Results (2366)
Search Parameters:
Keyword: REA Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning
With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. Cyberbullying is affecting a lot of children around the world, especially Arab countries. Thus concerns from cyberbullying are rising. A lot of research is ongoing with the purpose of diminishing…
Read MoreEnhancement of Voltage Stability through Optimal Location of UPFC
This paper proposed the identification of the proper placement of UPFC (Unified Power Flow Controller) using a series of methodological numeric simulations to improve voltage stability. For this purpose, the critical zone of the system is determined, then, comparative analyses depending on different emplacements of UPFC are performed. The dynamic model of UPFC and the…
Read MoreHeuristic Based Approach for Voltage Stability Improvement using FACTS Devices
The aim of this paper is to develop a hybrid device for voltage stability enhancement using two kinds of FACTS (Flexible AC Transmission System) namely SVC (Static Var Compensator) and TCSC (Thyristor Controlled Series Capacitor). The idea behind the proposed method is to maintain safe and satisfactory power system operation in a lesser costing manner…
Read MoreEfficiency Assessment of Plasma-Aided Porous Media Surface Finishing
The efficiency of a plasma-aided finishing process, namely capillary impregnation, can be predicted only by setting two basic parameters of the real wood porous surface and the actual impregnating solution – surface free energy and surface tension. In general, the following processing efficiency parameter was found and the rule is true: “The plasma aided or…
Read MoreA Study on Isomorphic Properties of Circulant Graphs
denotes circulant graph of order for a set where Circulant graph is said to have the Cayley Isomorphism (CI) property if whenever is isomorphic to , there is some for which . In this paper, isomorphic properties of circulant graphs that includes Self-complementary circulant graphs; Type-2 isomorphism, a new type of isomorphism other than already known Adam’s isomorphism of circulant graphs and Cartesian product and factorization of…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreNovel Analysis of Synchronous and Induction Generators in Parallel Operation Mode in an Isolated Electric System
This paper presents an analysis of a parallel connection of one synchronous generator and one self-excited induction generator that feeds a resistive load and an Induction Motor. The system voltage and frequency are controlled by a voltage control loop and a speed control loop connected to synchronous generator. The induction generator speed is controlled by…
Read MoreComparison of K-Means and Fuzzy C-Means Algorithms on Simplification of 3D Point Cloud Based on Entropy Estimation
In this article we will present a method simplifying 3D point clouds. This method is based on the Shannon entropy. This technique of simplification is a hybrid technique where we use the notion of clustering and iterative computation. In this paper, our main objective is to apply our method on different clouds of 3D points.…
Read MoreNumerical evaluation of ABS parts fabricated by fused deposition modeling and vapor smoothing
The automotive industry has focused to use polymer materials in order to increase energy efficiency. So, the industry pays attention to use 3D printing technologies using several polymers. Among several 3D printer technologies, fused deposition modeling (FDM) is one of the popular 3D printing technologies due to an inexpensive extrusion machine and multi-material printing. FDM…
Read MoreAnalysis of Economic Load Dispatch with a lot of Constraints Using Vortex Search Algorithm
In modern powers systems, one of the most considerable topics is economic load dispatch (ELD). ELD is non-linear problem and it became non-convex and non-smooth problem with some constraints such as valve point loading effect. ELD is very crucial for energy generation and distribution in power systems. For solving ELD problem, a lot of methods…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreLeaf-shaped solar cell antenna for Energy Harvesting and RF Transmission in ku-band
In this paper, a hybrid system solar cell antenna was studied. Our contribution lies in the combination of both optical and radio-frequency signals in a solar cell antenna. Hence, we propose a new method to merge antenna and solar cell. The leaf- shaped patch solar cell antenna was dedicated at a time to the energy…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreA Switched-Capacitor Low-Pass Filter with Dynamic Switching Bias OP Amplifiers
A switched capacitor low-pass filter employing folded-cascode CMOS OP Amps with a dynamic switching bias circuit capable of processing video signals, which enables low power consumption, and operation in wide bandwidths and low power supply voltages, is proposed. In this filter, charge transfer operations through two-phase clock pulses during the on-state period of the OP…
Read MoreSelective Electron Beam Melting Manufacturing of Electrically Small Antennas
Real estate pressures in modern electronics have resulted in the need for electrically small antennas, which have subsequently garnered interest amongst researchers and industry alike. These antennas are characterized by their largest dimensions translating to a fraction of the operating wavelength; such a diminutive size comes at the expense of reduced gain and efficiency, and…
Read MoreARMA feeding techniques for isoflux coverage from a micro satellite
This paper deals with the design of a new reconfigurable beam antenna used to improve the efficiency of spatial telemetry links on Nano-Satellite. This agile beam antenna is not built on the well-known array concept AESA (Agile Electronically Scanned Array) but using a new one called ARMA (Agile Matrix Radiating Antenna); MARPEM in French. In…
Read MoreApplication of Computational Fluid Dynamics Model in High-Rise Building Wind Analysis-A Case Study
Over the years, wind loading codes has been a crucial tool in determining design wind loads on buildings. Due to the limitations of these codes especially in height, wind tunnel testing is recommended as the best approach in predicting wind flow around buildings but carrying out wind tunnel testing in the preliminary as well as…
Read MoreA New Identification Approach of MIMO Hammerstein Model with Separate Nonlinearities
A new coupled structure identification of Multi-Input Multi-Output (MIMO) Hammerstein models with separate nonlinearities is proposed. It is based on the use of the Recursive Least Squares (RLS) algorithm. A comparative study between a decoupled and coupled structures identification of MIMO Hammerstein models is discussed. A quadruple-tank process is used to illustrate the effectiveness of…
Read MoreImproved Hybrid Opponent System for Professional Military Training
Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming.…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read MoreA novel beamforming based model of coverage and transmission costing in IEEE 802.11 WLAN networks
IEEE 802.11 WLAN indoor networks face major inherent and environmental issues such as interference, noise, and obstacles. At the same time, they must provide a maximal service performance in highly changing radio environments and conformance to various applications’ requirements. For this purpose, they require a solid design approach that considers both inputs from the radio…
Read MoreInvestigating the Expertise Indicators of Vulnerability Discovery Professionals
In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…
Read MoreA Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System
Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…
Read MoreOn Modeling Affect in Audio with Non-Linear Symbolic Dynamics
The discovery of semantic information from complex signals is a task concerned with connecting humans’ perceptions and/or intentions with the signals content. In the case of audio signals, complex perceptions are appraised in a listener’s mind, that trigger affective responses that may be relevant for well-being and survival. In this paper we are interested in…
Read MorePluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read More
