Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 78

Full-Text Articles in Engineering

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl Dec 2020

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl

Library Philosophy and Practice (e-journal)

Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The …


Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera Dec 2020

Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this dissertation, we worked on several algorithmic problems in bioinformatics using mainly three approaches: (a) a streaming model, (b) sux-tree based indexing, and (c) minwise-hashing (minhash) and locality-sensitive hashing (LSH). The streaming models are useful for large data problems where a good approximation needs to be achieved with limited space usage. We developed an approximation algorithm (Kmer-Estimate) using the streaming approach to obtain a better estimation of the frequency of k-mer counts. A k-mer, a subsequence of length k, plays an important role in many bioinformatics analyses such as genome distance estimation. We also developed new methods that use …


A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai Dec 2020

A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Prediction methods are important for many applications. In particular, an accurate prediction for the total number of cases for pandemics such as the Covid-19 pandemic could help medical preparedness by providing in time a sufficient supply of testing kits, hospital beds and medical personnel. This thesis experimentally compares the accuracy of ten prediction methods for the cumulative number of Covid-19 pandemic cases. These ten methods include two types of neural networks and extrapolation methods based on best fit linear, best fit quadratic, best fit cubic and Lagrange interpolation, as well as an extrapolation method from Revesz. We also consider the …


Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan Dec 2020

Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The thesis analyzes an existing eye-tracking dataset collected while software developers were solving bug fixing tasks in an open-source system. The analysis is performed using a representational learning approach namely, Multi-layer Perceptron (MLP). The novel aspect of the analysis is the introduction of a new feature engineering method based on the eye-tracking data. This is then used to predict developer expertise on the data. The dataset used in this thesis is inherently more complex because it is collected in a very dynamic environment i.e., the Eclipse IDE using an eye-tracking plugin, iTrace. Previous work in this area only worked on …


Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti Dec 2020

Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti

Library Philosophy and Practice (e-journal)

This bibliometric describe Information Technology Relateness is defined as the use of information technology infrastructure and information technology management processes betweeWas this submission previously published in a journal? Bepress will automatically create an OpenURL for published articles. Learn more about OpenURLsn business units together. There is not much research on Information Technology Relateness by providing a big picture that is visualized from year to year. This study aims to map research in the field of Information Technology Relateness with data from all international research publications. This study performs a bibliometric method and analyzes research data using the Services Analyze …


Software Development With Scrum: A Bibliometric Analysis And Profile, Peter Kokol, Sašo Zagoranski, Marko Kokol Dec 2020

Software Development With Scrum: A Bibliometric Analysis And Profile, Peter Kokol, Sašo Zagoranski, Marko Kokol

Library Philosophy and Practice (e-journal)

Introduction of the Scrum approach into software engineering has changed the way software is being developed. The Scrum approach emphasizes the active end-user involvement, embracing of change, and /iterative delivery of products. Our study showed that Scrum has different variants or is used in combination with different methods. Some tools not normally used in the conventional software approaches, like gamification, content analysis and grounded theory are also employed. However, Scrum like other software development approach focuses on improvement of software process, software quality, business value, performance, usability and efficiency and at the same time to reduce cost, risk and uncertainty. …


Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr. Nov 2020

A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr.

Library Philosophy and Practice (e-journal)

Purpose- Estimation of food portions is necessary in image based dietary monitoring techniques. The purpose of this systematic survey is to identify peer reviewed literature in image-based food volume estimation methods in Scopus, Web of Science and IEEE database. It further analyzes bibliometric survey of image-based food volume estimation methods with 3D reconstruction and deep learning techniques.

Design/methodology/approach- Scopus, Web of Science and IEEE citation databases are used to gather the data. Using advanced keyword search and PRISMA approach, relevant papers were extracted, selected and analyzed. The bibliographic data of the articles published in the journals over the past …


Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat Nov 2020

Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat

Library Philosophy and Practice (e-journal)

Nowadays, data is considered as a new life force for operations of physical systems in various domains such as manufacturing, healthcare, transportations, etc. However, the hugely generated data, which mirrors the working essence of the product life cycle, is still underutilised. Digital Twin (DT), a collective representation of active and passive captured data, is a virtual counterpart of the physical resources that could help prevent effective preventive maintenance in any applied domain. Currently, lots of research is going on about the applicability of digital twin in smart IOT based manufacturing industry 4.0 environment. Still, it lacks a formal study, which …


Strain And Stress Relationships For Optical Phonon Modes In Monoclinic Crystals With Β-Ga2O3 As An Example, Rafal Korlacki, Megan Stokey, A. Mock, Sean Knight, Alexis Papamichail, Vanya Darakchieva, Mathias Schubert Nov 2020

Strain And Stress Relationships For Optical Phonon Modes In Monoclinic Crystals With Β-Ga2O3 As An Example, Rafal Korlacki, Megan Stokey, A. Mock, Sean Knight, Alexis Papamichail, Vanya Darakchieva, Mathias Schubert

Department of Electrical and Computer Engineering: Faculty Publications

Strain-stress relationships for physical properties are of interest for heteroepitaxial material systems, where strain and stress are inherent due to thermal expansion and lattice mismatch. We report linear perturbation theory strain and stress relationships for optical phonon modes in monoclinic crystals for strain and stress situations which maintain the monoclinic symmetry of the crystal. By using symmetry group analysis and phonon frequencies obtained under various deformation scenarios from density-functional perturbation theory calculations on β-Ga2O3, we obtain four strain and four stress potential parameters for each phonon mode. We demonstrate that these parameters are sufficient to …


Strain And Stress Relationships For Optical Phonon Modes In Monoclinic Crystals With Β-Ga2O3 As An Example, Rafal Korlacki, Megan Stokey, A. Mock, Sean Knight, A. Papamichail, V. Darakchieva, Mathias Schubert Nov 2020

Strain And Stress Relationships For Optical Phonon Modes In Monoclinic Crystals With Β-Ga2O3 As An Example, Rafal Korlacki, Megan Stokey, A. Mock, Sean Knight, A. Papamichail, V. Darakchieva, Mathias Schubert

Department of Electrical and Computer Engineering: Faculty Publications

Strain-stress relationships for physical properties are of interest for heteroepitaxial material systems, where strain and stress are inherent due to thermal expansion and lattice mismatch. We report linear perturbation theory strain and stress relationships for optical phonon modes in monoclinic crystals for strain and stress situations which maintain the monoclinic symmetry of the crystal. By using symmetry group analysis and phonon frequencies obtained under various deformation scenarios from density-functional perturbation theory calculations on β-Ga2O3, we obtain four strain and four stress potential parameters for each phonon mode. We demonstrate that these parameters are sufficient to …


Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe Nov 2020

Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Bioinformatics is an important field that seeks to solve biological problems with the help of computation. One specific field in bioinformatics is that of genomics, the study of genes and their functions. Genomics can provide valuable analysis as to the interaction between how genes interact with their environment. One such way to measure the interaction is through gene expression data, which determines whether (and how much) a certain gene activates in a situation. Analyzing this data can be critical for predicting diseases or other biological reactions. One method used for analysis is Formal Concept Analysis (FCA), a computing technique based …


A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha Nov 2020

A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Smart wearables help real-time and remote monitoring of health data for effective diagnostic and preventive health care services. Wearable devices have the ability to track and monitor healthcare vitals such as heart rate, physical activities, BMI (Body Mass Index), blood pressure, and keeps an individual notified about the health status. Artificial Intelligence-enabled wearables show an ability to transform the health insurance sector. This would not only enable self-management of individual health but also help them focus from treatments to the preventions of health hazards. With this customer-centric approach to health care, it will enable the insurance companies to track the …


A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar Nov 2020

A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar

Library Philosophy and Practice (e-journal)

In the 21st century, clothing fashion has become an inevitable part of every individual human as it is considered a way to express their personality to the outside world. Currently the traditional fashion business models are experiencing a paradigm shift from being an experience-based business strategy implementation to a data driven intelligent business improvisation. Artificial Intelligence is acting as a catalyst to achieve the infusion of data intelligence into the fashion industry which aims at fostering all the business brackets such as supply chain management, trend analysis, fashion recommendation, sales forecasting, digitized shopping experience etc. The field of “Fashion …


Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow Oct 2020

Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The demand for K-12 Computer Science (CS) education is growing and there is not an adequate number of educators to match the demand. Comprehensive research was carried out to investigate and understand the influence of a summer two-week professional development (PD) program on teachers’ CS content and pedagogical knowledge, their confidence in such knowledge, their interest in and perceived value of CS, and the factors influencing such impacts. Two courses designed to train K-12 teachers to teach CS, focusing on both concepts and pedagogy skills were taught over two separate summers to two separate cohorts of teachers. Statistical and SWOT …


Content Modelling For Unbiased Information Analysis, Milind Gayakwad, Suhas Patil Dr Oct 2020

Content Modelling For Unbiased Information Analysis, Milind Gayakwad, Suhas Patil Dr

Library Philosophy and Practice (e-journal)

Content is the form through which the information is conveyed as per the requirement of user. A volume of content is huge and expected to grow exponentially hence classification of useful data and not useful data is a very tedious task. Interface between content and user is Search engine. Therefore, the contents are designed considering search engine's perspective. Content designed by the organization, utilizes user’s data for promoting their products and services. This is done mostly using inorganic ways utilized to influence the quality measures of a content, this may mislead the information. There is no correct mechanism available to …


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade Oct 2020

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …


A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade Oct 2020

A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade

Library Philosophy and Practice (e-journal)

Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of implementation and accuracy provides it with a broader scope. The face recognition systems are vulnerable to some extent and are attacked by performing different types of attacks using a variety of techniques. The term used to describe the measures taken to prevent these types of attacks is known as face anti spoofing. Research has been carried on since decades to design systems that are robust against these attacks. The focus of the work in this paper is to explore the area of face …


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha Oct 2020

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and …


A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha Oct 2020

A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Delivering a reliable software product is a fairly complex process, which involves proper coordination from the various teams in planning, execution, and testing for delivering software. Most of the development time and the software budget's cost is getting spent finding and fixing bugs. Rework and side effect costs are mostly not visible in the planned estimates, caused by inherent bugs in the modified code, which impact the software delivery timeline and increase the cost. Artificial intelligence advancements can predict the probable defects with classification based on the software code changes, helping the software development team make rational decisions. Optimizing the …


A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha Oct 2020

A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Heterogenous and voluminous unstructured data is produced from various sources like emails, social media tweets, reviews, videos, audio, images, PDFs, scanned documents, etc. Organizations need to store this wide range of unstructured data for more and longer periods so that they can examine information all the more profoundly to make a better decision and extracting useful insights. Manual processing of such unstructured data is always a challenging, time-consuming, and expensive task for any organization. Automating unstructured document processing using Optical Character Recognition (OCR) and Robotics Process Automation (RPA), seems to have limitations, as those techniques are driven by rules or …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman Oct 2020

Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study was conducted to determine the effectiveness and efficiency of the use of technology and integrated information systems and recommend the development of new systems at PTKIN (UIN Sunan Ampel Surabaya and UIN Maulana Malik Ibrahim Malang). The study of information technology management in tertiary institutions aims to measure the extent to which the application of information technology is able to support the activities of the Tri Dharma College in order to achieve world class universities. In measuring the results of the audit of information technology management the tertiary institution will conduct evaluation, monitoring and further development of information …


Cross-Domain Identification For Thermal-To-Visible Face Recognition, Cedric Nimpa Fondje, Shuowen Hu, Nathaniel J. Short, Benjamin S. Riggan Aug 2020

Cross-Domain Identification For Thermal-To-Visible Face Recognition, Cedric Nimpa Fondje, Shuowen Hu, Nathaniel J. Short, Benjamin S. Riggan

Department of Electrical and Computer Engineering: Faculty Publications

Recent advances in domain adaptation, especially those applied to heterogeneous facial recognition, typically rely upon restrictive Euclidean loss functions (e.g., L2 norm) which perform best when images from two different domains (e.g., visible and thermal) are co-registered and temporally synchronized. This paper proposes a novel domain adaptation framework that combines a new feature mapping sub-network with existing deep feature models, which are based on modified network architectures (e.g., VGG16 or Resnet50). This framework is optimized by introducing new cross-domain identity and domain invariance loss functions for thermal-to-visible face recognition, which alleviates the requirement for precisely co-registered and synchronized imagery. We …


Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui Aug 2020

Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technological advances have made it possible to build cheap devices with more processing power and storage, and that are capable of continuously generating large amounts of data, the network has to undergo significant changes as well. The rising number of vendors and variety in platforms and wireless communication technologies have introduced heterogeneity to networks compromising the efficiency of existing routing algorithms. Furthermore, most of the existing solutions assume and require connection to the backbone network and involve changes to the infrastructures, which are not always possible -- a 2018 report by the Federal Communications Commission shows that over 31% …


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace Aug 2020

An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Existing fiducial markers are designed for efficient detection and decoding. The methods are computationally efficient and capable of demonstrating impressive results, however, the markers are not explicitly designed to stand out in natural environments and their robustness is difficult to infer from relatively limited analysis. Worsening performance in challenging image capture scenarios - such as poorly exposed images, motion blur, and off-axis viewing - sheds light on their limitations. The method introduced in this work is an end-to-end trainable method for designing fiducial markers and a complimentary detector. By introducing back-propagatable marker augmentation and superimposition into training, the method learns …


Enhanced Control Algorithms In Permanent Magnet Synchronous Machines, Haibo Li Aug 2020

Enhanced Control Algorithms In Permanent Magnet Synchronous Machines, Haibo Li

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Permanent magnet synchronous machines (PMSMs) are gaining increasing popularity in various applications due to their advantages, such as high efficiency, high power density, and superior control performance. A well-designed machine control algorithm is indispensable for a PMSM system to secure its good performance.

In this work, enhanced control algorithms in PMSMs are developed. Online machine current trajectory tracking, source power management, hardware overcurrent regulation, and machine current sensor fault detection and isolation (FDI) are included in the developed algorithms. The online machine current trajectory tracking ensures the maximum torque per ampere (MTPA) or maximum torque per voltage (MTPV) control in …


The Role Of Information And Communication Technology (Ict) In Securing Books In Irish Academic Libraries., Emmanuel Oguche Aug 2020

The Role Of Information And Communication Technology (Ict) In Securing Books In Irish Academic Libraries., Emmanuel Oguche

Library Philosophy and Practice (e-journal)

This study examined how effective the ICT gadgets are used in securing books in academic libraries and what technological approach the libraries will adopt in the future to ensure books are secured from mutilation and theft. The study was also to understand why students steal or mutilate books. A semi-structured interview was the qualitative research design used to collect data from six librarians. It was discovered that the libraries had adopted the use of ICT security gadgets like Radio-Frequency Identification (RFID) technology, surveillance cameras, self-service machine, magnetic strips. The combined use of these gadgets led to the drastic reduction of …