Results (653)
Search Parameters:
Keyword: AnalysisBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreA Critical Analysis of Topics in Software Architecture and Design
Software architecture and design is an important component in the software engineering field. This aspect of software engineering covers the functional and non-functional requirements of any system being proposed to be developed, while software architecture deals with non-functional requirements, software design entails the functional requirements. The objective of this paper is to critically analyze current…
Read MoreSentiment Analysis of Regional Head Candidate’s Electability from the National Mass Media Perspective Using the Text Mining Algorithm
Mass media plays an important role in leading public opinion, including in the election of regional head candidates. The tendency of mass media coverage can be used as a parameter to measure the strength of each regional head candidate. To analyze the tendency of media opinion, sentiment analysis is needed. In this study, text mining…
Read MoreDesign and Analysis of 32-bit Parallel Prefix Adders for Low Power VLSI Applications
The basic processes like addition, subtraction can be done using various types of binary adders with dissimilar addition times (delay), area and power consumption in any digital processing applications. To minimize the Power Delay Product (PDP) of Digital Signal Processing (DSP) processors is necessary for high performance in Very Large Scale Integration (VLSI) applications. In…
Read MoreAnalysis of Garri Frying Machine Manufacturing in Nigeria: Design Innovation
Production of garri (edible processed and granulated form of cassava) and sustaining the production process has become so laborious, time consuming, and predisposes one to some form of danger, especially as it concerns the hot fire that one is disposed to during the process. In west African tradition, where this garri serves as one of…
Read MoreProbabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots
This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…
Read MoreProspects of Wind Energy Injection in the Brazilian National Interconnected System and Impacts Analysis Through a Quasi-Steady Power Flow
There is no doubt that the wind was the renewable source of energy that had the most significant growth during the last five years, and more importantly, the wind power source in Brazil has always been the cheapest and most competitive of all the others, so it is worth saying that wind have never been…
Read MoreAnalysis Refactoring with Tools
The drive for this report is to inaugurate the innumerable techniques espoused by the refactoring tools in coding development. The software product is a very complex and time-consuming process of development. Difficulty understanding and maintaining poorly designed software systems Software maintenance can take up to 50% of total development costs for software production. As a…
Read MoreAnalysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud
In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…
Read MoreDifference in Speech Analysis Results by Coding
Mental health disorder is becoming a social problem, and there is a need for technology that can easily check for states of stress and depression as a countermeasure. Conventional methods of diagnostic support and screening include self-administered psychological tests and use of biomarkers. However, there are problems such as burden on subjects, examination costs, dedicated…
Read MoreAnalysis of Drain Current Transient Response of Gate Pulse Voltage in AlGaN / GaN High Electron Mobility Transistors
Recently, several studies focus on a GaN material system that exhibits a significant probability of use in power devices including wide-gap semiconductors. However, the GaN-HEMT is also a structure that easily leads to crystal defects in AlGaN and i-GaN heterojunction. The aim of the study involved investigating the cause of the current collapse in GaN-HEMT…
Read MoreAn Electroencephalogram Analysis Method to Detect Preference Patterns Using Gray Association Degrees and Support Vector Machines
This paper introduces an electroencephalogram (EEG) analysis method to detect preferences for particular sounds. Our study aims to create novel brain–computer interfaces (BMIs) to control human mental (NBMICM), which are used to detect human mental conditions i.e., preferences, thinking, and consciousness, choose stimuli to control these mental conditions, and evaluate these choices. It is important…
Read MoreUsing of the Flipped Classroom Learning with a Workshop Activity in Object-oriented Analysis and Design Course
A lot of research reported that the active learning, especially the flipped classroom learning has higher performance than the lecture-based learning called the traditional learning. Therefore, this research is experimented on the object-oriented analysis and design course. The objectives are to try the flipped classroom learning with the workshop activity in order to analyze learners’…
Read MoreHarmonic Sensitivity Analysis of Power System with Wind Power
As the contribution from renewable energy sources increase, the power quality degradation has become a challenge for the power system operator. There are major two factors causing power quality deterioration. First is the current harmonic generation by the power electronic converters used in renewable energy sources, and second is the magnification of harmonic voltage due…
Read MoreAmplitude-Frequency Analysis of Emotional Speech Using Transfer Learning and Classification of Spectrogram Images
Automatic speech emotion recognition (SER) techniques based on acoustic analysis show high confusion between certain emotional categories. This study used an indirect approach to provide insights into the amplitude-frequency characteristics of different emotions in order to support the development of future, more efficiently differentiating SER methods. The analysis was carried out by transforming short 1-second…
Read MoreZebrafish Larvae Classification based on Decision Tree Model: A Comparative Analysis
Screening the abnormal development of the zebrafish embryos before and after being hatched for a large number of samples is always carried out manually. The manual process is presented as a tedious work and low-throughput. The single female fish produce hundreds of eggs in every single mating process, the samples of the zebrafish embryos should…
Read MoreA Comparative Analysis of two Controllers for Trajectory Tracking Control: Application to a Biological Process
The aim of the present work is to guarantee the trajectory tracking of a nonlinear biological process and compare two control approaches. The main objective of this work is to elaborate a fuzzy model and build a fuzzy controllers for a biological process by using the fuzzy Takagi-Sugeno. Two controllers are synthesized, the parallel distributed…
Read MoreTextural Analysis of Pap Smears Images for k-NN and SVM Based Cervical Cancer Classification System
Early detection and treatment of cervical cancer is crucial to patients’ recovery with a reported success rate of nearly 100%. Presently, Pap smear test which is a visual inspection of cells collected from the ectocervix is the screening tool mainly used in cancer prevention programs. The Pap smear is relatively easy to handle however, it…
Read MoreTowards Process Standardization for Requirements Analysis of Agent-Based Systems
The development of agent-based systems is negatively impacted by the lack of process standardization across the major development phases, such as the requirements analysis phase. This issue creates a key barrier for agent technology stockholders regarding comprehending and analyzing complexity associated with these systems specifications. Instead, such fundamental low-level infrastructure is loosely attended to in…
Read MorePerformance Analysis of NLMS Channel Estimation for AMC-COFDM System
In this paper we focus on the adaptive modulation and coding (AMC) techniques, makes use of the channel state information (CSI) to improve the spectral efficiency (SE) in wireless communication systems. To achieve higher data rates and lower bit error rate (BER’s) channel coding can be carried out in OFDM, called COFDM. The NLMS channel…
Read MorePredicting Smoking Status Using Machine Learning Algorithms and Statistical Analysis
Smoking has been proven to negatively affect health in a multitude of ways. As of 2009, smoking has been considered the leading cause of preventable morbidity and mortality in the United States, continuing to plague the country’s overall health. This study aims to investigate the viability and effectiveness of some machine learning algorithms for predicting…
Read MoreAn Analysis of K-means Algorithm Based Network Intrusion Detection System
In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…
Read MorePerformance Analysis of Regenerative Braking in Permanent Magnet Synchronous Motor Drives
This paper describes the design and analysis of a regenerative braking system for a permanent magnet synchronous motor (PMSM) drive for electric vehicle (EV) applications. First studied is the principle for electric braking control of a PMSM motor under field-oriented control (FOC). Next, the maximum braking torque in the regeneration mode as well as the…
Read MoreSecurity Analysis and the Contribution of UPFC for Improving Voltage Stability
The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis…
Read MoreA Joint Safety and Security Analysis of message protection for CAN bus protocol
One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…
Read More
