED lights are more reliable and flexible in terms of the design and power adjustments. To further utilize the LED applications in a vehicular system,…
Read MorePulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC)
This paper describes the design of a pulse generator to excite PZT and PVDF ultrasonic transducer arrays, based on the Programmable System-on-Chip (PSoC) module. In this module, using programmable logic different pulses were implemented; these pulses are required in ultrasonic applications for multiple channels to excite PZT and PVDF transducer arrays. To excite multiple elements,…
Read MoreA security approach based on honeypots: Protecting Online Social network from malicious profiles
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read MoreKinect-Based Moving Human Tracking System with Obstacle Avoidance
This paper is an extension of work originally presented and published in IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). This work presents a design and implementation of a moving human tracking system with obstacle avoidance. The system scans the environment by using Kinect, a 3D sensor, and tracks the center of mass of a…
Read MoreAssessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness
The present work describes the first serious game designed to reduce the stigma among students towards mental health problems. The game is called Stigma-Stop, and it features characters who suffer from various mental disorders. Players are provided with information about different mental illnesses, and they are presented with several options on how to act when…
Read MoreDevelopment and Validation of a Heat Pump System Model Using Artificial Neural Network
Modeling of direct expansion (DX) air conditioning and heat pump systems can be necessary in developing energy saving methods required to reduce energy consumption in buildings. The artificial neural networks (ANN) can be simple and reliable as compared to traditional methods. A properly trained artificial neural network can provide accurate results, while being relatively straightforward…
Read MoreA synchronizing second order sliding mode control applied to decentralized time delayed multi-agent robotic systems: Stability Proof
This study investigates the synchronization issue of multiple robot manipulators in the presence of time delay. Since several previous works based on synchronization task neglect the communication delay, in this paper we develop a finite time stability based on a Lyaponov functional for synchronization of a networked robotic system where time delay exists during the…
Read MoreADOxx Modelling Method Conceptualization Environment
The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…
Read MoreMedical imbalanced data classification
In general, the imbalanced dataset is a problem often found in health applications. In medical data classification, we often face the imbalanced number of data samples where at least one of the classes constitutes only a very small minority of the data. In the same time, it represent a difficult problem in most of machine…
Read MorePaper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language
Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a rule based extraction method of Arabic text to solve some weaknesses founded on previous research works. Our approach is divided on preprocessing phase, on which we proceed to the tokenization of the text, and formatting it…
Read MoreChannel Inversion Schemes with Compensation Network for Two-Element Compact Array in Multi-User MIMO
In this paper, we investigate the performance of channel inversion schemes for interference cancellation with compensation network in multi-user MIMO broadcasting channel. To achieve good performance, mutual coupling between two-element compact arrays is characterized by the receiving mutual impedance method (RMIM) to formulate the compensation network-operating matrix. A prototype of two-element compensation network with an…
Read MoreEvaluation of Pure Aluminium Inoculated with Varying Grain Sizes of an Agro-waste based Inoculant
Pure Aluminium and its alloy are widely utilized in Engineering and Industrial applications due to certain significant properties such as softness, ductility, corrosion resistance, and high electrical conductivity which it possesses. Addition of an agro-waste based grain refiner to the melt can alter the characteristics positively or negatively. Therefore, the aim of this paper is…
Read MoreMethodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…
Read MoreOptimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations
A new architecture of multi-standard transmitter that combines single and double frequency conversion is presented. The transmitter is able to generate waveforms of different cellular standards (GSM, UMTS, Wimax), LAN standards (Bluetooth, Zigbee, IEEE802.11 b/g) and Radio navigation standards (GPS, Galileo) as well. Depending on the selected standard and frequency, the transmitter routes the intermediate…
Read MoreAviation Navigation with Use of Polarimetric Technologies
The article deals with the problem of increasing the accuracy of determination of aircraft’s navigation flight parameters. Increasing the accuracy and sensitivity of navigation parameters determination will improve the efficiency of air conveyance by optimizing the flight trajectories and reducing the flight time and simultaneously will ensure the sufficient level of air conveyance safety. The…
Read MoreTravelling Wave Solutions of Coupled Burger’s Equations of Time-Space Fractional Order by Novel (Gʹ/G)-Expansion Method
In this paper, Novel (Gʹ/G)-expansion method is used to find new generalized exact travelling wave solutions of fractional order coupled Burger’s equations in terms of trigonometric functions, rational functions and hyperbolic functions with arbitrary parameters. For the conversion of the partial differential equation to the ordinary differential equation, complex transformation method is used. Novel (Gʹ/G)-expansion…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreDeep venous thrombus characterization: ultrasonography, elastography and scattering operator
A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…
Read More
