Results (350)
Search Parameters:
Keyword: CAPInvestigating the Optical Behavior of Single/Multi-Dimensional Photonic Crystal Structures for Photovoltaic Applications
The results investigated in this work are toward the optimization of the photonic crystal structures in 1D and 2D scale. One-dimensional distributed Bragg reflectors (DBRs) have demonstrated substantial potential in various optoelectronic applications, due to the observed tunable optical band-gap. Herein, the use of DBRs in light trapping solar cells was simulated and validated, representing…
Read MoreInvestigation of the Effect of FBG Profiles, Temperature and Transmission Distance for Environmental Sensing & Monitoring
Optical sensors exist in various forms and one of them is fiber bragg gratings (FBG). Performance evaluation was simulated for FBG sensing. The simulation involves different grating profiles tested with complete optical sensing system. The system involves a broadband light source, FBG of various profiles and optical spectrum analyser for data interpretation. Different profile of…
Read MoreBlockchain Application in Higher Education Diploma Management and Results Analysis
Academic certifications are achievements desired by people, because they have a direct impact, positively, on their social lives. Such an important document, still widely issued in paper format, may be subject to forgery or impossibility of verification due to the unavailability of the issuing entity. This work consists of identifying, analyzing and testing some of…
Read MoreUpdated Analysis of Business Continuity Issues Underlying the Certification of Invoicing Software, Considering a Pandemic Scenario
Portuguese organizations that have invoicing software, certified by the Tax and Customs Authority, need to comply with technical requirements that involve business continuity and disaster recovery. The recent tax legislative changes created conditions for the dematerialization of documents, allowing waiving invoice printing, encouraging the adoption of an electronic invoicing and document archiving system. The pandemic…
Read MoreCognitive Cybernetics in the Foresight of Globalitarianism
This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…
Read MoreA Toolkit for the Automatic Analysis of Human Behavior in HCI Applications in the Wild
Nowadays, smartphones and laptops equipped with cameras have become an integral part of our daily lives. The pervasive use of cameras enables the collection of an enormous amount of data, which can be easily extracted through video images processing. This opens up the possibility of using technologies that until now had been restricted to laboratories,…
Read MoreUnderstanding the usage, Modifications, Limitations and Criticisms of Technology Acceptance Model (TAM)
Technology Acceptance Model (TAM) is broadly accepted and has proved applicable in identifying consumers’ willingness to utilize information and communication technology (ICT). The theory proposes that Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) are actually determining factors of individual attitudes, while attitude is a determining factor of Behavioural Intention (BI) and Behavioural Intention…
Read MoreThe COVID-19 Effect in Mexican SMEs
This article presents a literature review on how the COVID-19 pandemic changed the way of managing risks in the supply chains of Mexican SMEs. Research was carried out in the most important scientific research databases. The spread of the pandemic in 2020 has affected public health and the world´s companies, including micro, small and medium…
Read MoreA Circular Invariant Convolution Model-Based Mapping for Multimodal Change Detection
The large and ever-increasing variety of remote sensing sensors used in satellite imagery today explains why detecting changes between identical locations in images that are captured, at two separate times, from heterogeneous capturing systems is a major and challenging recent research problem in the field of satellite imaging for fast and accurate determination of temporal…
Read MoreAn Overview on CryptDb and Word2vec Approaches
Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…
Read MoreInteractive Virtual Rehabilitation for Aphasic Arabic-Speaking Patients
Objective: Individuals with aphasia often experience significant problems in their daily lives and social participation. Technologies that address speech and language disorders deficit in merging between therapist’s major role and reinforcing the training between sessions at home. It also lacks the Arabic language attention; however, current systems are typically expensive and lack amusement. Moreover, cumulative…
Read MoreA Proactive Mobile Edge Cache Policy Based on the Prediction by Partial Matching
The proactive caching has been an emerging approach to cost-effectively boost the network capacity and reduce access latency. While the performance of which extremely relies on the content prediction. Therefore, in this paper, a proactive cache policy is proposed in a distributed manner considering the prediction of the content popularity and user location to minimise…
Read MoreDesign and Implementation a Novel System for Estimation Precise Transfer Function of DC Motor
A precise modelling plant system is substantial to improve the design of the DC motor controller, where a low accurate model may cause an unacceptable controller system. This study presents a hardware-in-the-loop (HIL) system for design a high speed motor data acquisition system (HSMDAQS) and injected collected data (ICD) Simulink model to estimate accurately the…
Read MoreDesign and Implementation of Aerial Vehicle Remote Sensing and Surveillance System, Dehazing Technique Using Modified Dark Channel Prior
After studying the aviation problems in Iraq, on one hand, and because Iraq has various weather characteristics due to its different terrains (i.e. mountains, plain fields, and deserts). We discussed these problems with pilots and aviation specialists, and came to the conclusion that the main offset faced is vision deficiency is foggy and dusty weather.…
Read MoreLoad Evaluation with Fast Decoupled-Newton Raphson Algorithms: Evidence from Port Harcourt Electricity
The undulated power supply has dropped to its worst reliability index in most parts of the city despite the installations of distribution transformers to improve the power. In this work, examination of Port Harcourt Town Zone 4 (Z4), Rivers State power distribution system forcing on its operation, planning for future expansion of the system, and…
Read MoreFabrication and Properties of Hybrid Membranes Based on Poly (Vinyl Alcohol), Sulfosuccinic Acid and Salts of Heteropolyacid with or without Silica for Fuel Cells Applications
Novel ionic polymers were synthesized by crosslinking of poly (vinylalcohol) (PVA) with sulfosuccinic acid (SSA) and silicotungstic acid (SiWA) with or without silica. The polymer electrolyte membrane fuel cell (PEMFC) was developed using solution casting method. Infrared (IR) spectra revealed that the Keggin structure was insered in the PVA films. The thermal decomposition of the…
Read MoreThe Curriculum Developer Team Assignment Analysis Using Ones Assignment Method
This examination plans to investigate the task issue in the educational program designer group utilizing the Ones Assignment Method. The calculation of this technique as follows. At first characterized the task grid, at that point by utilizing determinant portrayal acquired a diminished framework which has in any event one in each line and segments. At…
Read MoreA Study on Methodology of Improvement the Hydraulic System for Cometto Self-Propelled Trailer System
In recent years, the transport of large packages with super weight from 100 tons to several thousand tons is no longer a difficult problem due to the continuous development of technology. Experienced transport companies, specializing in transporting heavy goods in Vietnam, have invested in very modern equipment and machinery such as self-propelled trailers of Cometto…
Read MoreInvestigation of Dielectric Properties of Indigenous Blended Ester Oil for Electric System Applications
The insulation condition of a transformer decides the longevity of the equipment. The unpredicted failure of power transformer will lead to major disaster in the distribution network and it affects both environment and public safety. Nowadays synthetic oil and natural esters are alternatives to transformer oil because of the biodegradable nature. In this paper, investigations…
Read MoreIssues in File Caching and Virtual Memory Paging with Fast SCM Storage
Storage-Class Memory (SCM) like OptaneTM has advanced as a fast storage medium, and conventional memory management systems designed for the hard disk storage need to be reconsidered. In this article, we revisit the memory management system that adopts SCM as the underlying storage medium and discuss the issues in two layers: file caching and virtual…
Read MoreCNN-LSTM Based Model for ECG Arrhythmias and Myocardial Infarction Classification
ECG analysis is commonly used by medical practitioners and cardiologists for monitoring cardiac health. A high-performance automatic ECG classification system is a challenging area because there is difficulty in detecting and clustering various waveforms in the signal, especially in the manual analysis of electrocardiogram (ECG) signals. In this paper, an accurate (ECG) classification and monitoring…
Read MoreReview of Pedagogical Principles of Cyber Security Exercises
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…
Read MoreReview of Orange Juice Extractor Machines
There is some agricultural equipment for post harvesting of Orange fruit Juice, all the machine is geared towards extraction of the fruit juice. Fruit juice extraction is the act of wringing out the juice content of fruits by way of an effective processing and storage which enhance reduction in wastage. Fruit juices which literally have…
Read MoreWater Availability for a Self-Sufficient Water Supply: A Case Study of the Pesanggrahan River, DKI Jakarta, Indonesia
The research will explore the challenges of using local water sources inside the city for a self-sufficient urban water supply by developed a system dynamics model. This study aims to evaluate and understand the Pesanggrahan River appropriateness as a raw drinking water source through a conceptual model that can accurately represent the interactions between the…
Read MoreFour-Dimensional Sparse Data Structures for Representing Text Data
This paper focuses on a string encoding algorithm, which produces sparse distributed representations of text data. A characteristic feature of the algorithm described here, is that it works without tokenizing the text and can avoid other data preparation steps, such as stemming and lemmatization. The text can be of arbitrary size, whether it is a…
Read More
