77 research outputs found

    A critical review of MANET testbed using mobile robot technology

    Get PDF
    This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in this paper, we study the topic and presents it as a critical review that dwells into four aspect, namely (i) purpose, a ccessibility and s cope of testbed facilities, (ii) usability and c ontrollability of robot mobility in t estbed facilities, (iii) repeatability and r e producibility of real m obility in t estbeds, and (iv) tools for MANET implementation, deployment and d ebugging for experiments. With the wealth of information on the topic provided in this paper, the content of this paper is expected to be a source of reference for MANET researchers who are at a crossroad when selecting the preferred mobi le robot technology and approach to sui t thei r own speci f ic needs

    A critical review of MANET testbed using mobile robot Technology

    Get PDF
    This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in this paper, we study the topic and presents it as a critical review that dwells into four aspect, namely (i) purpose, a ccessibility and s cope of testbed facilities, (ii) usability and c ontrollability of robot m obility in t estbed facilities, (iii) repeatability and r e producibility of real m obility in t estbeds, and (iv) tools for MANET implementation, deployment and d ebugging for e xperiments. With the wealth of information on the topic provided in this paper, the content of this paper is expected to be a source of reference for MANET researchers who are at a crossroad when selecting the preferred mobile robot technology and approach to suit their own specific needs

    Hispano-Arabic Poetry, the Provencal Medium, and Middle English Lyrics: Some Similarities in Their Metrical Patterns, Motifs, Imagery, and Phraseology

    Get PDF
    In this paper I advance the thesis that certain aspects of HispanoArabic poetry have influenced Medieval English poetry principally by way of the Proven9al poetry of the troubadours and of other European poetries. Although extensive studies have been published on the Arabic theory on the genesis of European vernacular poetry as well as on the influence of the troubadours on Medieval English poetry, no serious study, as far as I can ascertain, has been published showing the link between Hispano-Arabic and Middle English poetry. This thesis, I hope, should make a specific contribution to the field of comparative studies in Medieval European literature by demonstrating that some Hispano-Arabic elements can be seen in Middle English lyrics. Theďż˝ thesis first discusses the impact of Medieval Arabic culture on Medieval Europe and the means through which the transmission of Arabic knowledge was effected. In it I review the theories on the origins of Romance vernacular poetry and of the courtly love tradition and examine the characteristics of Hispano-Arabic poetry, showing its influence on Romance vernacular poetries, especially on the Proven9al. I also discuss the influence of Provencal poetry on European Medieval poetries including Middle English poetry. Finally, in light of the foregoing discussions, I demonstrate the similarities in metrical patterns and in the motifs, imagery, and phraseology between Hispano-Arabic poetry and Middle English lyrics. However, beyond a few general references, the religio~s poetry is not treated in this study. Again, apart from a few illustrations, the poetic works of Chaucer, Gower, Lydgate, Skelton, and Dunbar are not examined. Such writers need an analysis beyond the scope of this effort. As the study stands, some repetitions of ideas and jargon still appear. Also, apart from the verses reproduced from the English translations of Arabic poetry, I take the responsibility for any deficencies in the few translations I made. For transliteration and unless quoting, I followed the system used by American scholarly journals. In the case of proper names and place names, I used the generally accepted forms in current English scholarship. Some of the words, such as Hispano-Arabic and Andalusian, are used interchangeably. I also normalized medieval English spelling to some extent. For example, the letter (y) is used instead of the yogh (3).Englis

    Relationship Between Students’ Learning Outcomes in WAEC and NECO Arabic Language Examinations in North-Central Nigeria

    Get PDF
    Despite the fact that the certificates being awarded by senior school WAEC and NECO are said to be comparable, yet, stakeholders in the education sector doubt their correspondence in terms of students’ learning outcomes. While some students only register for NECO believing that they could not pass WAEC. This was part of what necessitated this study by determining the correspondence between students’ learning outcomes in senior school WAEC and NECO Arabic Language examinations in North-central from 2015 to 2019 academic sessions. This study was a descriptive study of the correlational type. Only the results of candidates that sat for WAEC and NECO Arabic Language examinations were logically selected for this study via a researcher-designed proforma. Thus, 948 students constituted the sample size for this study using a multistage sampling procedure. Data collected were analyzed using the percentage to answer the research questions while the Pearson’s chi-square at 0.05 alpha level was used to test the hypotheses. Findings indicated that a significant association existed between students’ learning outcomes in WAEC and NECO Arabic examinations in North-central Nigeria. It was therefore recommended that teachers of Arabic should work harder to sustain their students’ performance in Arabic Language

    Visualization representation benefits of pre-requirement specification tractability

    Get PDF
    Representation of Pre-RST information is very useful using visualization elements for realization of benefits of requirements tractability This improves the practitioners motivation to maintain Pre-RST information during life cycle processes. Few researchers proposed visualization for post-RST due to which many benefits of requirements tractability cannot be realized. This paper proposed an important visualization representing Pre-RST information that demonstrate various benefits of requirements tractability. In order to evaluate empirically an experiment is conducted and textual representation of tractability information is obtained. In order to strengthen our claim a survey is conducted to compare textual representation of tractability information with proposed visualization and results are compiled

    Determination of tool wear drilling process of aluminum 6061 and brass C3604 by using CNC robodrill machine

    Get PDF
    Hole making process is a stimulating process as it impacts the drilling tool's performance and wear. The main objective of this paper is to determine the drilling tool wear by using step-by-step drilling approaches used by most of the manufacturing companies. Two types of materials involved; Aluminum 6061 & Brass C3604. Firstly, the raw material grade was confirmed by testing it using an Oxford Spectrometer. Four types of drilling tools are used; center drill diameter 3.00 mm; drill diameter 10.00, 13.00 and 14.50 mm. The drilling tool material used is High-Speed Steel (HSS). The cutting parameter used is stated in detail in the methodology section. Two approach are used to determine the tool life; measuring the holes diameter produced by using Vernier caliper; graphical form with the help of the camera. The major finding of this research is the understanding on how the cutting process react with the drilling tool during the cutting process as discussed in the results and discussions. The tool life of a center drill, drilling tool diameter 10.00 mm, 13.00 mm and 14.50 mm in drilling Aluminum 6061 is 476, 250, 485 and 499 holes while for Brass C3604 is 360, 190, 360 and 375 holes

    A Review on mobile SMS Spam filtering techniques

    Get PDF
    Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable nuisance to the mobile subscribers. This marketing practice also worries service providers in view of the fact that it upsets their clients or even causes them lose subscribers. By way of mitigating this practice, researchers have proposed several solutions for the detection and filtering of SMS spams. In this paper, we present a review of the currently available methods, challenges, and future research directions on spam detection techniques, filtering, and mitigation of mobile SMS spams. The existing research literature is critically reviewed and analyzed. The most popular techniques for SMS spam detection, filtering, and mitigation are compared, including the used data sets, their findings, and limitations, and the future research directions are discussed. This review is designed to assist expert researchers to identify open areas that need further improvement

    Analyzing Autoencoder-Based Intrusion Detection System Performance

    Get PDF
    The rise in cyberattacks targeting critical network infrastructure has spurred an increased emphasis on the development of robust cybersecurity measures. In this context, there is a growing exploration of effective Intrusion Detection Systems (IDS) that leverage Machine Learning (ML) and Deep Learning (DL), with a particular emphasis on autoencoders. Recognizing the pressing need to mitigate cyber threats, our study underscores the crucial importance of advancing these methodologies. Our study aims to identify the optimal architecture for an Intrusion Detection System (IDS) based on autoencoders, with a specific focus on configuring the number of hidden layers. To achieve this objective, we designed four distinct sub-models, each featuring a different number of hidden layers: Test 1 (one hidden layer), Test 2 (two hidden layers), Test 3 (three hidden layers), and Test 4 (four hidden layers).We subjected our models to rigorous training and testing, maintaining consistent neuron counts of 30 and 60. The outcomes of our experimental study reveal that the model with a single hidden layer consistently outperformed its counterparts, achieving an accuracy of 95.11% for NSL-KDD and an impressive 98.6% for CIC-IDS2017. The findings of our study indicate that our proposed system is viable for implementation on critical network infrastructure as a proactive measure against cyber-attacks

    Bunga rampai sejarah lokal kerawanan sosial dalam perspektif sejarah

    Get PDF
    Tulisan yang dirangkum dalam buku ini berasal dari kumpulan hasil Lokakarya yang dilakukan oleh Direktorat Sejarah dan Nilai Tradisi pada bulan November 2000 yang bertemakan "Sejarah Lokal: Kerawanan Sosial Dalam Perspektif Sejarah". Pada kesempatan itu ditampilkan 12 pemakalah yang membahas berbagai bentuk kekerasan/kerusuhan yang dilakukan oleh berbagai kelompok atau konflik yang terjadi di berberapa daerah seperti Aceh, Riau, Wamena, Banten, Banjar, Maluku dan Sumatera. ltu semua merupakan pelajaran yang berharga dalam menyikapi adanya perbedaan

    Energy-efficient Virtual Machine Allocation Technique Using Flower Pollination Algorithm in Cloud Datacenter: A Panacea to Green Computing

    Get PDF
    Cloud computing has attracted significant interest due to the increasing service demands from organizations offloading computationally intensive tasks to datacenters. Meanwhile, datacenter infrastructure comprises hardware resources that consume high amount of energy and give out carbon emissions at hazardous levels. In cloud datacenter, Virtual Machines (VMs) need to be allocated on various Physical Machines (PMs) in order to minimize resource wastage and increase energy efficiency. Resource allocation problem is NP-hard. Hence finding an exact solution is complicated especially for large-scale datacenters. In this context, this paper proposes an Energy-oriented Flower Pollination Algorithm (E-FPA) for VM allocation in cloud datacenter environments. A system framework for the scheme was developed to enable energy-oriented allocation of various VMs on a PM. The allocation uses a strategy called Dynamic Switching Probability (DSP). The framework finds a near optimal solution quickly and balances the exploration of the global search and exploitation of the local search. It considers a processor, storage, and memory constraints of a PM while prioritizing energy-oriented allocation for a set of VMs. Simulations performed on MultiRecCloudSim utilizing planet workload show that the E-FPA outperforms the Genetic Algorithm for Power-Aware (GAPA) by 21.8%, Order of Exchange Migration (OEM) ant colony system by 21.5%, and First Fit Decreasing (FFD) by 24.9%. Therefore, E-FPA significantly improves datacenter performance and thus, enhances environmental sustainability
    • …
    corecore