Results (2366)
Search Parameters:
Keyword: REAn Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador
Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…
Read MoreVowel Classification Based on Waveform Shapes
Vowel classification is an essential part of speech recognition. In classical studies, this problem is mostly handled by using spectral domain features. In this study, a novel approach is proposed for vowel classification based on the visual features of speech waveforms. In sound vocalizing, the position of certain organs of the human vocal system such…
Read MoreMicrostrip Patch Antenna for Ultra-Wideband Applications
A new microstrip patch antenna for ultra-wideband applications is presented in this paper. The design and performance of the antenna component are discussed. The propounded antenna is mounted on a compact FR-4 substrate having dimensions 20 x 30 x 1.6 mm3 with relative permittivity εr=4.3. The rectangular patch antenna is slotted with two types; rectangular…
Read MoreDetection the Places of the Heat Energy Leak on the Underground Thermal Pipelines Using the Computer System
The purpose of this paper is to improve the thermographic method for detection the places of heat energy losses on the urban underground thermal pipelines using the computer system. This goal was achieved by building a heat map of the surveyed heating main with data layering directly on a computer map of the area, which…
Read MoreEvaluation of IEEE 802.11n and IEEE 802.11p based on Vehicle to Vehicle Communications
Wireless communication opens up new avenues in the field of intelligent vehicle systems, including monitoring, guidance and warning applications. In order to determine more precisely the feasibility of using the 802.11n standard in vehicular communication systems, this paper describes a process for evaluating the propagation performance of the 802.11n and 802.11p standards. To do that,…
Read MoreA Novel Rule Based Technique to Detect Electricity Theft in India
It is high time to control and prevent power theft by manipulating the meter reading and tampering of the meter. It is possible to deal power theft by developing Advanced Metering Infrastructure (AMI) and smart grids. For most of the distribution companies, utility smart meters’ data is serving as wealthy source of information beyond billing.…
Read MoreBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreA Formal Ontology-based Framework Towards an Intelligent Temporal Scheduler
Time scheduling as seen in timetabling processes with few and/or competing resources has exposed complex interoperable time scheduling. Attempts to resolving these time scheduling processes has been undertaken, using several classical methods, with difficulty due to inherent complexities, constraints and conflicting issues. The use of ontology-based approaches to resolve time complexity is recently adopted due…
Read MoreDistribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field
The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreHybrid Technique for Enhancing Underwater Image in blurry conditions
Enhancing underwater visualization using hybrid technique is generally employed into oceanic production. Through growing oceanic learning, undersea processing has drawn extra importance owing towards necessary task of picture towards attaining data. Although, suitable to reality of dust-like constituent and beam reduction, undersea descriptions continually experience small contrast and color alteration. In this paper, we estimate…
Read MoreOptimization of Statcom in a Nouakchott Power System
STATCOM a shunt connected Flexible Alternative Current Systems (FACTS) device using for fast control of voltage and reactive power control in the power grid. To optimize Nouakchott power system at 2030 year, we anticipate both generation and demand grow. A set of nonlinear equations are solved through Newton Raphson method and programmed in PSS/E and…
Read MoreNoise Cancellation Algorithm Based on Air- and Bone-Conducted Speech Signals by Considering an Unscented Transformation Method
Noise control is essential when applying speech recognition in noisy environments such as factories. In this study, a signal processing for noise cancellation is proposed by using a noise-insensitive bone-conducted speech signal together with an air-conducted speech signal. The speech signal is generally expressed by a nonlinear model. The extended Kalman filter is very famous…
Read MoreConversion of 2D to 3D Technique for Monocular Images using Papilio One
A 3D image adds realism in viewing experience and can assist in simplifying the graphical displays. A Third dimension supplement to the input can improve pattern recognition, and can be used for 3D scene reconstruction and robot navigation. Recently popularity of 3D hardware is also increased which makes it a hot topic. The production of…
Read MoreEnabling the Edge – A method for dynamic virtualizable connections for 5G deployments
The telecommunications industry continues to move forward with plans for 5G service with rates including 6Gb/s followed by upgrade paths promising 20Gb/s. Despite advances in wireless technology associated with 5G roll-outs, there remains the problem of providing sufficient backhaul throughput and efficient handling of hand-off services within the relatively small projected cell boundaries that can…
Read MoreA New Model of Supplier’s Selection for Sustainable Supply Chain Management
In the last years, industrial company began to understand the central role that plays sustainable supplier selection (SSS) process for obtaining a sustainable supply chain (SSC). This paper proposes a new multi-criterion decision-making (MCDM) model for managers, which makes it possible to select the best suppliers who respect the sustainable development (SD) concept for a…
Read MoreDesigning IT Blue Print Academic System on Higher Education with Togaf
STIE XYZ is one of the universities of economics that has not been optimal in the use of information technology. IT implementation is applied when there are urgent and sudden needs. So it is not planned carefully according to the development needs of this educational institution. Therefore many patchy applications are created. As the consequence,…
Read MoreApplication of The Half-Sweep Egsor Iteration for Two-Point Boundary Value Problems of Fractional Order
The point of this study is to explore and elucidating the performance of the four-point Half-Sweep EGSOR (4HSEGSOR) iterative method to solve fractional two-point boundary value problems by using Caputo’s fractional operator and family of finite differences (FD) schemes. To apply the iterative methods, linear system needs to be constructed via the discretization process with…
Read MoreVirtualization in Cloud Environment: Bandwidth Management
Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…
Read MoreParallel Hybrid Testing Tool for Applications Developed by Using MPI + OpenACC Dual-Programming Model
Building massively parallel applications has become increasingly important with coming Exascale related technologies. For building these applications, a combination of programming models is needed to increase the system’s parallelism. One of these combinations is the dual-programming model (MPI+X) which has many structures that increase parallelism in heterogeneous systems that include CPUs and GPUs. MPI +…
Read MoreComputational and Technological Models of Cognitive Monitoring Systems
The approach to the construction of promising cognitive monitoring systems is considered. Based on the analysis of known solutions, the problem of automatic synthesis of computational models of cognitive monitoring is posed. In the synthesis of models, it is proposed to reduce them to relatively finite operational automata. An example of a synthesized model of…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreDevelopment & Implementation of Smart Vehicle Over Speeding Detector using IoT
Nowadays over speeding is one of the most common traffic violations. Generally, over speeding is the result of restless and bad behavior of drivers. As the accident rates are increasing it is important to develop and implement a system which can automatically detect and report over speeding to the traffic control authorities as early as…
Read MoreEducational Domain Management Knowledge Content Identification and Knowledge Updating Method, Based on Enterprise Management Information Interactions
The aim of this paper is to develop the educational domain management knowledge content identification and knowledge updating method, based on formal descriptions of enterprise management information interactions. This is very important because the progress of modern science leads to the emergence of new factual or conceptual knowledge. There is a need for proper methods…
Read MoreAssessment of Coordinated Multipoint Transmission Modes for Indoor and Outdoor Users at 28 GHz in Urban Macrocellular Environment
The aim of this article is to analyze and evaluate the performance of Coordinated Multipoint (CoMP) transmission approach at a frequency of 28 GHz using three dimensional ray tracing simulations in an urban macrocellular environment. The new performance metric introduced in this article is the relative power usage. Other performance metrics examined in this article…
Read More
