Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 112

Full-Text Articles in Engineering

Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan Dec 2015

Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan

Innovative Research Publications IRP India

Most of the approaches to solve the unmixing problem are based on the Linear Mixing Model (LMM) which is questionable. Therefore, nonlinear spectral model is generally used to study the effects of multiple scattering in the complex surfaces. In this paper, we have demonstrated the application of Radiative Transform Equation (RTE) based Hapke multi scattering model. The Hapke model based non-linear spectral unmixing is carried out on a Moon Mineralogy Mapper (M3 ) data. The values of six non-linear Hapke's model parameters are estimated using a MATLAB based algorithm after optimizing the Hapke corrected M3-Endmembers and modeled spectra through minimum …


An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian Nov 2015

An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian

Innovative Research Publications IRP India

Relentless Itemset Exhuming (RIE) is a archetypal data Exhuming topic with many authentic world applications such as market basket analysis. In authentic world the dataset size grows, researchers have prophesied Map Reduce version of RIE contrivance to meet the immensely colossal data challenge. Subsisting relentless itemset contrivance cannot distribute data equipollent among all the nodes and MR Apriori contrivance paper utilize manifold map/reduce procedures and engender an inordinate extent of key-value pairs with value. In this paper present a novel collateral, distributed contrivance which addresses these quandaries. We prophesis an ameliorated collateral contrivance and discuss its applications in this paper. …


Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali Nov 2015

Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali

Innovative Research Publications IRP India

A design of reading recommendation method based on user preference for online learning namely, RMUP is proposed. The aim of this study is to design an online learning recommendation system to support automatic information extract, dynamic user preference analysis and conduct an accurate recommendation of reading materials to relevant users.


Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng Nov 2015

Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng

Innovative Research Publications IRP India

This study aims to incorporate a new service into existing Moodle Core Services for student's usage data retrieval. This service can ease the pre-processing in EDM and provide a generic mechanism for data portability. The proposed method expects to reduce the data pre-processing time and enhance the interoperability in Moodle.


An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian Nov 2015

An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian

Innovative Research Publications IRP India

The furthermost eco-amicable challenge nowadays is ecumenical warming. Energy disaster conveys green computing. Dynamic voltage scaling (DVS) has been a crucial procedure in exploiting the hardware characteristics of cloud datacenters to preserve energy by lowering the supply voltage and operating frequency. The study presents modified power consumption can be reduced by live migration of the virtual machines (VM) as required and by switching off idle machines. So, proposed a dynamic threshold predicated approach DMM CPU utilization for host at data center. This consolidation will work on dynamic and capricious workload evading nonessential power consumption. It will meet energy efficiency requisite …


Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N Oct 2015

Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N

Innovative Research Publications IRP India

Information explosion has resulted in the need for more advanced methods for managing the information. Text stream mining, is very important as people and organizations are trying to process and understand as much of information as possible. Generalised suffix tree is a data structure which is capable of solving a number of text stream mining tasks like detecting changes in the text stream, identifying reuse of text and detecting events by identifying when the frequencies of phrases change in a statistically significant way. An efficient method with polynomial time complexity that uses suffix trees to analyse streams of data in …


M-Learning System Based On Ontology, Dr Leelavathi Rajamanickam,, Chen Woon Choong Oct 2015

M-Learning System Based On Ontology, Dr Leelavathi Rajamanickam,, Chen Woon Choong

Innovative Research Publications IRP India

Information and communication Technology is a gateway through which large population of students has been addressed. Mobile learning technology the latest arrival highly changing the way the students learn, interact, access up to data information. It mainly satisfies the current and future generation which needs information at the earliest rather than later few touches. The World Wide Web acts as an interface in E- learning as well as in mobile learning (Mlearning) environments. It supports and facilitates the delivery of teaching and learning materials. M - l e a r n i n g provides quality educational content with the …


Relaxing Weighted Clustering Algorithm For Reduction Of Clusters And Cluster Head, Vijayanand Kumar Sep 2015

Relaxing Weighted Clustering Algorithm For Reduction Of Clusters And Cluster Head, Vijayanand Kumar

Innovative Research Publications IRP India

Adhoc clustering in MANET is to divide mobile nodes into different virtual groups. Mobile nodes are allocated geographically adjacent in the cluster. Clustering is done by some rule specific in the network. In this paper, we have concentrated to modify weight based clustering algorithm to improve the performance in this wireless technology. By slight improvement in existing weight based clustering algorithm [1] reduction in cluster as well as cluster head can be observed through experiment. Proposed Algorithm specifies relaxing the weight criteria for isolated cluster head nodes in range of other cluster head as well as reconsidering the nodes in …


Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh Jul 2015

Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh

Innovative Research Publications IRP India

A criteria is developed for the approximations of a logarithmic function to piecewise straight lines at multiple segments such that the maximum absolute error is minimized.The optimum cutting points for segmentation are estimated numerically with an exhaustive search. Our hardware implementation is restricted to integer operations (addition and shifting).


Supervisory Control And Data Acquisition (Scada) Control Optimization, Garrett Johnson, Jeremy Straub, Eunjin Kim Apr 2015

Supervisory Control And Data Acquisition (Scada) Control Optimization, Garrett Johnson, Jeremy Straub, Eunjin Kim

Jeremy Straub

SCADA systems are generally used to monitor and control multiple systems of the same type to allow them to be remotely controlled and monitored. Water plants, for example, could be controlled and monitored by a SCADA system. This project seeks to optimize a SCADA system using Artificial Intelligence. A constraint satisfaction / optimization algorithm is used to maximize performance relative to weighted system goals.


Novel Informatic Platform For The Standard Unification Of Donors, Offspring And Patients Records: Institutional Registry Requirements In The Reproductive Biomedicine Regulations Compliance., Salvo Reina, Mauro Costa, Mauro Giacomini Jan 2015

Novel Informatic Platform For The Standard Unification Of Donors, Offspring And Patients Records: Institutional Registry Requirements In The Reproductive Biomedicine Regulations Compliance., Salvo Reina, Mauro Costa, Mauro Giacomini

Salvo Reina

The Donor ART (DART), recently promulgated by italian institution, has posed several incumbent questions to the Artificial Reproductive Techniques (ART) world. Besides the critical social and ethical aspects, a crucial issue is the engagement of a centralised “Donors-offspring Registry” which introduces new stringent criteria up on the treatments of the sensitive data of donors, newborns and patients. Such registry will have to comply with applicable italian laws (Legge 40/04, Dlg.191/07 and Dlg.16/10, the so called “Patto per la Salute 2014-2016) and the european Tissue Directive (2006/17/CE, Ed. 2004). Moreover, recent Guide Lines were introduced by the italian Conferenza Stato Regioni …


Contextual Anomaly Detection Framework For Big Sensor Data, Michael Hayes, Miriam A M Capretz Jan 2015

Contextual Anomaly Detection Framework For Big Sensor Data, Michael Hayes, Miriam A M Capretz

Miriam A M Capretz

The ability to detect and process anomalies for Big Data in real-time is a difficult task. The volume and velocity of the data within many systems makes it difficult for typical algorithms to scale and retain their real-time characteristics. The pervasiveness of data combined with the problem that many existing algorithms only consider the content of the data source; e.g. a sensor reading itself without concern for its context, leaves room for potential improvement. The proposed work defines a contextual anomaly detection framework. It is composed of two distinct steps: content detection and context detection. The content detector is used …


Introduction To Web Technology With Dreamweaver, Abegunde Oluwatosin Daniel Oct 2014

Introduction To Web Technology With Dreamweaver, Abegunde Oluwatosin Daniel

Abegunde oluwatosin daniel

HTML is a MARKUP language Using HTML tags and elements, we can: Control the appearance of the page and the content Publish online documents and retrieve online information using the links inserted in the HTML document Create on-line forms. These forms can be used to collect information about the user, conduct transactions, and so on


Computer Programming Slides, Janagiammal Ramasamy Aug 2014

Computer Programming Slides, Janagiammal Ramasamy

janagiammal ramasamy

slides presenting lecture notes


Understanding Types Of Users On Twitter, Muhammad Moeen Uddin, Muhammad Imran, Hassan Sajjad May 2014

Understanding Types Of Users On Twitter, Muhammad Moeen Uddin, Muhammad Imran, Hassan Sajjad

Muhammad Imran

People use microblogging platforms like Twitter to involve with other users for a wide range of interests and practices. Twitter profiles run by different types of users such as humans, bots, spammers, businesses and professionals. This research work identifies six broad classes of Twitter users and employs a supervised machine learning approach which uses a comprehensive set of features to classify users into the identified classes. For this purpose, we exploit users' profile and tweeting behavior information. We evaluate our approach by performing 10-fold cross validation using manually annotated 716 different Twitter profiles. High classification accuracy (measured using AUC, and …


Software Group Of The Openorbiter Project, Christoffer Korvald, Jeremy Straub Mar 2014

Software Group Of The Openorbiter Project, Christoffer Korvald, Jeremy Straub

Jeremy Straub

This poster provides an update regarding software development work for the OpenOrbiter project. The software development effort for the OpenOrbiter project currently consists of four teams: payload software development, operating software development, ground station software development and testing. The teams are designing and developing the software needed to create and operate a small spacecraft which can be produced for under USD $5,000 by students, faculty and others around the world. Participating students are gaining valuable real-world experience through the process of designing and developing the spacecraft. Each team is headed by a team lead that is responsible for conducting weekly …


Innovation And Learning Through Knowledge Gatekeepers:A Critical Examination Of The Relationship Betweentrust, Openness, And The Use Of Gatekeepers, Deogratias Harorimana Dr Aug 2013

Innovation And Learning Through Knowledge Gatekeepers:A Critical Examination Of The Relationship Betweentrust, Openness, And The Use Of Gatekeepers, Deogratias Harorimana Dr

Dr Deogratias Harorimana

The term ‘gatekeeper’ is widely used to represent a class of those who collect information, knowledge and contextualise this before they can share with the rest of the members of the organisation knowledge networks-both formal and informal organisations. In this study, it was found:

1 that there is a strong relationship between the openness of a given firm, as regards its knowledge sharing culture and level trust, and that firm’s use of knowledge gatekeepers

2 that the stage of a given firm’s growth corresponds to its strategic use of different types of gatekeeping.

In early and decline (renewal) stages, for …


Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr Mar 2013

Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The innovation in the 21st century goes significantly beyond the high-tech picture driven by small or large industry clusters in a specific region-typically Silicon Valley and M4Corridor. The future of innovation will lie within knowledge management and seamless technological applications. These will be supported by planned funding strategies, possibly with clients as drivers of the innovation. This view seems to be supported by the UK government “Technology and Innovation Futures” (2011); the USA government (2011), study into which leading scholars concede that the future innovation and technological applications for economic growth will include products and processes, improvements in areas such …


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …


How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr Sep 2012

Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper presents results from a multi-disciplinary conceptual analysis of development theory and practice. It reviews issues raised and proposes a shift in the epistemology of possession towards an epistemology of practice which is guided by the following aspects (1) The consideration of the learning culture of parties involved, (2) the ability and willingness for decontextualisation of the knowledge by the source and (3) the ability to embedded it by recipients (embededness ), (4) the importance that is attached to knowledge of the host country as reflected through (5) Similarity in culture, values, understanding of context and knowledge bases; (6) …


Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo Sep 2012

Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo

Fernando Paulo Belfo

The inadequate specification of requirements remains being indicated as one of the main reasons for the failure of software development projects. A possible explanation for this failure is that requirements management tends to overvalue the technology side of requirements. However, the requirements management depends on other important issues beyond technology which are sometimes neglected. Good requirements are only assured by the right balance of three dimensions: people, organization and technology. Through the lens of each of these three dimensions, this paper reviews significant literature, identifying some of the key issues and concerns about the management of software requirements, particularly the …


Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub May 2012

Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub

Jeremy Straub

A multi-tier, multi-craft mission architecture has been proposed but, despite its apparent promise, limited use and testing of the architecture has been conducted. This paper proposes and details a mission concept and its implementation for testing this architecture in the terrestrial environment. It is expected that this testing will allow significant refinement of the proposed architecture as well as providing data on its suitability for use in both terrestrial and extra-terrestrial applications. Logistical and technical challenges with this testing are discussed.


Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra May 2012

Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

An email virus makes use of the email technology and attaches itself to an email to transfer itself from one computer to another. Some email viruses create and send new emails using the address book of the victim computer. The email viruses are a matter of concern as they can spread very fast via emails to different geographical locations.

The conventional scanners are file based and not good for scanning emails as the emails can contain different types of files as attachments. Besides they cannot detect viruses until the emails are downloaded and opened by the recipient in order to …


Implementing Virus Scanning In Computer Networks, Umakant Mishra May 2012

Implementing Virus Scanning In Computer Networks, Umakant Mishra

Umakant Mishra

Some viruses exploit the features and capabilities of computer networks to spread, operate and damage network environments. For example, the virus may copy itself to other computers in the network or may increase network activities congesting the network traffic. The conventional anti-viruses are not efficient enough to detect and control viruses in a network environment. As they are file based they cannot scan the data while being downloaded from the server.

Most of the drawbacks of conventional scanning are taken care by a firewall-based virus scanning. But this method requires high-end machines to withstand the load of centralized scanning. There …


Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr May 2012

Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr

Dr Deogratias Harorimana

With corporate strategy becoming more and more dependent on speed,focus, innovation and strategy, what can MIS do? and what should be MIS role ? what is the relationship between Corporate Strategy KPI and MIS? These questions are answered in an MBA Management Information Systems at USP. This programme is delivered across the entire Pacific region through the Graduate School of Business. It is my privilege to post here few questions that students who attended one of the course in Nadi, at Tanoa International Hotel had to answer in one of the Quiz test.


Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr Apr 2012

Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper discusses mining and mineral operations in the two countries Papua New Guinea and Solomon Islands with regards to its contribution to the overall Gross domestic Product and the economic development of each country.

Our finding shows that mining is an excellent contributor to economic growth and development as in the case of Papua New Guinea.Tax revenue from PNG Mining industries contributions to the PNG fiscal basket remains strong and growing steadily. The mining and minerals tax revenue remains an important contributor to the government fiscal budget over the last 10 years. This has been a strong contributor to …


Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr Apr 2012

Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr

Dr Deogratias Harorimana

No abstract provided.


Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr Apr 2012

Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr

Dr Deogratias Harorimana

The principal objective of this paper is to review the current Tuna Fisheries Policies in the Solomon Islands with a view to proposing strategies that will maximize Job creation while at the same time address the issues that currently exist in this sector. Although the Tuna Industry’s contribution to GDP is quite significant, the Solomon Island Government (SIG) gets little or close to nothing out of it in the form of revenue and Job creation with the majority of vessels being foreign owned and fishing license fees amongst the lowest in the Pacific. SOLTAI which is partly owned by the …


Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr Apr 2012

Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Solomon Islands is a nation with vast resources with huge potential to excel economically if proper business atmosphere is provided for both private sector development and small and medium enterprises entrepreneurship. Conducive policies that, not only, a mere statement but is broken down to workable strategies with quantitative expected outcome with a strong mentoring mechanism is very important. Previous governments have continuously ignored the importance of having small business policies until lately when NCRA government came up with a set of policies that strategically addresses the significance of small and medium businesses. However, notwithstanding foreign investment is very important in …