Results (2362)
Search Parameters:
Keyword: RELearning Personalization Based on Learning Style instruments
Adaptive education systems (AES) are considered one of the most interesting research topics in technology-based learning strategies. Since students have different abilities, needs and learning styles, we should fit the curriculum and teaching activities to these different learning styles. This study investigates the impact of using LAES (Libyan Adaptive Education System) on the performance of…
Read MoreEvaluating the effect of Locking on Multitenancy Isolation for Components of Cloud-hosted Services
Multitenancy isolation is a way of ensuring that the performance, stored data volume and access privileges required by one tenant and/or component does not affect other tenants and/or components. One of the conditions that can influence the varying degrees of isolation is when locking is enabled for a process or component that is being shared.…
Read MoreEffects of Dielectric Properties of the Material located inside Multimode Applicator on Microwave Efficiency
During microwave heating of materials, the efficiency of microwave heating depends on the materials’ dielectric property, shapes and sizes of the material, materials’ position inside the applicator, operating frequency, level of input power, specific heat capacity, number and position of waveguide over the applicator, size and geometry of applicator etc. This paper examines the effects…
Read MoreEffects of Cinnamon on Diabetes
Diabetes is a condition of the body in which blood sugar level is higher than the normal average value. It is considered as a major cause of morbidity worldwide. According to the data reported in 2015,420 million people had diabetes worldwide, type 2 diabetes account for 85% of these cases. This shows 9.2% of the…
Read MoreEAES: Extended Advanced Encryption Standard with Extended Security
Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…
Read MoreA Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security
During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…
Read MorePerformance improvement of a wind energy system using fuzzy logic based pitch angle control
The pitch angle controller maintains the aerodynamic captured power at rated level when the wind speed is above the rated speed. Besides, it can also improve the transient stability occurring in the wind energy system (WES). This paper, therefore, proposes an effective pitch angle control strategy that can deliver the conditioned output power in windy…
Read MoreDesign of True Random Numbers Generators with Ternary Physical Unclonable Functions
Memory based ternary physical unclonable functions contain cells with fuzzy states that are exploited to create multiple sources of physical randomness, and design true random numbers generators. A XOR compiler enhances the randomness of the binary data streams generated with such components, while a modulo-3 addition enhances the randomness of the native ternary data streams,…
Read MoreA Comparison of MIMO Tuning Controller Techniques Applied to Steam Generator
This work presents a comparison between controller tuning methods for a multivariable steam generator. Controller tuning has a remarkable impact on closed loop performance. Methods selected were Single-Loop Tuning (SLT), Biggest Log Modulus Tuning (BLT), Sequential Return- Difference (SRD) and Structured H(inf) Synthesis (S-H(inf)). Method assessment takes into account set-point tracking, disturbance rejection, tuning effort and…
Read MoreEfficient Alignment of Very Long Sequences
We consider the problem of aligning two very long biological sequences. The score for the best alignment may be found using the Smith-Waterman scoring algorithm while the best alignment itself may be determined using Myers and Miller’s alignment algorithm. Neither of these algorithms takes advantage of computer caches to obtain high efficiency. We propose cache-efficient…
Read MoreOntology Modeling of Social Roles of Users in Mobile Computing Environments
Today, computing devices of various types with wireless interconnections are used for diverse tasks and increasingly in ad hoc manners. It is not always obvious which devices are present, reachable, and connected when users and their devices are mobile. In such mobile computing environment, the number of registered lines on the network via network operators…
Read MoreWhich User of technology? Perspectivising the UTAUT model by application of the SFL language Pronoun System towards a systems perspective of technology acceptance and use
This study applies systemic functional linguistics (SFL) as complementary framework of analysis of technology acceptance models (TAMs). The purpose is to bridge research methodology language in international business (IB) studies and engineering management science. Currently TAMs and its consolidated version, the Unified Theory of Acceptance and Use of Technology (UTAUT) provides for a typology of…
Read MoreAn Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics
Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…
Read MoreFuel Cell/ Super-capacitor power management system assessment and Lifetime Cost study in a 500kVA UPS
A 500 KVA Uninterruptible power supply (UPS) using Fuel Cells (FC) and super-capacitors (SCs) was studied with the worst case of 10 minutes and eight hours of interruption per day. A power management system was established to control the FC and the SCs in order to extract the hybridization benefits with a comparison between a…
Read MoreThe impact of Big Data on the Android Mobile Platform for Natural Disaster Situations
This application developing for the project OCEMA comes as result of architecture building in Android, then the development of a professional modeling in Talend Open Studio for Big Data, which enabled the integration of data from many data sources. One of its uses is the quick identification of people found in areas affected by natural…
Read MorePerformance Analysis of NLMS Channel Estimation for AMC-COFDM System
In this paper we focus on the adaptive modulation and coding (AMC) techniques, makes use of the channel state information (CSI) to improve the spectral efficiency (SE) in wireless communication systems. To achieve higher data rates and lower bit error rate (BER’s) channel coding can be carried out in OFDM, called COFDM. The NLMS channel…
Read MoreA Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation
Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…
Read MoreEfficient Limited Feedback Technique for FDD MIMO Systems
In this paper an efficient feedback quantization technic for beamforming in MIMO systems is presented. The proposed technic named time domain quantization TD-Q is based on the feedback of time domain parameters necessary for the reproduction of the beamforming matrix at the transmitter. This TD-Q presents the same performance than the conventional Givens rotation quantization…
Read MoreMission-Critical Systems Design Framework
Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B) within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to…
Read MoreAutomated Text Annotation for Social Media Data during Natural Disasters
Nowadays, text annotation plays an important role within real-time social media mining. Social media analysis provides actionable information to its users in times of natural disasters. This paper presents an approach to a real-time two layer text annotation system for social media stream to the domain of natural disasters. The proposed system annotates raw tweets…
Read MorePerformance of Location and Positioning Systems: a 3D-Ultrasonic System Case
The necessity of navigation in people and mobile robots (MR) through specific environments (indoors or outdoors) has become more and more relevant nowadays. For indoors, generally speaking, the positioning systems can be divided into 2D (two dimensions) or 3D (three dimensions) approaches, where Ultrasonic Local Positioning Systems (ULPS) are often a common solution for MRs…
Read MoreAgent Based Fault Detection System for Chemical Processes using Negative Selection Algorithm
Recently, the number of industrial accidents of chemical plants has been increasing in Japan. The fault detection system is required to keep chemical plant safely. In this study, a fault detection system for a chemical plant using agent framework and negative selection algorithm was proposed. The negative selection algorithm is one of artificial immune systems.…
Read MoreEstimating short time interval densities in a CTM-KF model
On-ramping is being widely used as e method to increase the freeway operational efficiency. The main traffic parameter that must be taken in consideration for the implementation of the feedback control strategies for the on-ramp metering is density on the main section of road. In this paper is given discretized model of traffic which is…
Read MoreTPMTM: Topic Modeling over Papers’ Abstract
Probabilities topic models are active research area in text mining, machine learning, information retrieval, etc. Most of the current statistical topic modeling methods, such as Probabilistic Latent Semantic Analysis (pLSA) and Latent Dirichlet Allocation (LDA). They are used to build models from unstructured text and produce a term-based representation to describe a topic by choosing…
Read MoreAn Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images
Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…
Read More
