Results (2362)
Search Parameters:
Keyword: REA Study on Isomorphic Properties of Circulant Graphs
denotes circulant graph of order for a set where Circulant graph is said to have the Cayley Isomorphism (CI) property if whenever is isomorphic to , there is some for which . In this paper, isomorphic properties of circulant graphs that includes Self-complementary circulant graphs; Type-2 isomorphism, a new type of isomorphism other than already known Adam’s isomorphism of circulant graphs and Cartesian product and factorization of…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreNovel Analysis of Synchronous and Induction Generators in Parallel Operation Mode in an Isolated Electric System
This paper presents an analysis of a parallel connection of one synchronous generator and one self-excited induction generator that feeds a resistive load and an Induction Motor. The system voltage and frequency are controlled by a voltage control loop and a speed control loop connected to synchronous generator. The induction generator speed is controlled by…
Read MoreComparison of K-Means and Fuzzy C-Means Algorithms on Simplification of 3D Point Cloud Based on Entropy Estimation
In this article we will present a method simplifying 3D point clouds. This method is based on the Shannon entropy. This technique of simplification is a hybrid technique where we use the notion of clustering and iterative computation. In this paper, our main objective is to apply our method on different clouds of 3D points.…
Read MoreNumerical evaluation of ABS parts fabricated by fused deposition modeling and vapor smoothing
The automotive industry has focused to use polymer materials in order to increase energy efficiency. So, the industry pays attention to use 3D printing technologies using several polymers. Among several 3D printer technologies, fused deposition modeling (FDM) is one of the popular 3D printing technologies due to an inexpensive extrusion machine and multi-material printing. FDM…
Read MoreAnalysis of Economic Load Dispatch with a lot of Constraints Using Vortex Search Algorithm
In modern powers systems, one of the most considerable topics is economic load dispatch (ELD). ELD is non-linear problem and it became non-convex and non-smooth problem with some constraints such as valve point loading effect. ELD is very crucial for energy generation and distribution in power systems. For solving ELD problem, a lot of methods…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreLeaf-shaped solar cell antenna for Energy Harvesting and RF Transmission in ku-band
In this paper, a hybrid system solar cell antenna was studied. Our contribution lies in the combination of both optical and radio-frequency signals in a solar cell antenna. Hence, we propose a new method to merge antenna and solar cell. The leaf- shaped patch solar cell antenna was dedicated at a time to the energy…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreA Switched-Capacitor Low-Pass Filter with Dynamic Switching Bias OP Amplifiers
A switched capacitor low-pass filter employing folded-cascode CMOS OP Amps with a dynamic switching bias circuit capable of processing video signals, which enables low power consumption, and operation in wide bandwidths and low power supply voltages, is proposed. In this filter, charge transfer operations through two-phase clock pulses during the on-state period of the OP…
Read MoreSelective Electron Beam Melting Manufacturing of Electrically Small Antennas
Real estate pressures in modern electronics have resulted in the need for electrically small antennas, which have subsequently garnered interest amongst researchers and industry alike. These antennas are characterized by their largest dimensions translating to a fraction of the operating wavelength; such a diminutive size comes at the expense of reduced gain and efficiency, and…
Read MoreARMA feeding techniques for isoflux coverage from a micro satellite
This paper deals with the design of a new reconfigurable beam antenna used to improve the efficiency of spatial telemetry links on Nano-Satellite. This agile beam antenna is not built on the well-known array concept AESA (Agile Electronically Scanned Array) but using a new one called ARMA (Agile Matrix Radiating Antenna); MARPEM in French. In…
Read MoreApplication of Computational Fluid Dynamics Model in High-Rise Building Wind Analysis-A Case Study
Over the years, wind loading codes has been a crucial tool in determining design wind loads on buildings. Due to the limitations of these codes especially in height, wind tunnel testing is recommended as the best approach in predicting wind flow around buildings but carrying out wind tunnel testing in the preliminary as well as…
Read MoreA New Identification Approach of MIMO Hammerstein Model with Separate Nonlinearities
A new coupled structure identification of Multi-Input Multi-Output (MIMO) Hammerstein models with separate nonlinearities is proposed. It is based on the use of the Recursive Least Squares (RLS) algorithm. A comparative study between a decoupled and coupled structures identification of MIMO Hammerstein models is discussed. A quadruple-tank process is used to illustrate the effectiveness of…
Read MoreImproved Hybrid Opponent System for Professional Military Training
Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming.…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read MoreA novel beamforming based model of coverage and transmission costing in IEEE 802.11 WLAN networks
IEEE 802.11 WLAN indoor networks face major inherent and environmental issues such as interference, noise, and obstacles. At the same time, they must provide a maximal service performance in highly changing radio environments and conformance to various applications’ requirements. For this purpose, they require a solid design approach that considers both inputs from the radio…
Read MoreInvestigating the Expertise Indicators of Vulnerability Discovery Professionals
In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…
Read MoreA Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System
Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…
Read MoreOn Modeling Affect in Audio with Non-Linear Symbolic Dynamics
The discovery of semantic information from complex signals is a task concerned with connecting humans’ perceptions and/or intentions with the signals content. In the case of audio signals, complex perceptions are appraised in a listener’s mind, that trigger affective responses that may be relevant for well-being and survival. In this paper we are interested in…
Read MorePluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read MoreMathematical Model Based on Newton’s Laws and in First Thermodynamic Law of a Gas Turbine
The present article explains the modeling of a Gas Turbine system; the mathematical modeling is based on fluid mechanics applying the principal energy laws such as Euler’s Law, Newton’s second Law and the first thermodynamic law to obtain the equations for mass, momentum and energy conservation; expressed as the continuity equation, the Navier-Stokes equation and…
Read MoreDesign of Cognitive Radio Database using Terrain Maps and Validated Propagation Models
Cognitive Radio (CR) encompasses a number of technologies which enable adaptive self-programing of systems at different levels to provide more effective use of the increasingly congested radio spectrum. CRs have potential to use spectrum allocated to TV services, which is not used by the primary user (TV), without causing disruptive interference to licensed users by…
Read More1-D Wavelet Signal Analysis of the Actuators Nonlinearities Impact on the Healthy Control Systems Performance
The objective of this paper is to investigate the use of the 1-D wavelet analysis to extract several patterns from signals data sets collected from healthy and faulty input-output signals of control systems as a preliminary step in real-time implementation of fault detection diagnosis and isolation strategies. The 1-D wavelet analysis proved that is an…
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read More
