Results (2366)
Search Parameters:
Keyword: REAnalysis of Two-Dimensional Electron Gas Formation in InGaAs-Based HEMTs
In this study, a theoretical simulation was performed using the Schrodinger-Poisson method to elucidate the formation factors for two-dimensional electron gas in InGaAs-based HEMTs. No visible change was observed in the carrier density and the potential shape. The inflection point of the energy level and the agreement of the energy level in each dimension were…
Read MoreAn ISO 25010 Based Quality Model for ERP Systems
Higher Education Institutions (HEIs) have begun rapidly adopting, selecting and implementing ERP systems due to the call by various governments to streamline their processes and practices. While ERPs are expanding at much faster rate, there is pressure on most HEIs to ensure quality. For quality model, ISO/IEC 25010 is an international standard for software and…
Read MoreSecuring Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model
In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…
Read MoreMinimizing the Cleaning Cost in Flash Based Storage Sub-Systems by Proliferating the Valid Data Copying Process
Flash memory reliability and the performance have been confirmed as an improvement in the storage subsystem technological advancement, especially in supporting an embedded system solution. Conversely, the main constraint of the storage device is the erase-before-write characteristic in handling both write and re-write I/O operations. More attention must be taken into consideration to handle both…
Read MoreApproach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection
Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…
Read MoreUnderstanding Human Perception of Vibrotactile Feedback in Walking and Running Tasks
Vibrotactile feedback is increasingly becoming an essential feedback component in several non-medical and medical areas. One area that vibrotactile feedback has not been explored as an intervention tool is in sports science. In addition, vibrotactile feedback lacks scientific evidence as a feedback mechanism within the sports world. A portable vibrotactile feedback system was developed to…
Read MoreComparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy
Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…
Read MorePromoting Continuous Professional Development Among Academics from A Vocational College by Using A Practical Workshop Based on Arduino Technology
The internet of things has resulted in the design and development of many electronic sensors that need to be integrated with various technologies. Engineering academics need ongoing training relating to this integration as they need to subsequently teach their students. This relates to continuous professional development. The purpose of this article is to illustrate how…
Read MoreAuthor Identification for Marathi Language
This is era of new technology; most of information is collected from internet, web sites. Some people uses data from research papers, thesis, and website as it is and publish as their own research without giving proper acknowledgement. This term is known as plagiarism. There are two types of plagiarism detection methods, i) Extrinsic plagiarism…
Read MoreOptimal Flow Analysis of a Unified Energy System with Effects of P2G
The reformation of energy hubs has significantly augmented the apprehensions about the levels of dependency between different energy sources which often can also be discussed as independent systems conventionally. This research brings focus on the formulation and analysis of an integrated system with bi-directional energy conversions and its effects on the stability of the system…
Read MoreA Comparative Analysis of ARIMA and Feed-Forward Neural Network Prognostic Model for Bull Services
Bull service is the natural copulation by a purebred male carabao with a female counterpart. This is part of the bull loan agenda of the Philippine Carabao Center-Visayas State University (PCC-VSU), one of the 12 regional centers of PCC. For the past years, PCC-VSU used averaging of bull services count of previous years and sometimes…
Read MoreUsing Metaheuristics-Based Methods to Provide Sustainable Market Solutions, Suitable to Consumer Needs
Nowadays the buildings sector is one of the key sectors to achieve sustainability, with the correspondent consumers, in particular, the household consumers, having the need to perform sustainable choices every day, regarding the appliances to be acquired from the market. This is not only due to government’s growing concerns about sustainability but also with the…
Read MoreHybrid Autogyro: Model and Longitudinal Control for Wind Gust Energy Conversion Using Autorotation
In the new technologies for producing electricity from wind gusts, a new class of wind power converter has been proposed. The hybrid autogyro uses the principle of autorotation to generate lift. This paper proposes to take advantage of this rotation to also generate energy. There are systems that use flying wings or airplanes to reach…
Read MoreWilson-Hilferty-type Approximation for Poisson Random Variable
The possibility to apply non-linear transformation of the Wilson-Hilferty type to the Pois- son random variable is investigated using an analytic approach, in order to improve the convergence towards the large-parameter Gaussian limit. Considering the already existing non-linear transformation for the Gamma distribution, the original Wilson-Hilferty and a higher-order transformations are showed and approximations for…
Read MoreAntenna Radiation Performance Enhancement Using Metamaterial Filter for Vehicle to Vehicle Communications Applications
In this work, an integrated metamaterial filter design in close proximity with monopole antenna is proposed for vehicular communication applications. A cylindrical screen formed by an array of metamaterial cells is designed to be reflective at 5.9 GHz in order to enhance antenna performance in intelligent vehicle transport systems. The unit cell proposed design based…
Read MoreExtending Movable Surfaces with Touch Interaction Using the VirtualTablet: An Extended View
Immersive output and natural input are two core aspects of a virtual reality experience. Current systems are frequently operated by a controller or gesture-based approach. However, these techniques are either very accurate but require an effort to learn, or very natural but miss haptic feedback for optimal precision. We transfer ubiquitous touch interaction with haptic…
Read MoreMethodology for Assessing Synchronization Conditions in Telecommunication Devices
This paper represents analysis of principles providing maximally reliable delay estimation of signal synchronization devices in telecommunication. Clock synchronization schemes on the base of stochastic models, graph-analytic interpretation, analytical functional description and their parameters selection in case of real complex hindrance are analyzed. Dependences between dispersion of maximally reliable estimation of synchronization devices and signal…
Read MoreScapy Scripting to Automate Testing of Networking Middleboxes
Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…
Read MoreElectronic Steering of the Vehicle Axle with Force Feedback
The technology of electronic steering with force feedback is related to electronic vehicle control. This technology is also known as “steer-by-wire” technology and is specific in that there is not any mechanical connection between the axle and the steering wheel. This technology is currently not very widespread. However, developments in the automotive industry are slowly…
Read MoreA Psychovisual Optimization of Wavelet Foveation-Based Image Coding and Quality Assessment Based on Human Quality Criterions
In the present article, we introduce a foveation-based optimized embedded and its optimized version image coders thereafter called VOEFIC/MOEFIC and its related foveation wavelet visible difference predictor FWVDP coding quality metric. It advances a visually advanced foveal weighting mask that regulates the wavelet-based image spectrum before its encoding by the SPIHT encoder. It intends to…
Read MoreControl of Electrostatic Suspension System Using Pulse Width Modulation
Electrostatic suspension systems have great potential applications in contactless transportation objects since they allow many different materials to be suspended. The electrostatic suspension will be widely applied in practice if the system cost is inexpensive. This paper presents an electrostatic suspension system controlled by using pulse width modulation (PWM). The use of PWM in electrostatic…
Read MoreHybrid Solar Thermal/Electricity Automated Oven
This paper presents hybrid solar thermal/electricity automated oven. The work compares sliding mode control (SMC) to traditional PID control of the oven system using MATLAB/Simulink 2014b model. SMC control method shows faster rise and settling time. The control technique has been designed to automate change of temperature level of the oven by accepting multiple reference…
Read MoreThe Implementation of Smart Farming Application Based on the Microcontroller and Automatic Sprinkler Irrigation System of Agricultural Land
This research to applying the application of e-smart farming to control the sprinkler irrigation on agricultural land. This study aims to be able to help farmers to solve the watering problems that are manually carried out into watering done automatically and controlled, besides that this research also obtained data about the level of moisture content…
Read MoreSatisfaction of Old Graduates of Zootechnical Engineering for Improvement of Educational Quality at the UNCP
Concept of university higher education quality is linked to the relevance of an educational project that promotes institutional transformation to improve the comprehensive training of new professionals. In this context, the research objective is to determine the graduates satisfaction level, trained with curricula 1979, 1985 and 1995 who have more than 20 years of graduation…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read More
