Results (2356)
Search Parameters:
Keyword: SEOptimizing the front-end power solution for automotive ADAS systems
In this paper the front-end power solution for automotive ADAS electronic systems is analyzed. The increased complexity of electronic systems in ADAS automotive brings new challenges for hardware design, especially with regard to improving the efficiency of the switched-mode power supply while maintaining the overall cost reasonably low and keeping the occupied area on the…
Read MoreA Reliable, Non-Invasive Approach to Data Center Monitoring and Management
Recent standards, legislation, and best practices point to data center infrastructure management systems to control and monitor data center performance. This work presents an innovative approach to address some of the challenges that currently hinder data center management. It explains how monitoring and management systems should be envisioned and implemented. Key parameters associated with data…
Read MorePlanning an Availability Demonstration Test with Consideration of Confidence Level
The full service life of a technical product or system is usually not completed after an initial failure. With appropriate measures, the system can be returned to a functional state. Availability is an important parameter for evaluating such repairable systems: Failure and repair behaviors are required to determine this availability. These data are usually given…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MoreModeling and Control of Collaborative Robot System using Haptic Feedback
When two robot systems can share understanding using any agreed knowledge, within the constraints of the system’s communication protocol, the approach may lead to a common improvement. This has persuaded numerous new research inquiries in human-robot collaboration. We have built up a framework prepared to do independent following and performing table-best protest object manipulation with…
Read More2-D and 3-D Visualization of Many-to-Many Relationships
With the unprecedented wave of Big Data, the importance of information visualization is catching greater momentum. Understanding the underlying relationships between constituent objects is becoming a common task in every branch of science, and visualization of such relationships is a critical part of data analysis. While the techniques for the visualization of binary relationships are…
Read MoreEstimation of Power System Stabilizer Parameters Using Swarm Intelligence Techniques to Improve Small Signal Stability of Power System
Interconnection of the power system utilities and grids offers a formidable dispute in front of design engineers. With the interconnections, power system has emerged as a more intricate and nonlinear system. Recent years small signal stability problems have achieved much significance along with the conventional transient constancy problems. Transient stability of the power system can…
Read MoreAn Efficient Authentication Method For Smart Card Verification In Online
The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…
Read MoreSource Code Vulnerabilities in IoT Software Systems
An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…
Read MoreSystem for the Automatic Estimation of the Tilt Angle of a Flat Solar Collector
In this work, a compact system for the automatic estimation of the tilt angle at any location of the world is presented. The system components are one computer, one GPS receiver and one Python program. The tilt angle is calculated through the maximization of the flux of direct radiation incident upon a flat solar collector.…
Read MoreA comparative study for using the LBC format for compressing static medical images
This paper is an extension of work originally presented at conference Applied Machine Intelligence and Informatics (SAMI), 2017 IEEE 13th International Symposium. The article performs a comparative study between the image compression technique Local Binary Compressed format (LBC) proposed by the authors and the standard image compression techniques used today (BMP, JPEG, PNG and GIF).…
Read MoreA Modified Patch Antenna with Square-Open Loop Resonator Slot for Improved Bandwidth Performance in WiFi Applications
A novel, modified square patch antenna with square open loop resonator slot, operating at 5.5 GHz, for improved bandwidth performance is proposed in this article. A complementary square open loop resonator is introduced on the patch to enhance the bandwidth more than twice that of the conventional square patch antenna operating at the same frequency.…
Read MoreEmbedded C Programming Using FRDM to Enhance Engineering Students’ Learning Skill
Computer programming course that utilizes languages such as C/C++ is always packed with dreary syntax details that consume most of the students’ learning time to obtain ‘grammatically’ correct source code. Consequently, it is difficult for most of the students to apply the theory they have learned in a real life context. Thus, this project proposed…
Read MoreScalability Dilemma and Statistic Multiplexed Computing — A Theory and Experiment
The For the last three decades, end-to-end computing paradigms, such as MPI (Message Passing Interface), RPC (Remote Procedure Call) and RMI (Remote Method Invocation), have been the de facto paradigms for distributed and parallel programming. Despite of the successes, applications built using these paradigms suffer due to the proportionality factor of crash in the application…
Read MoreTwo-axis Gimbal with Passive Revolute Joints for Motion Isolation of a Stabilizing Mechanism
Energy efficiency is a salient design consideration for stabilization mechanisms when assembled on a battery-powered vehicle. In this paper we study the implementation of a two-axis gimbal with passive revolute joints for motion isolation of an inertially stabilized platform (ISP) mounted on a host vehicle. The objective is for the ISP to maintain a steady…
Read MoreA Way for Measuring the Temperature Transients of Capacitors
With the increasing integration level of electronic circuits management of the generated heat became one of the most important design aspects. Beside the semiconductor components capacitors are also affected by the elevated temperature. In this paper a new thermal characterization method is proposed adopting the thermal transient measurement technique for capacitors utilizing the capacitance itself…
Read MoreA Meta-analysis of Content and Language Integrated Learning in English
The purpose of this study is to investigate the effects of integrated content and English education. To fulfill this, 30 studies conducted in elementary school setting matching the meta-analysis criteria, such as being quantitative, experimental, or having affective statistical results after searching for the key words of “content-based”, “theme-based” and “integrated learning” on the accessible…
Read MoreCompact wireless control network protocol with fast path switching
Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER), such as wireless control networks, often adopt time division multiple access (TDMA). However, it is difficult to add or adjust functions in protocol stacks that use TDMA…
Read MorePublic transportation network design: a geospatial data-driven method
The paper explores an issue of efficient public transportation network design as a part of the urban developing process. Having data about everyday residents travelling inside of an urban area, we can consider this data as people’s requirements for the public transport system. We propose a novel method for initial public transportation network design based…
Read MoreClassification of patient by analyzing EEG signal using DWT and least square support vector machine
Epilepsy is a neurological disorder which is most widespread in human beings after stroke. Approximately 70% of epilepsy cases can be cured if diagnosed and medicated properly. Electro-encephalogram (EEG) signals are recording of brain electrical activity that provides insight information and understanding of the mechanisms inside the brain. Since epileptic seizures occur erratically, it is…
Read MoreTowards Deployment Strategies for Deception Systems
Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…
Read MoreSolving the SAT problem using Genetic Algorithm
In this paper we propose our genetic algorithm for solving the SAT problem. We introduce various crossover and mutation techniques and then make a comparative analysis between them in order to find out which techniques are the best suited for solving a SAT instance. Before the genetic algorithm is applied to an instance it is…
Read MoreEfficient Tensor Strategy for Recommendation
The era of big data has witnessed the explosion of tensor datasets, and large scale Probabilistic Tensor Factorization (PTF) analysis is important to accommodate such increasing trend of data. Sparsity, and Cold-Start are some of the inherent problems of recommender systems in the era of big data. This paper proposes a novel Sentiment-Based Probabilistic Tensor…
Read MoreOn-Chip Testing Schemes of Through-Silicon-Vias (TSVs) in 3D Stacked ICs
This paper presents on-chip testing structures to characterize and detect faulty Through Silicon Vias (TSVs) in 3D ICs technology. 3D Gunning Transceiver Logic (GTL) I/O testing is proposed to characterize the performance of 3D TSVs in high speed applications. The GTL testing circuit will fire different data patterns at different frequencies to characterize the transient…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read More
