The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We describe a methodology to detect semantic errors from Bangla sentences. According to Bangla grammar, a single verb can have many forms depending on its tense and person of its subject. The subject of a sentence can be noun or pronoun, may indicate human, animal, or any non-living entity. There is a fixed semantic relation between every verb and subject and object of a sentence. For example, a non-living...
Bangla-2-Braille machine translator is implemented using rule based Discrete Finite Automata (DFA) [1]. Rule based DFA directs the necessity of generating regular expression from the DFA in order to validate the language model used for Braille conversion and extend the translator for better usability by the visually impaired people. In this work, we conducted experiments using structured and state...
The demographics of the modern day student (shorter attention span, multimodal access to learning resources, growing reliance on technology) and highlighted concerns of the traditional teaching methods, such as a lecture, demonstrate a need for a more innovative teaching practice. The traditional lecture in higher education is often delivered in single-directional ‘transmission’ style with the information...
Although valuable crime information is available in human-readable form in online newspapers and electronic archives, software systems that can extract and present relevant information are limited and are of significant interest to researchers in the field of information extraction. This work aims to extract available drug crime information from online newspaper articles. This work has the following...
Software development initially used traditional methodologies which have been in the mainstream until the advent of agile methodologies. It is often thought that as traditional methods would be eventually replaced by new methods, it still remains the closest link to a naturally progressive route although the mind-set wants to get rid of the old and get in with the new. But it is not the replacement...
In open multi-agent systems, agents may hide or lie about information regarding some events. In order to avoid such deception, a multi-agent system must be designed to test the confidence of agents. In this paper, we present a new approach to agent-based confidence modeling. This approach integrates two confidence requirements, namely, trust and certainty. We use fuzzy logic in representing the importance...
Presently, traffic is a serious problem in Epifanio Delos Santos Avenue (EDSA) cause by increasing work force and increasing number of vehicles [1]. Manual scheduling of buses became inefficient and this was proven by the unbalance number of bus and overcrowded passengers in different points of service, it also affect the bus carrier's profit. This research aims to model a new way of schedule pattern...
This study presents the development of a fuzzy logic controller (FLC) for an earthquake simulator or shake table. This includes the use of a Programmable Logic Controller (PLC) as the main controller and the Variable Frequency Drive (VFD) as the motor's inverter drive. Combination of ladder logic diagrams (LLD), structured texts (ST) and function block diagrams (FBD) were used to code the fuzzy program...
This paper presents the design of a transportable solar concentrating and tracking parabolic trough reflector that gathers higher energy yield in its photovoltaic (PV) module using the concept of the Cassegrain antenna system wherein the sun's rays are dashed to the structure's primary and secondary reflector before they are converged to the polycrystalline solar panel located at the trough's focus...
This paper presents aggregation behavior algorithm that will be applied for unmanned aerial vehicle quadrotors (QUAV). The most basic behavior for natural swarms is aggregation. Other swarm or social behaviors are derived from the aggregation behavior. Due to the concept of independence, each swarm members are required to collect themselves together to perform a certain task. However the swarm faces...
Effective in-vehicle icons are used to convey quick and complete understanding of information to drivers for safe driving; however, misunderstood icons may result to worse. Former studies were able to point out the ineffectiveness (in terms of matching accuracy) of non-ISO vehicle icons. This study was conducted to fill in the gap in literature that addresses the need for redesigning ineffective non-ISO...
In pursuit of finding a more suitable way of drying microalgae that would require less energy input which will consequently lessen the production cost, a study was conducted to investigate the migration of water molecules across a cell membrane of microalgae. Molecular Dynamics simulations using GROMACS software were utilized to obtain a molecular model of a cell membrane. The membrane model was composed...
One of the significant factor of privacy is the source of sound. It creates the level that determines the effectiveness of the other factor. To experience maximum privacy, cancelling of unwanted sound is necessary. To automate the design of sound masking, this proposal use Genetic Algorithm and Artificial Neural Network (SMUGAAN). By evolutionary method two stages are use: a) to determine the target...
The emergence and improvement of wearable low cost sensors gives way to an improved patient rehabilitation from impairment such as those caused by accidents or stroke. We have developed a digital motion sensing system that uses accelerometers and gyroscopes worn by the patient, and enables the rehab session to be recorded visually using a high-FPS camera. Through collaboration with interns and licensed...
Although mobile devices are ubiquitous on university campuses, teacher-readiness for mobile learning has yet to be fully explored in the non-western nations. This study shows that two main factors affect the adoption and use of m-learning among female teachers within a university in Saudi Arabia—resistance to change and perceived social culture. These determinants of the current use and intention...
Transferring information between nodes in this digital era has been made it easy for users to communicate. Sensitive data, however, requires protection during transmission to prevent unauthorized users from exploiting it. In this paper, we propose to hide secret data by developing emoticon-based steganography. Here, the data is embedded to the emoticon which is sent along with the cover text via chatting...
Thai text localization and recognition in natural scenes is still a grand challenge in current applications. However, the efficiency of recognition rates depends on text localization, i.e., the higher purity of text-background decomposition leads to the higher accuracy rate of character recognition. In order to achieve this purpose, the text-background decomposition methods, namely adaptive boundary...
The penetration of Wind Turbine Generator (WTG) into the power system has been increasing. As a result, the dynamic characteristic of WTG should be carefully studied to see its effect to the power system. This paper presents the dynamic study of fixed-speed WTG connected to the grid. The one-mass and two-mass shaft model are incorporated into the study to see their effect on the system dynamic. The...
Repeat-Accumulate Codes (RAC) are one of alternative choice code besides turbo codes and low-density parity-check (LDPC) codes. This paper presented decode-and-forward protocol for wireless relay channel by utilizing repeat-accumulate codes as the coding scheme in the relay. The main advantages of the RAC over another code that makes the RAC is more considered for this research are the complexity...
In today's society, our life has fully stepped into the computer information age, and various kinds of multimedia equipments have been closely linked with our life. With the continuous development of the information society, the computer information technology has an important influence in the education field. How to combine college teaching with information technology and realize the coordinated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.