Volume 5, Issue 3

Current Issue features key papers related to multidisciplinary domains involving complex system stemming from numerous disciplines; this is exactly how this journal differs from other interdisciplinary and multidisciplinary engineering journals. This issue contains 73 accepted papers in Computer Science domain.
Download Complete IssueFront Cover
Editorial Board
Editorial
Table of Contents
Evaluation of Uncertainty Measurement Calculation for Vector Network Analyzer From 300 kHz to 8.5 GHz
Increasing the telecommunications products that allow Vector Network Analyzer is becoming more common tools to measure the S-Parameter. It will be an absolute number from the S-Parameter measurements produced in real and imaginary, other words it is also known as the product of the calculation. The calculation findings do not include the systematic and random…
Read MoreParameter Estimation on Two-Dimensional Advection-Dispersion Model of Biological Oxygen Demand in Facultative Waste Water Stabilization Pond: Case Study at Sewon Wastewater Treatment Facility
To build a precise mathematical model describing a natural phenomenon, parameter estimation is needed to achieve the best parameter value. In this paper, we have calculated the best parameter value for a two-dimensional advection-dispersion differential equation of the biological oxygen demand degradation process in a facultative wastewater stabilization pond. This research was conducted with case…
Read MoreA Novel Hybrid Method for Segmentation and Analysis of Brain MRI for Tumor Diagnosis
It is difficult to accurately segment brain MRI in the complex structures of brain tumors, blurred borders, and external variables such as noise. Much research in developing as well as developed countries show that the number of individuals suffering tumor of the brain has died as a result of the inaccurate diagnosis. The proposed article,…
Read MoreCentralized System of Universities Learning Materials
This article considers the creation of a program / website as an example of a centralized system for all universities in order to more easily familiarize an applicant and / or student with the internal politics and capabilities of the university. Existing problems in the training system are examined, why distance learning is relevant, what…
Read MoreDynamic Objects Parameter Estimation Program for ARM Processors Based Adaptive Controllers
Modern microcontrollers are capable to realize not only traditional PID-regulators but also adaptive ones. Object of control parameters estimation is the biggest part of adaptive control from the point of view of time consumption. The ways to reduce this time for digital control systems based on ARM-CORTEX 32-bit and 64-bit processors are shown in the…
Read MoreDesign, Implementation and Performance Analysis of a Dual Axis Solar Tracking System
This study presents the design and construction of the Dual Axis Solar Tracking System to ensure maximum energy gain. The solar tracking system will automatically follow the sun’s position to maximize the intensity of the light emitted from the sun. When the light intensity decreases, the system automatically changes its direction to get the maximum…
Read MoreUsing Leader Election and Blockchain in E-Health
The development of electronic healthcare systems requires to adopt modern technologies and architectures. The use of Electronic Personal Health Record (E-PHR) should be supported by efficient storage such as cloud storage which enables more security, availability and accessibility of patients’ records. Actually, the increase of availability of E-PHR enhances parallel access, which improves the performance…
Read MoreOrganizational, Social and Individual Aspect on Acceptance of Computerized Audit in Financial Audit Work
Auditors now can no longer rely on the old-fashioned way of auditing manually. More and more jobs, increasingly complex work environment, the demands of the times, accuracy and speed of work require auditors inevitably must adopt technology. This research began with our success as academics in the audit family. Related to Indonesia, a large country…
Read MorePerformance Effects of Algorithmic Elements in Selected MANETs Routing Protocols
Over time, several routing protocols have been suggested for use in Mobile Ad Hoc Networks (MANETs). Because of availability of so many MANETs routing protocols, network engineers and administrators face difficulties in identifying an appropriate routing protocol for a particular scenario. This challenge results from the unavailability of adequate technical analytic studies designed to examine…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreEvolution of Privacy Preservation Models in Location-Based Services
Location-based services have become increasingly prevalent with the advancement in the positioning capabilities of smart devices and their emergence in social networking. In order to acquire a service, users must submit their identity, query interest and location details to service providers. Such information shared by users are accumulated continuously, stored and analyzed in order to…
Read MoreA Harmonized European Drone Market? – New EU Rules on Unmanned Aircraft Systems
The European drone market has been showing steady growth year after year. New EU drone rules will come into force as of July 1st, 2020, with the European Union setting itself the target to replace national rules with a common regulation with the ultimate goal of creating a harmonized European drone market. This study will…
Read MorePersonality Measurement Design for Ontology Based Platform using Social Media Text
Human behavior quantification is an essential part of psychological science. One of the cases is measuring human personality. Social media provide rich text, which can be beneficial as a data source to get valuable insight. Previous researches show that social media offered favorable circumstances for psychological researchers by tracking, analyzing, and predicting human character. In…
Read MoreExperimental Studies of the Silicon Photomultiplier Readout Electronics Based on the Array Chip МН2ХА030
The experimental findings of the main units of readout electronics of silicon photomultipliers (SiPMs) based on array chip (AC) МН2ХА030: a charge-sensitive amplifier (CSA) with an adjustable conversion factor and a base line restorer (BLR) circuit and two types of voltage comparators are considered. The electrical circuits of the units, the measurement results of static…
Read MoreUniversity Students Result Analysis and Prediction System by Decision Tree Algorithm
The main assets of universities are students. The performance of students plays a vital role in producing excellent graduate students who will be the future viable leader and manpower in charge of a country’s financial and societal progress. The purpose of this research is to develop a “University Students Result Analysis and Prediction System” that…
Read MoreAlternative Real-time Image-Based Smoke Detection Algorithm
Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…
Read MoreImprovement of Desirable Thermophysical Properties of Soybean Oil for Metal Cutting Applications as a Cutting Fluid
Vegetable oils are often proved to be promising for industrial lubrication applications among which soybean oil found to be better due to its attractive and desirable thermo physical properties for machining compared to other vegetable oils. However, already it was established that influenced desirable thermophysical properties necessary for a vegetable oil through which better machining…
Read MoreSocioeconomic and Productive Disparity in Child Stunting in the Central Andes of Peru, Taking as a Model the Community of Tunanmarca, Jauja
The differences of stunting through socio-economic and productive indicators in high Andean community of Peru were evaluated ((11°42′58.16′′ S, 75°37′31.13′′ W, altitude 3470 m). Cross-sectional study in 52 mothers with children under 5 years old was carried. A validated nutritional survey was applied. Z-scores height for age and nutritional status were determined using anthropometric methods…
Read MorePerformance Analysis of Joint Precoding and Equalization Design with Shared Redundancy for Imperfect CSI MIMO Systems
Analytical researches on a potential performance of multipath multiple-input multiple-output (MIMO) systems inspire the development of new technologies that decompose a MIMO channel into independent sub-channels on the condition of constrained transmit power. Moreover, in current studies of inter-symbol interference (ISI) MIMO systems, there is an assumption that channel state information (CSI) at receivers and/or…
Read MoreNon Parallelism and Cayley-Menger Determinant in Submerged Localization
This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…
Read MoreAnalysis and Improvement of an Innovative Solution Through Risk Reduction: Application to Home Care for the Elderly
The increase in the number of elderly people requires multiple efforts to maintain their well-being and health. A wide variety of products and services have been created to enable seniors to live at home for as long as possible. The market success of these solutions depends on acceptance by the different stakeholders. Older people are…
Read MoreA Perturbation Finite Element Approach for Correcting Inaccuracies on Thin Shell Models with the Magnetic Field Formulation
This research makes the improvement of the errors surrounding edges and corners of thin electromagnetic regions by means of the magnetic field finite element formulation. Classical thin shell electromagnetic models are usually replaced by impedance-type interface conditions throughout surfaces that ignore errors in the calculation of the local fields (magnetic vector potentials, magnetic fields, eddy…
Read MoreDigestibility, Digestible and Metabolizable Energy of Earthworm Meal (Eisenia Foetida) Included in Two Levels in Guinea Pigs (Cavia Porcellus)
The increasing cost of fishmeal and soybean meal forces us to look for unconventional sources of protein to feed guinea pigs, being able to use earthworm meal Eisenia foetida (EF) with 60-80% high quality raw protein; for this, the contribution of digestible nutrients and metabolizable energy must be known to formulate rations. The objective is…
Read MorePiezoelectric Teeth Aligners to Accelerate Orthodontics Treatment
In this paper, we are proposing a device that generates vibration to possibly reduce the duration required for the orthodontic treatment by enhancing the tooth movement. This is achieved by harmonically exciting a bio-compatible material, namely polyvinylidene fluoride (PVDF) to generate vibration and consequently a cyclic force at a low frequency of 30 Hz. (PVDF)…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreFactors Influencing Social Knowledge Management in Social Society: A Systematic Literature Review
Knowledge is important now for the development of social society; it is necessary for knowledge management. Knowledge management (KM) aims to support the creation, transfer, and application of knowledge in social societies. This fact illustrates that in the management of social knowledge, the role of social communities is very important and is influenced by factors…
Read MoreAutomated Abaca Fiber Grade Classification Using Convolution Neural Network (CNN)
This paper presents a solution that automates Abaca fiber grading which would help the time-consuming baling of Abaca fiber produce. The study introduces an objective instrument paired with a system to automate the grade classification of Abaca fiber using Convolutional Neural Network (CNN). In this study, 140 sample images of abaca fibers were used, which…
Read MoreMachine Learning Model to Identify the Optimum Database Query Execution Platform on GPU Assisted Database
With the current amount of data nowadays, the need for processing power has vastly grown. By relying on CPU processing power, current processing power is depending on the frequency and parallelism of the current CPU device. This means this method will lead to increased power consumption. Current research has shown that by utilize the power…
Read MoreEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreA Review on Autonomous Mobile Robot Path Planning Algorithms
The emerging trend of modern industry automation requires intelligence to be embedded into mobile robot for ensuring optimal or near-optimal solutions to execute certain task. This yield to a lot of improvement and suggestions in many areas related to mobile robot such as path planning. The purpose of this paper is to review the mobile…
Read MoreStudy of Wrinkling and Thinning Behavior in the Stamping Process of Top Outer Hatchback Part on the SCGA and SPCC Materials
The objective of the research is to determine the changes in wrinkling and thinning behavior in the stamping process of the top outer hatchback. The study was conducted using two types of materials, i.e., SCGA (Steel Cold rolled Galvanized Annealed) and SPCC (Steel Plate Cold rolled Coiled) with a thickness of 0.80 mm. During the…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreEnhanced Collaborative Constellation for Visible Light Communication System
Visible light communication (VLC) that simultaneously gives illumination and information transmission abilities, is recognized as a hopeful competitor for prospective wireless net- works. Furthermore, a channel adaptive collaborative constellation (CASCC) with the capacity of adapting according to the channel condition to enhance the bit error rate (BER) while concurrently improving the versatility of the receiver…
Read MoreTrajectory Tracking Control of a DC Motor Exposed to a Replay-Attack
This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…
Read MoreDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreAngular Orientation of Steering Wheel for Differential Drive
Several drive mechanisms for different robots are at hand in current days. Bicycle steering, Ackerman steering, differential drive are some principal drive mechanisms that are being deployed in robots these days. The differential drive needs the wheel rotations to be updated very frequently. But it is most commonly deployed on the robots with two wheels…
Read MoreController Design Using Backstepping Algorithm for Fixed-Wing UAV with Thrust Vectoring System
This paper describes the design method of a nonlinear flight controller for a fixed-wing UAV with a thrust vectoring system (TVS) using the backstepping method. The flight dynamics of the UAV exhibits strong nonlinear coupling behavior between its translational and rotational motion. The backstepping algorithm has been successfully applied to controller design for such a…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreAnalysis of Local Rainfall Characteristics as a Mitigation Strategy for Hydrometeorology Disaster in Rain-fed Reservoirs Area
The Gembong reservoir in Pati Regency, Java, Indonesia is a rain-fed reservoir, which experiences a depletion of it carrying capacity. The characteristic of local rainfall is one of the important factors in assessing the potential of hydrometeorology disasters in its area. Sedimentation in watersheds and reservoirs has covered water sources, so local rainfall determines the…
Read MoreMultimode Control and Simulation of 6-DOF Robotic Arm in ROS
The paper proposes the design and simulation of a 6 Degree of Freedom (DOF) robotic arm, tailored for the coconut crop harvesting, assistive robots like wheelchairs and Home robots, Search and rescue robots for disastrous environments, Collaborative robots for research use. A kinematics-based solution has been developed for the robotic arm which makes it easier…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreANN Based MRAC-PID Controller Implementation for a Furuta Pendulum System Stabilization
Nowadays, process automation and smart systems have gained increasing importance in a wide variety of sectors, and robotics have a fundamental role in it. Therefore, it has attracted greater research interests; among them, Underactuated Mechanical Systems (UMS) have been the subject of many studies, due to their application capabilities in different disciplines. Nevertheless, control of…
Read MoreBalance as One of the Attributes in the Customer Segmentation Analysis Method: Systematic Literature Review
The banking industry is very competitive. To utilize the information, they have in order to be a competitive advantage winner is reasonably very crucial for the company. At present, the company does not only focus on the company’s strategy that prioritizes products (e.g. product or service oriented), however also necessitates to focus on the company’s…
Read MoreEstimation of Influential Parameter Using Gravitational Search Optimization Algorithm for Soccer
Competitive sport has one phenomenal or fundamental aspect of selecting players into playing squad for a game that can influence a Club or a team in almost all major aspects. Various Characteristics or behavioral aspects of players will be instrumental towards the selection of a specific player into a team depending on the nature, level,…
Read MoreSentence Retrieval using Stemming and Lemmatization with Different Length of the Queries
In this paper we focus on Sentence retrieval which is similar to Document retrieval but with a smaller unit of retrieval. Using data pre-processing in document retrieval is generally considered useful. When it comes to sentence retrieval the situation is not that clear. In this paper we use TF-ISF (term frequency – inverse sentence frequency)…
Read MoreDesign and Optimization of Dual-Band Branch-Line Coupler with Stepped-Impedance-Stub for 5G Applications
This paper presents a design optimization of a dual-band branch-line coupler with stepped-impedance-stub lines. This coupler operates over 5G NR frequency bands n5 and n2, developed by 3GPP for the 5G (fifth generation) mobile network, and these two bands are centered at 0.85 GHz and 1.9 GHz respectively. To achieve the design specifications an adjusted…
Read MoreA Survey on Image Forgery Detection Using Different Forensic Approaches
Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…
Read MoreA Model for Operationalizing the Information Technology Strategy Based on Structuration View
Many organisations adopt and implement information technology (IT) but fail to operationalise it. As a result, the process of implementation is continually repeated without achieving the goals and objectives, which are often to gain competitive advantage and sustainability. This study employs structuration theory as lens to examine and understand the factors that influence operationalisation of…
Read MoreApplications of Causal Modeling in Cybersecurity: An Exploratory Approach
Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…
Read MoreRacial Categorization Methods: A Survey
Face explicitly provides the direct and quick way to evaluate human soft biometric information such as race, age and gender. Race is a group of human beings who differ from human beings of other races with respect to physical or social attributes. Race identification plays a significant role in applications such as criminal judgment and…
Read MoreEnhancing Decision Making Capabilities in Humanitarian Logistics by Integrating Serious Gaming and Computer Modelling
The field of humanitarian logistics has in recent times gained an increasing attention from both academics and practitioners communities alike. Although various research groups have addressed theoretical and technical developments in humanitarian logistics using conventional research tools, applied research appears to be often dependent on practitioners’ inputs. This paper is an attempt to fill the…
Read MoreA Framework for Measuring Workforce Agility: Fuzzy Logic Approach Applied in a Moroccan Manufacturing Company
In today’s Moroccan business environment, companies need to implement organization agility by developing an agile workforce that is able to deal with the environment volatility. Thus, the agile workforce concept has been appeared as a necessary and sufficient condition to achieve agility. Focusing on agile enablers influencing workforce agility is an important area but currently…
Read MoreThe Design of an Experimental Model for Deploying Home Area Network in Smart Grid
In the smart power grid, designing an efficient and reliable communication architecture has an important role in improving efficiency, and maintaining the connectivity of different network components. The home area network (HAN) provides an energy management system in houses since it enables home energy control and monitoring. So, it is imperative to determine a HAN…
Read MorePrognosis of Failure Events Based on Labeled Temporal Petri Nets
To reduce the risk of accidental system shutdowns, we propose to control system developers (supervisor, SCADA) a prediction tool to determine the occurrence date of an imminent failure event. The existing approaches report the rate of occurrence of a future failure event (stochastic method), but do not provide an estimation date of its occurrence. The…
Read MorePerformance of Robust Confidence Intervals for Estimating Population Mean Under Both Non-Normality and in Presence of Outliers
We proposed two robust confidence interval estimators, namely, the median interquartile range confidence interval (MDIQR) and the trimean interquartile range confidence interval (TRIQR) for the population mean (µ) as an alternative to the classical confidence interval. The proposed methods are based on the asymptotic normal theorem (ANT) for the sample median (MD) and the sample…
Read MoreA Solution Applying the Law on Road Traffic into A Set of Constraints to Establish A Motion Trajectory for Autonomous Vehicle
With a model predictive control approach and to set the motion trajectory for an autonomous vehicle in situations where emergency braking cannot be performed, in this paper, we propose a solution to apply the law on road traffic into a set of constraints and thereby build an objective function to create motion trajectory for autonomous…
Read MoreDegradation Process in Pipeline and Remaining Useful Lifetime Estimation Based on Extended Kalman Filtering
Degradation measurements are often treated and analyzed for improvement the reliability of system. Our objective in this paper is to study a class of non linear systems, whose dynamics and observations are non linear functions of the state. Obviously, we develop an Extended Kalman Filtering (EKF) algorithm for detecting the additive failures in a two…
Read MoreSpot Toyota: Design and Development of a Mobile Application for Toyota’s Promotion Actions to the Young Audience
This project aims to demonstrate the importance that digital media can have to the development of loyalty programs, namely in creating empathy and proximity relationships between brands and their target audience: young people. This study consisted of the creation of a digital platform for Toyota Portugal, named Spot Toyota, to communicate actions promoted by the…
Read MoreMonte Carlo Estimation of Dose in Heterogeneous Phantom Around 6MV Medical Linear Accelerator
In this work, we completed a validation of the Varian Clinac IX equipped with the High Definition Multi-Leaf Collimator (HD 120 MLC) instead of the removable jaws, using GATE Monte Carlo Platform version 8.2. We validated the multileaf collimator (MLC) geometry by simulating two dosimetric functions (Percentage Depth Dose (PDD) and Dose Profile (DP)), for…
Read More5G mm-wave Band pHEMT VCO with Ultralow PN
Oscillator phase noise (PN) has a strong impact on the spectral purity of the RF signal in wireless systems and is, therefore, a main challenge when designing a local oscillator. In this paper, we propose a new approach for designing a low PN oscillator based on the Time-Invariant Linear Model of phase noise. It leads…
Read MoreSmart Transmission Line Maintenance and Inspection using Mobile Robots
The paper presents sharing several of experiences and practices on smart robotic application for overhead transmission line maintenance and inspection. First, the pilot-line pulling robot is an invention used to pull a pilot line which is an important step for additional high voltage conductor installation. The puller robot can traverse the overhead ground wire, OHGW,…
Read MoreMeasurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia
The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…
Read MoreThe Application of Mobile Learning Technologies at Malaysian Universities Through Mind Mapping Apps for Augmenting Writing Performance
21st century learning focuses on the flow of information, media, and technology. In Malaysia, many university students face problems in English writing. Thus, students should be exposed to the technology training in innovative ways to produce students with a dynamic in this ever-changing world. Recently, the transformation and the evolution of mobile have created a…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreBusiness Process Design for Widuri Indah School Management System with the Support of Cloud Computing
This study aims to design business processes or school management solutions that are right for the school. Widuri Indah School is private school that has not been integrated with the school management system. Qualitative method such as observation and interview are conducted to gain insights about main activities and support activities in Widuri Indah school…
Read MoreEfficiency Enhancement of p-i-n Solar Cell Embedding Quantum Wires in the Intrinsic Layer
A high efficiency InAs/GaAs quantum wire solar cell is modelled embedding periodic array of InAs quantum wires (QW) in the intrinsic layer. The promising low dimensional heterostructure such as Quantum Wells, Quantum Wires, Quantum Dots or Dashed (elongated Dots) based intermediate-band-gap solar cells are recently being grasped the attention for ongoing third generation solar cell…
Read MoreEfficient Discretization Approaches for Machine Learning Techniques to Improve Disease Classification on Gut Microbiome Composition Data
The human gut environment can contain hundreds to thousands bacterial species which are proven that they are associated with various diseases. Although Machine learning has been supporting and developing metagenomic researches to obtain great achievements in personalized medicine approaches to improve human health, we still face overfitting issues in Bioinformatics tasks related to metagenomic data…
Read MoreDynamics Model and Design of SMC-type-PID Control for 4DOF Car Motion Simulator
4-DOF car motion simulator helps to simulate real-life experiences that drivers do not have the opportunity to access the real environment. The dynamics equation of 4-DOF car motion simulator is a very complex problem with many uncertain parameters, so it requires intelligent control algorithms. Sliding mode controller (SMC) can achieve good tracking performance and robustness…
Read MorePromotion of the Research Activities at the Image Processing Research Laboratory (INTI-Lab) of the UCH as Knowledge Management Strategy
In Peru, approximately since 2013, a necessary change has begun in the importance given to research, science, technology, and technological innovation. Likewise, in 2014, a new University Law was approved that among other aspects also promotes research production in universities. Against this context, the universities begin to improve with more emphasis activities related to research.…
Read MoreA Fuzzy-PID Controller Combined with PSO Algorithm for the Resistance Furnace
The paper presents a novel control strategy applying the particle swarm optimization (PSO) algorithm to optimize the scaling weights coefficients of the fuzzy-PID controller for the resistance furnace temperature control system, called PSO-based fuzzy-PID controller/ algorithm. The proposed PSO-based fuzzy-PID controller in this paper consist of the fuzzy-PID controller and the PSO algorithm. The proposed…
Read MoreWarehouse Relocation of a Company in the Automotive Industry Using P-median
To have enough information on time can be helpful when companies try to reduce costs and operate more efficiently. An international company that supplies parts for the automotive industry is currently testing its new facilities in Mexico. The relocation of the raw materials and finished goods warehouses were tested using a P-Median model. The operating…
Read MoreSolutions for Building a System to Support Motion Control for Autonomous Vehicle
With a model predictive control approach including boundary analysis and uncertain prediction of activities of different road participants, this paper proposes solutions that support motion control by steering control and appropriate acceleration to create safe motion trajectories for an autonomous vehicle. The motion control support element is determined by the principle of minimal intervention and…
Read More
