Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Journal

2018

Institution
Keyword
Publication

Articles 1 - 30 of 342

Full-Text Articles in Computer Engineering

Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik Nov 2018

Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik

International Journal of Business and Technology

The social Web provides opportunities for the public to have social interactions and online discussions. A large number of online users using the social web sites create a high volume of data. This leads to the emergence of Big Data, which focuses on computational analysis of data to reveal patterns, and associations relating to human interactions. Such analyses have vast applications in various fields such as understanding human behaviors, studying culture influence, and promoting online marketing. The blogs are one of the social web channels that offer a way to discuss various topics. Finding the top bloggers has been a …


Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah Nov 2018

Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah

International Journal of Business and Technology

An electromagnetic (EM) energy harvesting application based on metamaterial absorber (MA) is introduced and discussed in this paper. This application is operating at ISM band (2.40 GHz) which is especially chosen due to its wide usage area. Square ring resonator (SRR) which has two gaps and resistors across the gaps on it is used. Chips resistors are used to deliver power to any active component. Transmission and reflection characteristics of metamaterial absorber (MA) for energy harvesting application are investigated. 83.6% efficient for energy harvesting application is realized in this study.


The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muça Nov 2018

The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muça

International Journal of Business and Technology

The aim of this study is to classify the risk factors of being with a type of cancer by applying the AHP (analytic hierarchy process) scale. The Saaty’s analytic hierarchy process is applied for computing weights for the factors, is a modeling for classification. A case study of QSUT Tirana hospital data base is presented to rank four cancer types. By the data collect from the hospital during the years 2011-2015, the results show that lung cancer is mostly spread in humans, and the prostate cancer is lower spread in humans.


Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi Nov 2018

Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi

International Journal of Business and Technology

The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc.

If everything around us is connected and information about these …


Hybrid Modelling In System Simulation, Andreas Körner Nov 2018

Hybrid Modelling In System Simulation, Andreas Körner

International Journal of Business and Technology

In times of increasing power and capacity in computer, simulation mathematical models are getting more and more important. For different technical applications and in natural science but also in economic systems and management processes appropriate mathematical model descriptions are necessary. Hybrid modelling is a special technique for more complex model descriptions in order to reduce the degree of complexity. In different fields of interest, the behavior of a model is dependent on the active state. When the model description is changing from one state to another, a so-called state event takes place. State event modelling is the overall term to …


E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili Nov 2018

E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili

International Journal of Business and Technology

This study provides a review of the literature on e-learning systems evolution and environments. The argument is that e-learning systems should be embedded in the core strategy of the institution. To support this premise, studies for e-learning are analyzed and six recommendations are drawn for universities to follow in order to have successful e-learning environments. The main contribution of this study, however, is the identification of the trends and statistics regarding the e-learning usage in the Balkan region. These stats are identified through a survey conducted in 40 universities in 10 countries from this region. The results show that more …


Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither Nov 2018

Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither

International Journal of Business and Technology

In this work we present two structurally different mathematical models for the prognostic simulation of Austria’s population: A time-continuous, macroscopic system dynamics approach and a time-discrete, microscopic agent-based approach. Both models were developed as case studies of a series of population concepts in order to support models for decision-support in Austria’s health care system. In the present work we want to focus on the definition, the parametrisation as well as especially the validation process of both population-models. The latter was of special interest as it included a cross-model validation with Statistics Austria’s own prognostic model SIKURS.


Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher Nov 2018

Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher

International Journal of Business and Technology

Agent-Based Models have become a widely used tool in social sciences, health care management and other disciplines to describe complex systems from a bottom-up perspective. Some reasons for that are the easy understanding of Agent-Based Models, the high flexibility and the possibility to describe heterogeneous structures. Nevertheless problems occur when it comes to analyzing Agent-Based Models. This paper shows how to describe Agent-Based Models in a macroscopic way as Markov Chains, using the random map representation. The focus is on the implementation of this method for chosen examples of a Random Walk and Opinion Dynamic Models. It is also shown …


Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach Nov 2018

Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach

International Journal of Business and Technology

Predicting demand for care is necessary to provide sufficient capacities in hospitals and enable better planning to cope with challenges like changes in the structure of the population. Emphasis in this work is put on the analysis of the data and on the parametrization of a simulation model for the paths of patients with mental diseases through the health care system. Survival analysis and model selection methods are used for this purpose. Data on patients and their treatments is analyzed with methods of survival analysis. Different methods for modelling the survival and hazard function are presented and compared. Hereby, the …


Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa Nov 2018

Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa

International Journal of Business and Technology

Wireless sensor networks (WSNs) compose the fundamental platform for a number of Internet of Things (IoT) applications, especially those related to the environmental, health, and military surveillance. While being autonomous in power supply, the main challenge in node’s processing and communication architecture design remains the energy efficiency. However, this goal should not limit the main functionality of the system which is often related to the network coverage and connectivity.

This paper shows the implementation of the Ad-hoc On-demand Distance Vector (AODV) routing algorithm in an XBee based platform. As shown, the network can achieve low power consumption per node primarily …


Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi Nov 2018

Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi

International Journal of Business and Technology

With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update …


Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman Nov 2018

Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman

International Journal of Business and Technology

Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is a widely used online security tool that ensures that a computer program is not posing as a human user. While smart programs with advanced image processing capability have already cracked picture based captcha systems there is a need for making the test harder. This paper presents a design prototype of a simplified type of labeled-image captcha where a picture of a common animal or household item is marked with a number of different labels and the users will be asked to provide the correct label for specific …


A Policeless Traffic Ticketing System With Autonomous Vehicles, Mükremin Özkul, Ilir Çapuni Nov 2018

A Policeless Traffic Ticketing System With Autonomous Vehicles, Mükremin Özkul, Ilir Çapuni

International Journal of Business and Technology

Besides being expensive, traffic violation monitoring systems rely heavily on a huge infrastructure that incurs installation, operational, and maintenance costs.

Developing countries — where people do exhibit less traffic safety aware- ness — deployment of such systems becomes a daunting task. A police- men cannot be everywhere, and a policeman can also be bribed.

With the above goals in mind, in this paper we present an infrastructure- less and police-less traffic violation detection system that relies solely on the broadcast messages between the vehicles and secure communication of the vehicles with the transportation authority. Each vehicle should be equipped with …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska Sep 2018

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska

The African Journal of Information Systems

Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources …


The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha Jul 2018

The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha

Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings

The 4onse project studies non-conventional monitoring systems fully based on open technologies (hardware, standard protocols, software and data) for the management of resources and natural hazards in developing countries. After the design of hydro-meteorological stations and software for the collection, management and distribution of data, the study involves the installation of 30 stations in the Deduroya Oya river basin in Sri Lanka. The system will be analysed to fully understand the real cost of ownership, data quality and applicability in real situations. If properly validated, these systems can provide an alternative solution, effective and sustainable for the protection of property …


Route Planning For Vessel Based On Dynamic Complexity Map, Zhe Du, Yuanqiao Wen, Huang Liang, Chunhui Zhou, Changshi Xiao Jun 2018

Route Planning For Vessel Based On Dynamic Complexity Map, Zhe Du, Yuanqiao Wen, Huang Liang, Chunhui Zhou, Changshi Xiao

Journal of System Simulation

Abstract: Aiming at multiple mobile objects in complex navigation environment, a route planning method based on the dynamic complexity map is proposed. According to the theory of complexity measurement, a dynamic complexity map is established. By taking advantage of the idea of A * algorithm, the complexity value is taken as an actual cost and the Euclidean Distance from current point to the target is taken as a heuristic costs. Considering the ship dimensions, the channel boundary constraint function is added. The experimental results show that on the premises of satisfying the constraint of ship dimensions, the planned route …


Synthesizing Rotational Human Motion With Physical Reality, Wei Yi, Shihong Xia Jun 2018

Synthesizing Rotational Human Motion With Physical Reality, Wei Yi, Shihong Xia

Journal of System Simulation

Abstract: Both keyframes and their timings play an important role in synthesizing physically realistic human motion. However, physically plausible timings are hard to set by manual. By combing keyframes and the physics-based optimization, a new method is proposed to solve physically plausible timings of given keyframes. Firstly, the keyframes and the initial value of the timings of keyframes are set through a graphical user interface. Secondly, the physically plausible timings of keyframes are obtained by optimizing a small-size nonlinear optimization model. Finally, the rotational human motion is synthesized by the keyframes and the computed timings of keyframes. Experiments are performed …


Performance Analysis And Research Of Shark Fin Structure Based On Simulation, Liu Shuang, Lü Chao, Rao Yong, Shiming Wang Jun 2018

Performance Analysis And Research Of Shark Fin Structure Based On Simulation, Liu Shuang, Lü Chao, Rao Yong, Shiming Wang

Journal of System Simulation

Abstract: The shark fin, the pectoral fin and the dorsal fin were studied based on the numerical simulation method; the pressure field, velocity field and flow field of the specimen structure were analyzed with three different flow velocities; the analysis and comparison of the mechanical properties of caudal fin, dorsal fin and pectoral fin were presented. The results show that the setting width of the tail fin can be set to 0.5 ~ 4.8 meters so as to improve the anti-karman vortex effect; the width of the tail fins should be relatively narrow in order to guarantee the base of …


Physically-Based Dynamic Algorithms For Time-Varying Of Flowers And Leaves, Jiao Di, Yang Meng, Yang Gang Jun 2018

Physically-Based Dynamic Algorithms For Time-Varying Of Flowers And Leaves, Jiao Di, Yang Meng, Yang Gang

Journal of System Simulation

Abstract: This paper presents physically-based simulations of dynamic algorithms of the blossom and fading of flowers as well as the time-varying leaves following the seasons. The models of the flowers are constructed according to the previously collected primary biological data of organs of flowers. The dynamic simulation is presented by two phases: the process of blooming and the process of fading. To simulate the former, the curved surfaces of petals are controlled by controlling the points on the Bezier surface; for realizing the simulation of the latter, the physical method is used. The dynamic effects of colors of leaves according …


Emergency Condition Selection Based On Tcp-Nets, Weihong Liu, Zheng Xiao, Cheng Chen, Li Qiao Jun 2018

Emergency Condition Selection Based On Tcp-Nets, Weihong Liu, Zheng Xiao, Cheng Chen, Li Qiao

Journal of System Simulation

Abstract: The representative or relative important emergency conditions need to be selected for making well-directed emergency plans. The quantitative method is normally used to select emergency conditions, but it requires users to specify the weight of every attribute, which does not conform to the users' habit. A qualitative method for emergency condition selection is put forward which includes two steps: for the first step, TCP-nets is adopted to describe users' requirements; and for the second step, the most important emergency conditions are selected based on TCP-nets. The effectiveness of the method is proved, and the efficiency is verified by experiments …


Key Technology Of Oil Spill Visualization At Sea Surface, Changjun Zou, Yin Yong, Xiuwen Liu, Feifei Wan Jun 2018

Key Technology Of Oil Spill Visualization At Sea Surface, Changjun Zou, Yin Yong, Xiuwen Liu, Feifei Wan

Journal of System Simulation

Abstract: An intensive study is made on the visualization method and oil equipment interaction. To solve the blind area problem and to realize the interactive of oil film, the following methods are proposed: new visualization method based on texture projection; modeling technique of oil boom based on mass-spring model; dynamic interaction method between oil boom and oil film texture based on polygon clipping. Real-time oil spill visualization at sea is implemented on GPU, the test results show the correctness and reliability of the methods.


Cooperative Target Recognition With Multiple Features Judgment, Guopeng Sun, Xiangyang Hao, Zhenjie Zhang, Pengrui Yan Jun 2018

Cooperative Target Recognition With Multiple Features Judgment, Guopeng Sun, Xiangyang Hao, Zhenjie Zhang, Pengrui Yan

Journal of System Simulation

Abstract: For solving cooperative target recognition problem in visual navigation, a fast and accurate algorithm based on progressive judgment of multiple features is proposed. The image is processed and judged by multiple features including image contours, Hu moment invariants and FAST corners. The non-target areas are eliminated and the real targets are obtained. In the process, algorithm is improved and some accelerated strategies are adopted to meet real-time requirements. Experiments show that the proposed algorithm can identify cooperative target robustly and adaptively with different distances, different angles and environment disturbance.


A Lightweight Modeling And Simulation Technical Framework For Complex Systems, Ji Hang, Junhua Zhou, Guoqiang Shi, Tingyu Lin, Junjie Xue Jun 2018

A Lightweight Modeling And Simulation Technical Framework For Complex Systems, Ji Hang, Junhua Zhou, Guoqiang Shi, Tingyu Lin, Junjie Xue

Journal of System Simulation

Abstract: Aiming at the modeling and simulation verification of complex systems, the paper established a lightweight simulation technical framework and a system building method. The simulation technical framework is built based on distributed network communication middleware and has graphic user interface, simulation management and run control modules, it packages effective and lightweight network middleware, object management, event management and time management and it is capable of interoperability and its members have abilities of reusable and combinable. The results show that the framework can supports flexible construction and effective simulation on complex systems.


Eye Gaze Tracking In 3d Immersive Environments, Xincan Zhao, Shihao Pan, Yaping Wang, Tie Yun Jun 2018

Eye Gaze Tracking In 3d Immersive Environments, Xincan Zhao, Shihao Pan, Yaping Wang, Tie Yun

Journal of System Simulation

Abstract: Aiming at the problem that human-computer interaction in immersive environments is entirely dependent on the body movement with low operational efficiency,a 3D eye gaze tracking method is proposed to gain the 3D gaze point of the user. Thus the interactive operation could be achieved, which provides a natural and bidirectional way for interaction. The Leap Motion controller is innovatively used to track the coordinates of eyes and the head position is tracked with the motion capture device. The gaze point under free movement can be estimated based on the mapping equation that is obtained in the initial …


Batik Dying Simulation Based On Diffusion, Yangtao Yu, Zhenlu Yu, Wenhua Qian, Keshi Zhang, Xu Dan Jun 2018

Batik Dying Simulation Based On Diffusion, Yangtao Yu, Zhenlu Yu, Wenhua Qian, Keshi Zhang, Xu Dan

Journal of System Simulation

Abstract: This paper presents a three-layer model which is composed of wax layer, warp layer and weft layer. The wax layer wraps warp and weft layer which overlap together. According to Fick's second law and considering dye's diffusion, absorption and supply, a differential equation is built to describe diffusion process and this equation is discretized. Porosity, tortuosity and neighboring coefficient are used in the equation. Rectangular weave is simulated by using ellipse-distance model and blurred in HSV color space. Simulation shows that the satisfactory visual effect which closes to real batik cloth is acquired by the method and the algorithm …


Temperature Characteristics Of Contact Wire Under Different Driving Intervals, Hongwei Wang, Zhang Kai, Zhiyong Wang, Fengyi Guo, Liu Shuai, Zhang Qiong Jun 2018

Temperature Characteristics Of Contact Wire Under Different Driving Intervals, Hongwei Wang, Zhang Kai, Zhiyong Wang, Fengyi Guo, Liu Shuai, Zhang Qiong

Journal of System Simulation

Abstract: To reduce the wear of pantograph and catenary system while decreasing the headway, the temperature field of the contact wire is studied. A simulation model is established by using the COMSOL Multiphysics software. The effectiveness of the model is verified with temperature experiments. Temperature field of the contact wire of freight locomotive and passenger locomotive in different intervals is studied by simulation. The smaller the headway of trains, the higher the temperature value, and the shorter the balance process. Under the constraint of temperature field, the headway of freight locomotive couldn't be less than 180s under long term operation. …


Space Communication Network Cascading Failure Model Oriented System Combat, Zhu Lin, Shengliang Fang, Jinsong Wang, Fuxiang Wu Jun 2018

Space Communication Network Cascading Failure Model Oriented System Combat, Zhu Lin, Shengliang Fang, Jinsong Wang, Fuxiang Wu

Journal of System Simulation

Abstract: According to the structure characteristics of space communication network, a node attack model for space communication network was designed. A space communication network cascading failure model was proposed by analyzing the assigning of initial load and the capacity of node, the judging regulation of node cascading and the reassigning algorithm of node load. The evaluation method of network robustness based on the loss ratio of operation loop was put forward. The validity of the model is illustrated by a case of combat system network cascading failure process. The simulation results also revealed the relationship between the cascading failures results …


Equipment Rul Prediction Oriented Parallel Simulation Framework, Chenglong Ge, Yuanchang Zhu, Yanqiang Di, Zhiwei Hu, Zhihua Dong Jun 2018

Equipment Rul Prediction Oriented Parallel Simulation Framework, Chenglong Ge, Yuanchang Zhu, Yanqiang Di, Zhiwei Hu, Zhihua Dong

Journal of System Simulation

Abstract: As the equipment states are complicated with uncertainty, predicting remaining useful life with self-updating ability has become a hard task. Simulation provides an effective way to solve the problem. The concept and technology framework of equipment remaining useful life prediction oriented parallel simulation are proposed based on parallel system theory and the concept, characteristics, capacity demands and functional compositions of parallel simulation are introduced. The main modeling technologies of equipment remaining useful life prediction oriented parallel simulation are discussed, which include awareness of equipment degradation state, construction of equipment degradation state space model and evolution of equipment degradation state …


3d Visual Effects Assessment Based On Comprehensive Weight, Yanyang Zeng, Zhenjing Feng Jun 2018

3d Visual Effects Assessment Based On Comprehensive Weight, Yanyang Zeng, Zhenjing Feng

Journal of System Simulation

Abstract: There are various indicators for assessing the 3D visual effects, while the general weight of each index needs pre-determined coefficients individually, for which either the expert knowledge model or theoretical model used has advantages and disadvantages empowerment. Based on expert knowledge and theoretical models, the comprehensive weight method, optimization model, and direct solution of the index weight vectors have subjective and objective information. Experimental results show that the method of determining the weight vector different sort results of the assessment is also slightly different. Integrated weighting method to determine the weight of each index and the corresponding results of …