Results (2366)
Search Parameters:
Keyword: REScientific Principles behind 2017 World Universiade of Safety Lantern and Torch
The torch relay for the 2017 Taipei Summer Universiade started June. The innovative torch design was altered and tested, follow-up production successfully. For preventing weather effect, the head of the torch embedded with a unique airflow structure that allowed the sacred flame to pass the wind and rain tests. The safety lantern displays a 3D…
Read MoreFuzzy Logic Based Selective Harmonic Elimination for Single Phase Inverters
A selective harmonic elimination system using fuzzy logic for the elimination of high magnitude harmonics with frequencies close to fundamental in the output voltage of single phase inverters is presented. The system does not require look up tables for storage of the data as in traditional harmonic elimination methods. The input of the fuzzy system…
Read MoreAutomating Hostel Telephone Systems
Residential schools can be a great place for students to learn and develop a different set of skills if the right environment is given to the child. Constant communication with parents can help the child to stay motivated and feel comfortable away from home, hence schools tend to provide various solutions to allow the student…
Read MoreA New Study Performance Control of PMSMs: Validity Abacus Approach
This paper is an extension of work originally presented in conference name” Study Performance of Speed Tracking Control with Frequency and Amplitude Dependence”. Though many PMSMs (Permanent Magnet Synchronous Motor) control approach have already been published, little endeavors have been invested in the study of speed tacking control with frequency or amplitude dependence. The use…
Read MoreLearning Personalization Based on Learning Style instruments
Adaptive education systems (AES) are considered one of the most interesting research topics in technology-based learning strategies. Since students have different abilities, needs and learning styles, we should fit the curriculum and teaching activities to these different learning styles. This study investigates the impact of using LAES (Libyan Adaptive Education System) on the performance of…
Read MoreEvaluating the effect of Locking on Multitenancy Isolation for Components of Cloud-hosted Services
Multitenancy isolation is a way of ensuring that the performance, stored data volume and access privileges required by one tenant and/or component does not affect other tenants and/or components. One of the conditions that can influence the varying degrees of isolation is when locking is enabled for a process or component that is being shared.…
Read MoreEffects of Dielectric Properties of the Material located inside Multimode Applicator on Microwave Efficiency
During microwave heating of materials, the efficiency of microwave heating depends on the materials’ dielectric property, shapes and sizes of the material, materials’ position inside the applicator, operating frequency, level of input power, specific heat capacity, number and position of waveguide over the applicator, size and geometry of applicator etc. This paper examines the effects…
Read MoreEffects of Cinnamon on Diabetes
Diabetes is a condition of the body in which blood sugar level is higher than the normal average value. It is considered as a major cause of morbidity worldwide. According to the data reported in 2015,420 million people had diabetes worldwide, type 2 diabetes account for 85% of these cases. This shows 9.2% of the…
Read MoreEAES: Extended Advanced Encryption Standard with Extended Security
Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…
Read MoreA Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security
During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…
Read MorePerformance improvement of a wind energy system using fuzzy logic based pitch angle control
The pitch angle controller maintains the aerodynamic captured power at rated level when the wind speed is above the rated speed. Besides, it can also improve the transient stability occurring in the wind energy system (WES). This paper, therefore, proposes an effective pitch angle control strategy that can deliver the conditioned output power in windy…
Read MoreDesign of True Random Numbers Generators with Ternary Physical Unclonable Functions
Memory based ternary physical unclonable functions contain cells with fuzzy states that are exploited to create multiple sources of physical randomness, and design true random numbers generators. A XOR compiler enhances the randomness of the binary data streams generated with such components, while a modulo-3 addition enhances the randomness of the native ternary data streams,…
Read MoreA Comparison of MIMO Tuning Controller Techniques Applied to Steam Generator
This work presents a comparison between controller tuning methods for a multivariable steam generator. Controller tuning has a remarkable impact on closed loop performance. Methods selected were Single-Loop Tuning (SLT), Biggest Log Modulus Tuning (BLT), Sequential Return- Difference (SRD) and Structured H(inf) Synthesis (S-H(inf)). Method assessment takes into account set-point tracking, disturbance rejection, tuning effort and…
Read MoreEfficient Alignment of Very Long Sequences
We consider the problem of aligning two very long biological sequences. The score for the best alignment may be found using the Smith-Waterman scoring algorithm while the best alignment itself may be determined using Myers and Miller’s alignment algorithm. Neither of these algorithms takes advantage of computer caches to obtain high efficiency. We propose cache-efficient…
Read MoreOntology Modeling of Social Roles of Users in Mobile Computing Environments
Today, computing devices of various types with wireless interconnections are used for diverse tasks and increasingly in ad hoc manners. It is not always obvious which devices are present, reachable, and connected when users and their devices are mobile. In such mobile computing environment, the number of registered lines on the network via network operators…
Read MoreWhich User of technology? Perspectivising the UTAUT model by application of the SFL language Pronoun System towards a systems perspective of technology acceptance and use
This study applies systemic functional linguistics (SFL) as complementary framework of analysis of technology acceptance models (TAMs). The purpose is to bridge research methodology language in international business (IB) studies and engineering management science. Currently TAMs and its consolidated version, the Unified Theory of Acceptance and Use of Technology (UTAUT) provides for a typology of…
Read MoreAn Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics
Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…
Read MoreFuel Cell/ Super-capacitor power management system assessment and Lifetime Cost study in a 500kVA UPS
A 500 KVA Uninterruptible power supply (UPS) using Fuel Cells (FC) and super-capacitors (SCs) was studied with the worst case of 10 minutes and eight hours of interruption per day. A power management system was established to control the FC and the SCs in order to extract the hybridization benefits with a comparison between a…
Read MoreThe impact of Big Data on the Android Mobile Platform for Natural Disaster Situations
This application developing for the project OCEMA comes as result of architecture building in Android, then the development of a professional modeling in Talend Open Studio for Big Data, which enabled the integration of data from many data sources. One of its uses is the quick identification of people found in areas affected by natural…
Read MorePerformance Analysis of NLMS Channel Estimation for AMC-COFDM System
In this paper we focus on the adaptive modulation and coding (AMC) techniques, makes use of the channel state information (CSI) to improve the spectral efficiency (SE) in wireless communication systems. To achieve higher data rates and lower bit error rate (BER’s) channel coding can be carried out in OFDM, called COFDM. The NLMS channel…
Read MoreA Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation
Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…
Read MoreEfficient Limited Feedback Technique for FDD MIMO Systems
In this paper an efficient feedback quantization technic for beamforming in MIMO systems is presented. The proposed technic named time domain quantization TD-Q is based on the feedback of time domain parameters necessary for the reproduction of the beamforming matrix at the transmitter. This TD-Q presents the same performance than the conventional Givens rotation quantization…
Read MoreMission-Critical Systems Design Framework
Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B) within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to…
Read MoreAutomated Text Annotation for Social Media Data during Natural Disasters
Nowadays, text annotation plays an important role within real-time social media mining. Social media analysis provides actionable information to its users in times of natural disasters. This paper presents an approach to a real-time two layer text annotation system for social media stream to the domain of natural disasters. The proposed system annotates raw tweets…
Read MorePerformance of Location and Positioning Systems: a 3D-Ultrasonic System Case
The necessity of navigation in people and mobile robots (MR) through specific environments (indoors or outdoors) has become more and more relevant nowadays. For indoors, generally speaking, the positioning systems can be divided into 2D (two dimensions) or 3D (three dimensions) approaches, where Ultrasonic Local Positioning Systems (ULPS) are often a common solution for MRs…
Read More
