Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Classification (9)
- Optimization (6)
- Particle swarm optimization (5)
- Wireless sensor networks (5)
- Electrocardiogram (4)
-
- Energy efficiency (4)
- Genetic algorithm (4)
- Smart grid (4)
- Support vector machine (4)
- Wavelet (4)
- Artificial neural network (3)
- Deep learning (3)
- Distributed generation (3)
- Electroencephalogram (3)
- Entropy (3)
- Feature extraction (3)
- Image denoising (3)
- Induction motor (3)
- Machine learning (3)
- Microstrip (3)
- Modeling (3)
- Phasor measurement unit (3)
- Power quality (3)
- Principal component analysis (3)
- Support vector machines (3)
- Accuracy (2)
- Arrhythmia (2)
- Artificial bee colony algorithm (2)
- Bagged tree classification (2)
- Big Data (2)
Articles 1 - 30 of 342
Full-Text Articles in Computer Engineering
Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik
Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik
International Journal of Business and Technology
The social Web provides opportunities for the public to have social interactions and online discussions. A large number of online users using the social web sites create a high volume of data. This leads to the emergence of Big Data, which focuses on computational analysis of data to reveal patterns, and associations relating to human interactions. Such analyses have vast applications in various fields such as understanding human behaviors, studying culture influence, and promoting online marketing. The blogs are one of the social web channels that offer a way to discuss various topics. Finding the top bloggers has been a …
Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah
Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah
International Journal of Business and Technology
An electromagnetic (EM) energy harvesting application based on metamaterial absorber (MA) is introduced and discussed in this paper. This application is operating at ISM band (2.40 GHz) which is especially chosen due to its wide usage area. Square ring resonator (SRR) which has two gaps and resistors across the gaps on it is used. Chips resistors are used to deliver power to any active component. Transmission and reflection characteristics of metamaterial absorber (MA) for energy harvesting application are investigated. 83.6% efficient for energy harvesting application is realized in this study.
The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muça
The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muça
International Journal of Business and Technology
The aim of this study is to classify the risk factors of being with a type of cancer by applying the AHP (analytic hierarchy process) scale. The Saaty’s analytic hierarchy process is applied for computing weights for the factors, is a modeling for classification. A case study of QSUT Tirana hospital data base is presented to rank four cancer types. By the data collect from the hospital during the years 2011-2015, the results show that lung cancer is mostly spread in humans, and the prostate cancer is lower spread in humans.
Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi
Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi
International Journal of Business and Technology
The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc.
If everything around us is connected and information about these …
Hybrid Modelling In System Simulation, Andreas Körner
Hybrid Modelling In System Simulation, Andreas Körner
International Journal of Business and Technology
In times of increasing power and capacity in computer, simulation mathematical models are getting more and more important. For different technical applications and in natural science but also in economic systems and management processes appropriate mathematical model descriptions are necessary. Hybrid modelling is a special technique for more complex model descriptions in order to reduce the degree of complexity. In different fields of interest, the behavior of a model is dependent on the active state. When the model description is changing from one state to another, a so-called state event takes place. State event modelling is the overall term to …
E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili
E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili
International Journal of Business and Technology
This study provides a review of the literature on e-learning systems evolution and environments. The argument is that e-learning systems should be embedded in the core strategy of the institution. To support this premise, studies for e-learning are analyzed and six recommendations are drawn for universities to follow in order to have successful e-learning environments. The main contribution of this study, however, is the identification of the trends and statistics regarding the e-learning usage in the Balkan region. These stats are identified through a survey conducted in 40 universities in 10 countries from this region. The results show that more …
Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither
Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither
International Journal of Business and Technology
In this work we present two structurally different mathematical models for the prognostic simulation of Austria’s population: A time-continuous, macroscopic system dynamics approach and a time-discrete, microscopic agent-based approach. Both models were developed as case studies of a series of population concepts in order to support models for decision-support in Austria’s health care system. In the present work we want to focus on the definition, the parametrisation as well as especially the validation process of both population-models. The latter was of special interest as it included a cross-model validation with Statistics Austria’s own prognostic model SIKURS.
Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher
Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher
International Journal of Business and Technology
Agent-Based Models have become a widely used tool in social sciences, health care management and other disciplines to describe complex systems from a bottom-up perspective. Some reasons for that are the easy understanding of Agent-Based Models, the high flexibility and the possibility to describe heterogeneous structures. Nevertheless problems occur when it comes to analyzing Agent-Based Models. This paper shows how to describe Agent-Based Models in a macroscopic way as Markov Chains, using the random map representation. The focus is on the implementation of this method for chosen examples of a Random Walk and Opinion Dynamic Models. It is also shown …
Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach
Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach
International Journal of Business and Technology
Predicting demand for care is necessary to provide sufficient capacities in hospitals and enable better planning to cope with challenges like changes in the structure of the population. Emphasis in this work is put on the analysis of the data and on the parametrization of a simulation model for the paths of patients with mental diseases through the health care system. Survival analysis and model selection methods are used for this purpose. Data on patients and their treatments is analyzed with methods of survival analysis. Different methods for modelling the survival and hazard function are presented and compared. Hereby, the …
Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa
Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa
International Journal of Business and Technology
Wireless sensor networks (WSNs) compose the fundamental platform for a number of Internet of Things (IoT) applications, especially those related to the environmental, health, and military surveillance. While being autonomous in power supply, the main challenge in node’s processing and communication architecture design remains the energy efficiency. However, this goal should not limit the main functionality of the system which is often related to the network coverage and connectivity.
This paper shows the implementation of the Ad-hoc On-demand Distance Vector (AODV) routing algorithm in an XBee based platform. As shown, the network can achieve low power consumption per node primarily …
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
International Journal of Business and Technology
With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update …
Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman
Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman
International Journal of Business and Technology
Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is a widely used online security tool that ensures that a computer program is not posing as a human user. While smart programs with advanced image processing capability have already cracked picture based captcha systems there is a need for making the test harder. This paper presents a design prototype of a simplified type of labeled-image captcha where a picture of a common animal or household item is marked with a number of different labels and the users will be asked to provide the correct label for specific …
A Policeless Traffic Ticketing System With Autonomous Vehicles, Mükremin Özkul, Ilir Çapuni
A Policeless Traffic Ticketing System With Autonomous Vehicles, Mükremin Özkul, Ilir Çapuni
International Journal of Business and Technology
Besides being expensive, traffic violation monitoring systems rely heavily on a huge infrastructure that incurs installation, operational, and maintenance costs.
Developing countries — where people do exhibit less traffic safety aware- ness — deployment of such systems becomes a daunting task. A police- men cannot be everywhere, and a policeman can also be bribed.
With the above goals in mind, in this paper we present an infrastructure- less and police-less traffic violation detection system that relies solely on the broadcast messages between the vehicles and secure communication of the vehicles with the transportation authority. Each vehicle should be equipped with …
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Journal of Digital Forensics, Security and Law
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
The African Journal of Information Systems
Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources …
The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha
The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha
Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings
The 4onse project studies non-conventional monitoring systems fully based on open technologies (hardware, standard protocols, software and data) for the management of resources and natural hazards in developing countries. After the design of hydro-meteorological stations and software for the collection, management and distribution of data, the study involves the installation of 30 stations in the Deduroya Oya river basin in Sri Lanka. The system will be analysed to fully understand the real cost of ownership, data quality and applicability in real situations. If properly validated, these systems can provide an alternative solution, effective and sustainable for the protection of property …
Route Planning For Vessel Based On Dynamic Complexity Map, Zhe Du, Yuanqiao Wen, Huang Liang, Chunhui Zhou, Changshi Xiao
Route Planning For Vessel Based On Dynamic Complexity Map, Zhe Du, Yuanqiao Wen, Huang Liang, Chunhui Zhou, Changshi Xiao
Journal of System Simulation
Abstract: Aiming at multiple mobile objects in complex navigation environment, a route planning method based on the dynamic complexity map is proposed. According to the theory of complexity measurement, a dynamic complexity map is established. By taking advantage of the idea of A * algorithm, the complexity value is taken as an actual cost and the Euclidean Distance from current point to the target is taken as a heuristic costs. Considering the ship dimensions, the channel boundary constraint function is added. The experimental results show that on the premises of satisfying the constraint of ship dimensions, the planned route …
Synthesizing Rotational Human Motion With Physical Reality, Wei Yi, Shihong Xia
Synthesizing Rotational Human Motion With Physical Reality, Wei Yi, Shihong Xia
Journal of System Simulation
Abstract: Both keyframes and their timings play an important role in synthesizing physically realistic human motion. However, physically plausible timings are hard to set by manual. By combing keyframes and the physics-based optimization, a new method is proposed to solve physically plausible timings of given keyframes. Firstly, the keyframes and the initial value of the timings of keyframes are set through a graphical user interface. Secondly, the physically plausible timings of keyframes are obtained by optimizing a small-size nonlinear optimization model. Finally, the rotational human motion is synthesized by the keyframes and the computed timings of keyframes. Experiments are performed …
Performance Analysis And Research Of Shark Fin Structure Based On Simulation, Liu Shuang, Lü Chao, Rao Yong, Shiming Wang
Performance Analysis And Research Of Shark Fin Structure Based On Simulation, Liu Shuang, Lü Chao, Rao Yong, Shiming Wang
Journal of System Simulation
Abstract: The shark fin, the pectoral fin and the dorsal fin were studied based on the numerical simulation method; the pressure field, velocity field and flow field of the specimen structure were analyzed with three different flow velocities; the analysis and comparison of the mechanical properties of caudal fin, dorsal fin and pectoral fin were presented. The results show that the setting width of the tail fin can be set to 0.5 ~ 4.8 meters so as to improve the anti-karman vortex effect; the width of the tail fins should be relatively narrow in order to guarantee the base of …
Physically-Based Dynamic Algorithms For Time-Varying Of Flowers And Leaves, Jiao Di, Yang Meng, Yang Gang
Physically-Based Dynamic Algorithms For Time-Varying Of Flowers And Leaves, Jiao Di, Yang Meng, Yang Gang
Journal of System Simulation
Abstract: This paper presents physically-based simulations of dynamic algorithms of the blossom and fading of flowers as well as the time-varying leaves following the seasons. The models of the flowers are constructed according to the previously collected primary biological data of organs of flowers. The dynamic simulation is presented by two phases: the process of blooming and the process of fading. To simulate the former, the curved surfaces of petals are controlled by controlling the points on the Bezier surface; for realizing the simulation of the latter, the physical method is used. The dynamic effects of colors of leaves according …
Emergency Condition Selection Based On Tcp-Nets, Weihong Liu, Zheng Xiao, Cheng Chen, Li Qiao
Emergency Condition Selection Based On Tcp-Nets, Weihong Liu, Zheng Xiao, Cheng Chen, Li Qiao
Journal of System Simulation
Abstract: The representative or relative important emergency conditions need to be selected for making well-directed emergency plans. The quantitative method is normally used to select emergency conditions, but it requires users to specify the weight of every attribute, which does not conform to the users' habit. A qualitative method for emergency condition selection is put forward which includes two steps: for the first step, TCP-nets is adopted to describe users' requirements; and for the second step, the most important emergency conditions are selected based on TCP-nets. The effectiveness of the method is proved, and the efficiency is verified by experiments …
Key Technology Of Oil Spill Visualization At Sea Surface, Changjun Zou, Yin Yong, Xiuwen Liu, Feifei Wan
Key Technology Of Oil Spill Visualization At Sea Surface, Changjun Zou, Yin Yong, Xiuwen Liu, Feifei Wan
Journal of System Simulation
Abstract: An intensive study is made on the visualization method and oil equipment interaction. To solve the blind area problem and to realize the interactive of oil film, the following methods are proposed: new visualization method based on texture projection; modeling technique of oil boom based on mass-spring model; dynamic interaction method between oil boom and oil film texture based on polygon clipping. Real-time oil spill visualization at sea is implemented on GPU, the test results show the correctness and reliability of the methods.
Cooperative Target Recognition With Multiple Features Judgment, Guopeng Sun, Xiangyang Hao, Zhenjie Zhang, Pengrui Yan
Cooperative Target Recognition With Multiple Features Judgment, Guopeng Sun, Xiangyang Hao, Zhenjie Zhang, Pengrui Yan
Journal of System Simulation
Abstract: For solving cooperative target recognition problem in visual navigation, a fast and accurate algorithm based on progressive judgment of multiple features is proposed. The image is processed and judged by multiple features including image contours, Hu moment invariants and FAST corners. The non-target areas are eliminated and the real targets are obtained. In the process, algorithm is improved and some accelerated strategies are adopted to meet real-time requirements. Experiments show that the proposed algorithm can identify cooperative target robustly and adaptively with different distances, different angles and environment disturbance.
A Lightweight Modeling And Simulation Technical Framework For Complex Systems, Ji Hang, Junhua Zhou, Guoqiang Shi, Tingyu Lin, Junjie Xue
A Lightweight Modeling And Simulation Technical Framework For Complex Systems, Ji Hang, Junhua Zhou, Guoqiang Shi, Tingyu Lin, Junjie Xue
Journal of System Simulation
Abstract: Aiming at the modeling and simulation verification of complex systems, the paper established a lightweight simulation technical framework and a system building method. The simulation technical framework is built based on distributed network communication middleware and has graphic user interface, simulation management and run control modules, it packages effective and lightweight network middleware, object management, event management and time management and it is capable of interoperability and its members have abilities of reusable and combinable. The results show that the framework can supports flexible construction and effective simulation on complex systems.
Eye Gaze Tracking In 3d Immersive Environments, Xincan Zhao, Shihao Pan, Yaping Wang, Tie Yun
Eye Gaze Tracking In 3d Immersive Environments, Xincan Zhao, Shihao Pan, Yaping Wang, Tie Yun
Journal of System Simulation
Abstract: Aiming at the problem that human-computer interaction in immersive environments is entirely dependent on the body movement with low operational efficiency,a 3D eye gaze tracking method is proposed to gain the 3D gaze point of the user. Thus the interactive operation could be achieved, which provides a natural and bidirectional way for interaction. The Leap Motion controller is innovatively used to track the coordinates of eyes and the head position is tracked with the motion capture device. The gaze point under free movement can be estimated based on the mapping equation that is obtained in the initial …
Batik Dying Simulation Based On Diffusion, Yangtao Yu, Zhenlu Yu, Wenhua Qian, Keshi Zhang, Xu Dan
Batik Dying Simulation Based On Diffusion, Yangtao Yu, Zhenlu Yu, Wenhua Qian, Keshi Zhang, Xu Dan
Journal of System Simulation
Abstract: This paper presents a three-layer model which is composed of wax layer, warp layer and weft layer. The wax layer wraps warp and weft layer which overlap together. According to Fick's second law and considering dye's diffusion, absorption and supply, a differential equation is built to describe diffusion process and this equation is discretized. Porosity, tortuosity and neighboring coefficient are used in the equation. Rectangular weave is simulated by using ellipse-distance model and blurred in HSV color space. Simulation shows that the satisfactory visual effect which closes to real batik cloth is acquired by the method and the algorithm …
Temperature Characteristics Of Contact Wire Under Different Driving Intervals, Hongwei Wang, Zhang Kai, Zhiyong Wang, Fengyi Guo, Liu Shuai, Zhang Qiong
Temperature Characteristics Of Contact Wire Under Different Driving Intervals, Hongwei Wang, Zhang Kai, Zhiyong Wang, Fengyi Guo, Liu Shuai, Zhang Qiong
Journal of System Simulation
Abstract: To reduce the wear of pantograph and catenary system while decreasing the headway, the temperature field of the contact wire is studied. A simulation model is established by using the COMSOL Multiphysics software. The effectiveness of the model is verified with temperature experiments. Temperature field of the contact wire of freight locomotive and passenger locomotive in different intervals is studied by simulation. The smaller the headway of trains, the higher the temperature value, and the shorter the balance process. Under the constraint of temperature field, the headway of freight locomotive couldn't be less than 180s under long term operation. …
Space Communication Network Cascading Failure Model Oriented System Combat, Zhu Lin, Shengliang Fang, Jinsong Wang, Fuxiang Wu
Space Communication Network Cascading Failure Model Oriented System Combat, Zhu Lin, Shengliang Fang, Jinsong Wang, Fuxiang Wu
Journal of System Simulation
Abstract: According to the structure characteristics of space communication network, a node attack model for space communication network was designed. A space communication network cascading failure model was proposed by analyzing the assigning of initial load and the capacity of node, the judging regulation of node cascading and the reassigning algorithm of node load. The evaluation method of network robustness based on the loss ratio of operation loop was put forward. The validity of the model is illustrated by a case of combat system network cascading failure process. The simulation results also revealed the relationship between the cascading failures results …
Equipment Rul Prediction Oriented Parallel Simulation Framework, Chenglong Ge, Yuanchang Zhu, Yanqiang Di, Zhiwei Hu, Zhihua Dong
Equipment Rul Prediction Oriented Parallel Simulation Framework, Chenglong Ge, Yuanchang Zhu, Yanqiang Di, Zhiwei Hu, Zhihua Dong
Journal of System Simulation
Abstract: As the equipment states are complicated with uncertainty, predicting remaining useful life with self-updating ability has become a hard task. Simulation provides an effective way to solve the problem. The concept and technology framework of equipment remaining useful life prediction oriented parallel simulation are proposed based on parallel system theory and the concept, characteristics, capacity demands and functional compositions of parallel simulation are introduced. The main modeling technologies of equipment remaining useful life prediction oriented parallel simulation are discussed, which include awareness of equipment degradation state, construction of equipment degradation state space model and evolution of equipment degradation state …
3d Visual Effects Assessment Based On Comprehensive Weight, Yanyang Zeng, Zhenjing Feng
3d Visual Effects Assessment Based On Comprehensive Weight, Yanyang Zeng, Zhenjing Feng
Journal of System Simulation
Abstract: There are various indicators for assessing the 3D visual effects, while the general weight of each index needs pre-determined coefficients individually, for which either the expert knowledge model or theoretical model used has advantages and disadvantages empowerment. Based on expert knowledge and theoretical models, the comprehensive weight method, optimization model, and direct solution of the index weight vectors have subjective and objective information. Experimental results show that the method of determining the weight vector different sort results of the assessment is also slightly different. Integrated weighting method to determine the weight of each index and the corresponding results of …