Results (20)
Search Parameters:
Keyword: MassiveWireless Sensor Networks Simulation Model to Compute Verification Time in Terms of Groups for Massive Crowd
Everyone needs fast response or output against its request or need. Therefore, technologies are used to make the processing fast and accurate according to our needs. But in some situations, still we need to do more. Especially, when we need to process a massive or huge crowd of people in limited time frame such as…
Read MoreDesign and Analysis of a Virtual Synchronous Generator Control Scheme to Augment FRT Capability of PMSG-Based Wind Turbine
Massive integration of inverter dominated renewable energy systems (RESs), i.e., wind turbines (WTs), reduces the reliance on conventional alternator-based power stations. The system inertia and damping aspects of the power system were significantly decreased by this extensive integration of inverter-based WT system, which impacts on the fault ride-through (FRT) competence and thus precipitates the frequency…
Read MoreAssociation Rules for Knowledge Discovery From E-News Articles: A Review of Apriori and FP-Growth Algorithms
Owing to technological development, the internet has become the world’s largest platform where an unaccountable amount of e-news information is freely available to use. Most of the time, e-newspaper readers have to examine the massive collection of e-news articles to locate necessary information relevant to them. Massive semi-structured and unstructured texts usually mislead the readers…
Read MoreA Novel Algorithm Design for Locating Fault Distances on HV Transmission Lines
The transmission network has been considered among the globe’s prevalent complex systems, comprised of hundreds of electrical transmission lines and other equipment used to transmit electrical energy from one location to another. Over a decade, power engineers have worked tirelessly to ensure that the transmission network operates reliably, transmitting electrical energy from the power station…
Read MoreEnsemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection
The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…
Read MoreRemote Patient Monitoring Systems with 5G Networks
The new generation of mobile communications and the recent advances in data management are going to enable a fast transformation in the health sector of many countries. 5G networks, with superior technical characteristics, would allow the development of a new set of application and services gathered under the concept of eHealth. In this article we…
Read MoreOptimized Multi-Core Parallel Tracking for Big Data Streaming Applications
Efficient real-time clustering is a relevant topic in big data streams. Data stream clustering needs necessarily a short time execution frame with bounded memory utilizing a one-scan process. Because of the massive volumes and dynamics of data streams, parallel clustering solutions are urgent. This paper presents a new approach for this trend, with advantages to…
Read MoreText Mining Techniques for Sentiment Analysis of Arabic Dialects: Literature Review
Social media attracts a lot of users around the world. Many reasons drive people to use social media sites such as expressing opinions and ideas, displaying their diaries and sharing them with others, social communication with family and friends and building new social relationships, learning and sharing knowledge. Written text is one of the most…
Read MoreSentiment Analysis in English Texts
The growing popularity of social media sites has generated a massive amount of data that attracted researchers, decision-makers, and companies to investigate people’s opinions and thoughts in various fields. Sentiment analysis is considered an emerging topic recently. Decision-makers, companies, and service providers as well-considered sentiment analysis as a valuable tool for improvement. This research paper…
Read MorePriority-based Scheduling Algorithm for NOMA-integrated V2X
The fifth-generation (5G) wireless system was implemented due to the massive connectivity, especially Internet of Things (IoT) including industrial automation, Vehicle to Everything (V2X) communications, which is shelter an extensive range of applications services and use cases and Intelligent Transportation Systems (ITS). A cellular Non-Orthogonal Multiple Access (NOMA) based on radio resource allocation schemes need…
Read MoreA Simulation Based Proactive Approach for Smart Capacity Estimation in the Context of Dynamic Positions and Events
Technologies are growing with the passage of time and providing solutions for the existing problems. One of such problems is to manage the crowd according to available capacity. Especially when the crowd density is dynamic because of dynamic position of the persons (Pilgrims). Not only dynamic position of the pilgrims makes crowd capacity dynamic but…
Read MoreEnhanced Power Utilization for Grid Resource Providers
A grid is a system that can manage and organize services and resources that spread amongst different control domains, employ interfaces and protocols, and offer a high quality of services. The integration of Multi-Agent Systems (MAS) with a grid environment significantly affects grid performance. MAS is considered a suitable solution for open systems that modify…
Read MoreThe Role of KM in Enhancing AI Algorithms and Systems
Knowledge Management processes present a vital role in improving AI systems and algorithms. Many studies and reviews were carried out to examine the relationship between KM processes and AI systems. However, studies were focusing on specific methods and the impact on some AI algorithms, neglecting the role of other KM processes and how it may…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreA Comprehensive Review on the Feasibility and Challenges of Millimeter Wave in Emerging 5G Mobile Communication
This article presents a comprehensive review on the feasibility and challenges of millimeter wave in emerging fifth generation (5G) mobile communication. 5G, a multi-gigabit wireless network is the next generation wireless communication network. The mmWave cellular system which operates in the 30-300 GHz band has been proposed for use as the propagation channel. Its large…
Read MoreParallel Hybrid Testing Tool for Applications Developed by Using MPI + OpenACC Dual-Programming Model
Building massively parallel applications has become increasingly important with coming Exascale related technologies. For building these applications, a combination of programming models is needed to increase the system’s parallelism. One of these combinations is the dual-programming model (MPI+X) which has many structures that increase parallelism in heterogeneous systems that include CPUs and GPUs. MPI +…
Read MoreThe Chimera and the Cyborg
High Performance Computing (HPC) systems offer excellent metrics for speed and efficiency when using bare metal hardware, a high speed interconnects, and massively parallel applications. However, this leaves out a significant portion of scientific computational tasks, namely high throughput computing tasks that can be trivially parallelized and scientific workflows that require their own well-defined software…
Read MoreSoftware and Hardware Enhancement of Convolutional Neural Networks on GPGPUs
Convolutional Neural Networks (CNNs) have gained attention in recent years for their ability to perform complex machine learning tasks with high accuracy and resilient to noise of inputs. The time-consuming convolution operations of CNNs pose great challenges to both software as well as hardware designers. To achieve superior performance, a design involves careful concerns between…
Read MoreA novel model for Time-Series Data Clustering Based on piecewise SVD and BIRCH for Stock Data Analysis on Hadoop Platform
With the rapid growth of financial markets, analyzers are paying more attention on predictions. Stock data are time series data, with huge amounts. Feasible solution for handling the increasing amount of data is to use a cluster for parallel processing, and Hadoop parallel computing platform is a typical representative. There are various statistical models for…
Read MoreChannel Inversion Schemes with Compensation Network for Two-Element Compact Array in Multi-User MIMO
In this paper, we investigate the performance of channel inversion schemes for interference cancellation with compensation network in multi-user MIMO broadcasting channel. To achieve good performance, mutual coupling between two-element compact arrays is characterized by the receiving mutual impedance method (RMIM) to formulate the compensation network-operating matrix. A prototype of two-element compensation network with an…
Read More
