Results (220)
Search Parameters:
Keyword: EvaluationCriteria to Implement a Supervision System in the Petroleum Industry: A Case Study in a Terminal Storage Facility
A liquid petroleum storage facility (Terminal), is a platform used to store petroleum products. Terminals plays a strategic role on the oil and gas supply chain. There are three types of terminals: a fully automated terminal, a partially automated terminal and a fully manual terminal. To increase their efficiency and safety in a very competitive…
Read MoreLogistics Solutions in the Preparation Phase for the Appearance of Disasters
Natural disasters have caused not only economic but also human losses. These events bring with them, among other things, deficiencies in the supply of food, clothing, health and cleaning products, to name a few. This situation makes it imperative to locate facilities that can supply the needs, as mentioned earlier, to the victims in the…
Read MoreCoastal Risk Modelling for Oil Spill in the Mediterranean Sea
The accident probability estimation and the consequence analysis are based on statistical data about oil spill accident occurrence in the Mediterranean area, on the probability of different release sizes, and on the joint probability of wind speed and directions. The risk model and its evaluation have been assessed for the Mediterranean littoral considering the time…
Read MoreA Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network
Restoring, estimating the fully 3D hand skeleton and pose from the image data of the captured sensors/cameras applied in many applications of computer vision and robotics: human-computer interaction; gesture recognition, interactive games, Computer-Aided Design (CAD), sign languages, action recognition, etc. These are applications that flourish in Virtual Reality and Augmented Reality (VR/AR) technologies. Previous survey…
Read MoreFraud Detection Call Detail Record Using Machine Learning in Telecommunications Company
Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreLow Carbon Sustainable Building Material: Maximizing Slag Potentials for Improved Lime Mortar Mechanical Properties
Prior to the 19th century discovery of Portland Cement (PC), Lime Based Mortar remained popular due to its flexibility, permeability and more importantly, associated low carbon emissions. However, lime’s characteristic delayed setting/hardening time, low mechanical strength, poor internal cohesion and some volumetric changes have overshadowed significance of its outstanding features particularly, flexibility, and consequently put…
Read MoreA Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques
Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…
Read MoreFace Recognition on Low Resolution Face Image With TBE-CNN Architecture
Face recognition in low resolution images has challenges in active research because face recognition is usually implemented in high resolution images (HR). In general, research leads to a combination of pre-processing and training models. Therefore, this study aims to classify low-resolution face images using a combination of pre-processing and deep learning. In addition, this study…
Read MoreAn ISO 25010 Based Quality Model for ERP Systems
Higher Education Institutions (HEIs) have begun rapidly adopting, selecting and implementing ERP systems due to the call by various governments to streamline their processes and practices. While ERPs are expanding at much faster rate, there is pressure on most HEIs to ensure quality. For quality model, ISO/IEC 25010 is an international standard for software and…
Read MoreA Critical Analysis of Usability and Learning Methods on an Augmented Reality Application for Zoology Education
In recent years, research has been conducted focused on the use of technologies in the classroom, but one of the main problems is to demonstrate that the use of this technology favors learning compared to traditional methods. One of these technologies is augmented reality that allows seeing virtual objects superimposed in the real world, but…
Read MoreDesign and Validation of a Meter Band Rate in OpenFlow and OpenDaylight for Optimizing QoS
Technological developments in the Internet and communications have created a vastly complex and dynamic context with diverse heterogeneous networks and fast growth of mobile devices and multimedia. As the Internet becomes the primary mode of communication for many organisations there is requirement to enhance quality of service (QoS) from heterogeneous systems and networks. Traditional networks…
Read MoreProductify News Article Classification Model with Sagemaker
News companies have a need to automate and make the process of writing about popular and new events more effective. Current technologies involve robotic programs that fill in values in templates and website listeners that notify editors when changes are made so that the editor can read up on the source change on the actual…
Read MoreProject-Based Learning as a Tool of Enhancing of Entrepreneurial Attitude of Students
The increase in employment and productivity is crucial for the economic growth of the European Union. Specifically, the employment of young people needs to be increased. The excessively theoretical approach to education is identified as one of the most significant problems in the educational system. Acquirement of practical experience while study, presents for the students…
Read MoreTesting Web Service Compositions: Approaches, Methodology and Automation
Web services give a new view of the web as the biggest, widely accepted and the most straightforward distributed software platform. Their composition into applications and business processes is still a complex, non-trivial task, requiring highly rational efforts not only from the software developers, but from the quality assurance specialists. The provision if web service…
Read MorePerformance Portability and Unified Profiling for Finite Element Methods on Parallel Systems
The currently available variety of modern, highly-parallel universal processors includes multi-core CPU and many-core GPU (Graphics Processing Units) from different vendors. Systems composed of such processors enable high-performance execution of demanding applications like numerical Finite Element Methods. However, today’s application pro- gramming for parallel systems lacks performance portability: the same program code cannot achieve stable…
Read MoreThe Financial Services Authority of Indonesia E-Reporting System Development Based on Metadata XBRL Taxonomy
The XBRL taxonomy has been proven to be able to restore various forms of redundancies and ambiguities in making financial reports from financial service institutions. However, the nature of XBRL which is oriented towards documents and based on XML makes the XBRL taxonomy difficult to use because the information cannot be directly read by ordinary…
Read MorePerformance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. Due to the mobility-related instability of the paths between nodes and due to the limited buffer and energy resources, the ultimate objective of routing protocols in opportunistic…
Read MoreA Comparative Study of Safety Leading and Lagging Indicators Measuring Project Safety Performance
The safety management system is recognized by safety leading and lagging indicators, and their correlation with injury rates. The background on this specific subject is vague in definition, labelling, and indicators measurement. The comparativeness between leading and lagging indicators have been introduced in the constructing safety performance projects evaluation. Safety performance leading indicators are the…
Read MoreCurrent Trends and Challenges in Link Prediction Methods in Dynamic Social Networks: A Literature Review
In more recent times, researchers have turned their attention to link prediction and the role link inference can play in better understanding the evolutionary nature of social networking sites. The objective of this paper is to present an in-depth review, analysis, and discussion of the cutting-edge link prediction methods that can be applied to better…
Read MoreSCMS: Tool for Assessing a Novel Taxonomy of Complexity Metrics for any Java Project at the Class and Method Levels based on Statement Level Metrics
Software is the primary and indispensable entity in our technologically driven world. Therefore, quality assurance, and in particular software testing, represents a vital component in the software development cycle. Throughout the years, many tools have been developed to collect metrics of software that had been implemented. These tools have some differences but continue to play…
Read MoreSpiral Curve for Revocable Touchless Fingerprint Template Securisation
Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…
Read MoreLearning Literary Style End-to-end with Artificial Neural Networks
This paper addresses the generation of stylized texts in a multilingual setup. A long short-term memory (LSTM) language model with extended phonetic and semantic embeddings is shown to capture poetic style when trained end-to-end without any expert knowledge. Phonetics seems to have a comparable contribution to the overall model performance as the information on the…
Read MoreA Proposal of TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point
The IEEE802.11n based Wireless Local Area Networks (WLANs) have been extensively deployed due to the flexible coverage, the easy installation, and the lower cost. To reduce the energy consumption while increasing the performance, the elastic WLAN system has been studied, such that it can dynamically change the network configuration according to traffic demands. As well,…
Read MoreChatting with Plants (Orchids) in Automated Smart Farming using IoT, Fuzzy Logic and Chatbot
Plants are living organisms that can hear and recognize the environment around them but cannot communicate to inform their needs. Thus, in the past, humans thought that it was impossible to communicate with plants. However, in this modern era, humans can be able to communicate with these plants. In this paper, we propose a model…
Read More
