Results (601)
Search Parameters:
Keyword: EffectLean Six Sigma Implementation in the Food Sector: Nexus between Readiness-Critical Success Factors
Lean Six Sigma (LSS) is a renowned approach for boosting operational excellence and competitive advantage through integrated core objectives of value creation and variation reduction. Despite its proven benefits in many leading companies, LSS implementation in the food sector is still behind compared with other sectors. LSS implementation is costly, and most businesses have failed…
Read MoreBuilding Health Monitoring using Visualization of Sound Features Based on Sound Localization
This paper describes what can be accomplished by understanding sound environments. Understanding sound environments is achieved by extracting the features of the sound and visualizing the features. The visualization is realized by converting the three features, namely, loudness, continuity, and pitch, into RGB values and expressing the sound with color, where the color is painted…
Read MoreEnhancing Decision Trees for Data Stream Mining
Data stream gained obvious attention by research for years. Mining this type of data generates special challenges because of their unusual nature. Data streams flows are continuous, infinite and with unbounded size. Because of its accuracy, decision tree is one of the most common methods in classifying data streams. The aim of classification is to…
Read MoreTETRA™ Techniques to Assess and Manage the Software Technical Debt
The paper examines the company’s proprietary means for determining the quality of a software product and measuring its technical debt. The paper’s authors explain how a software product’s quality is directly correlated with the amount of varying technical debts that the end-users receive. All debts can be paid, and technical debt is no exception: one…
Read MoreEnsemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection
The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…
Read MoreA Task-based Paradigm for Promoting an Alternative Thinking Style in Teaching Mathematics
The article identifies an alternative style of thinking as one of the important components of human intellectual development. It is shown that it can be effectively implemented in mathematics lessons at school. The purpose of this study is to develop and substantiate a strategy for the formation of an alternative style of thinking among students…
Read MoreExtraction of Psychological Symptoms and Instantaneous Respiratory Frequency as Indicators of Internet Addiction Using Rule-Based Machine Learning
Internet addiction (IA) has adverse effects on psychophysiological responses, interpersonal relationships, and academic and occupational performance. IA detection has received increasing attention. Although questionnaires enable long-term assessment (over 6 months) and physiological measurements to aid the short-term evaluation (over 2 min) of IA, the lack of algorithms results in an inability to detect IA in…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MoreCoupled Apodization Functions Applied to Enhance Image Quality in Ultrasound Imaging using Phased Arrays
The remarkable presence of side lobes levels in ultrasound B-mode imaging significantly decreases the image quality. Therefore, the use of an apodization function is of great importance. Linear windowing functions are among the most efficient techniques used to optimize antenna directivity by suppression of the side lobes. However, the apodization causes the degradation of lateral…
Read MoreMachine Learning Algorithms for Real Time Blind Audio Source Separation with Natural Language Detection
The Conv-TasNet and Demucs algorithms, can differentiate between two mixed signals, such as music and speech, the mixing operation proceed without any support information. The network of convolutional time-domain audio separations is used in Conv-TasNet algorithm, while there is a new waveform-to-waveform model in Demucs algorithm. The Demucs algorithm utilizes a procedure like the audio…
Read MoreAnalysis of Grid Events Influenced by Different Levels of Renewable Integration on Extra-large Power Systems
In this work, the impact of implementing a large amount of decentralized renewable energy sources (RES) of different scales on an extra-large power grid is investigated. Three scenarios are created, substituting 10%, 20%, and 30% of the conventional energy production by RES. For this purpose, the initial dynamic model of Continental Europe in combination with…
Read MoreCyber Incident Handling and the Perceptions of Learners on Cyber Incidents in South African Schools
With increases in technological usage, cyber incidents are also on the rise and have become a major concern in schools across the globe. What is of significant concern is that cyber incidents in South African schools are also on the rise. Existing evidence suggests that, in South Africa there are no clear procedures that are…
Read MorePersonalized Serious Games for Improving Attention Skills among Palestinian Adolescents
Serious games (SGs) are interactive and entertaining digital games with a special educational purpose. Studies have shown that SGs are effective in enhancing educational skills. Cognitive skills training through serious games have been used in improving students learning outcomes. In this article, we introduce the ‘plants kingdom’ serious game for improving adolescents’ cognitive skills, mainly…
Read MorePower Saving MAC Protocols in Wireless Sensor Networks: A Performance Assessment Analysis
Wireless sensor networks are an emerging technology that is used to monitor points or objects of interest in an area. Despite its many applications, this kind of network is often limited by the fact that it is difficult to provide energy to the nodes continuously, forcing the use of batteries, which restricts its operations. Network…
Read MoreReal Time RSSI Compensation for Precise Distance Calculation using Sensor Fusion for Smart Wearables
To effectively implement the social distancing or digital contact tracing in epidemic using an RSSI-based localization approach through Bluetooth beacon is one of the most widely used technologies, but simply using RSSI measurement is not more relevant because the RF signal is affected by several factors and the environment of usage. Traditional distance or positioning…
Read MorePerformance of Vertical Axis Wind Turbine Type of Slant Straight Blades
There is no doubt that energy is one of the most important requirements of life, and its importance increases with the passage of time, and this is what make countries to harness the capabilities and scientists in developing energy systems of all kinds, one of the most important energy systems these days is what is…
Read MoreEvaluation Studies of Motion Sickness Visually Induced by Stereoscopic Films
Humans have experienced motion sickness and possessed the knowledge of stereopsis since classical antiquity. Knowledge of stereopsis dates back to approximately 300 B.C., when Euclid first recognized the concept of depth perception in human vision. Further, the motion sickness is including a sensation of wooziness and nausea that has been documented since approximately 400 B.C.,…
Read MoreStudy on Deformation Behavior of Sediments and Applicability of Sealants in Seabed Mining
The importance of rare earth resources is increasing and a lot of investigations are conducting all over the world. As a result, it was discovered that abundant deep-sea mud contained rare-earth elements on the deep-sea floor. The suction mining method can be one of the effective seabed mining methods to recover these seafloor sediments. However,…
Read MoreA Novel De-rating Practice for Distributed Photovoltaic Power (DPVP) Generation Transformers
Transformers are habitually designed and manufactured for operation at a fundamental frequency of 50Hz and sinusoidal load current. Transformers are susceptible to non-linear loads. The inception of switching action characterises Non-linear loads and consequently nonsinusoidal load current which brings about higher transformer service losses, hotspot temperature rise, and degradation of cellulosic and liquid insulation, and…
Read MoreA Reconfigurable Stepped Frequency Continuous Wave Radar Prototype for Smuggling Contrast, Preliminary Assessment
A reconfigurable Stepped Frequency Continuous Wave (SFCW) radar prototype for supporting the italian financial police to contrast smuggling, is proposed in this work. In particular, the proposed radar can provide information related to the container contents and the presence of false bottoms speeding up the control operations at borders and ports. Moreover, it is able…
Read MoreExploiting Domain-Aware Aspect Similarity for Multi-Source Cross-Domain Sentiment Classification
We propose a novel framework exploiting domain-aware aspect similarity for solving the multi- source cross-domain sentiment classification problem under the constraint of little labeled data. Existing works mainly focus on identifying the common sentiment features from all domains with weighting based on the coarse-grained domain similarity. We argue that it might not provide an accurate…
Read MoreAnalyzing the Application of Two Main Microcontrollers in Engineering Education – A Case Study of three IEEE Conferences Focusing on Education
Microcontrollers have revolutionized the field of Engineering Education. Their popularity and cost-effectiveness have opened a large door of activity for innovative projects at both the undergraduate and graduate levels. The purpose of this article is to review this activity in terms of where two of these microcontrollers have been used in Engineering Education so as…
Read MoreTechnique to Simulate an Oscillator Ensemble Represented by the Kuramoto Model
The paper presents the technique for the user-friendly numerical simulation of coupled oscillators described by the Kuramoto model. Oscillators couplings are defined as arbitrary 2?-periodic functions given by the Fourier series. Matlab procedure was developed to generate netlist for the equivalent electrical circuit diagram of the Kuramoto model. The input data of the procedure include…
Read MoreDriver Fatigue Tracking and Detection Method Based on OpenMV
Aiming at the problem of fatigue driving, this paper proposed a driver fatigue tracking and detection method combined with OpenMV. OpenMV is used for image acquisition, and the Dlib feature point model is used to locate the detected driver’s face. The aspect ratio of eyes is calculated to judge the opening and closing of eyes,…
Read MoreEvaluation of Radiological Health Risk Associated with Indian Tiles Available in Nigerian Markets
The Present work is to investigate effect of dry sliding wear behaviour of ZA27 base alloy, after reinforcing it with Molybdenum Di Sulphide (MoS2) particles from 0% to 4% in five steps. To examine the wear behaviour of both reinforced and un-reinforced material, dry or unlubricated pin on disc tests were conducted. These tests were…
Read More
