Science topic

Computer Engineering - Science topic

Explore the latest questions and answers in Computer Engineering, and find Computer Engineering experts.
Questions related to Computer Engineering
  • asked a question related to Computer Engineering
Question
3 answers
IEEE 2024 8th International Conference on Electrical, Mechanical and Computer Engineering (ICEMCE 2024) will be held on October 25-27, 2024 in Xi'an, China.
Conference Website: https://ais.cn/u/baUBfa
---Call for papers---
The topics of interest for submission include, but are not limited to:
· Smart grid
· Heat exchanger
· Computer simulation
· Artificial intelligence (AI)
· Computer modeling
· Mobile computing
· Instruments and meters
· Power and fluid machinery
· Heat and mass transfer
· Laser processing technology
· Wireless sensor networks
· Electric energy processing
· Electromagnetism and photonics
· Power quality and system stability analysis
· Photoelectric effect of semiconductors
· Refrigeration and air conditioning
......
---Publication---
All accepted papers will be submitted to IEEE (ISBN: 979-8-3315-0623-0) for publication, and it will be submitted to IEEE Xplore, EI Compendex and Scopus for indexing.
---Important Dates---
Full Paper Submission Date: September 30, 2024
Registration Deadline: October 18, 2024
Final Paper Submission Date: October 18, 2024
Conference Dates: October 25-27, 2024
--- Paper Submission---
Please send the full paper(word+pdf) to Submission System:
Relevant answer
Answer
I'm interested...
I would appreciate any information regarding key dates. And to know how much is involved.
  • asked a question related to Computer Engineering
Question
2 answers
会议征稿:第四届计算机、物联网与控制工程国际学术会议(CITCE 2024)
Call for papers: 2024 4th International Conference on Computer, Internet of Things and Control Engineering (CITCE 2024) will be held on November 1-3, 2024 in Wuhan, China as a hybrid meeting.
Conference website(English):https://ais.cn/u/IJfQVv
重要信息
大会官网(投稿网址):https://ais.cn/u/IJfQVv
大会时间:2024年11月1-3日
大会地点:中国-武汉
收录类型:EI Compendex,Scopus
会议详情
第四届计算机、物联网与控制工程国际学术会议(CITCE 2024)将于2024年11月1-3日在中国-武汉召开。CITCE 2024将围绕计算机、物联网与控制工程的最新研究领域,为来自国内外高等院校、科学研究所、企事业单位的专家、教授、学者、工程师等提供一个分享专业经验、扩大专业网络、展示研究成果的国际平台,以期推动该领域理论、技术在高校和企业的发展和应用,也为参会者建立业务或研究上的联系以及寻找未来事业上的全球合作伙伴。大会诚邀国内外高校、科研机构专家、学者,企业界人士及其他相关人员参会交流。
征稿主题
1. 计算机科学:演算法、图像处理、计算机视觉、机器学习、智能数据分析与数据挖掘、数学和计算机建模、人工智能、神经网络、系统安全、机器人与自动化、信息系统、高性能计算、网路通讯、人机交互、电脑建模等;
2. 物联网:人工智能技术与应用、CPS技术与智能信息系统、物联网环境中的多网资源共享、物联网技术体系架构 、物联网中的云计算与大数据、边缘智能与区块链、智慧城市、物联网可穿戴设备 、智能家居、物联网与传感器技术等;
3. 控制工程:系统和自动化、电气系统、过程控制、工业控制技术、计算机科学与工程、电子工程学、软件工程、控制技术、传感器网络、移动互联网、无线网络和系统、计算机控制系统、自适应和最优控制、智能控制、电气自动化、智能控制和智能系统、智能管理和决策、分布式控制、驱动电机和控制技术、动力电池管理和维护技术、微传感器和执行器、移动机器人等
**其它相关主题均可
会议出版
会议投稿经过2-3位组委会专家严格审核后,最终所录用的论文将被ACM ICPS (ACM International Conference Proceeding Series)(ISBN:979-8-4007-1184-8) 出版论文集,并提交至ACM Digital library,EI Compendex, Scopus检索。目前该会议论文检索非常稳定。
参会方式
1、作者参会:一篇录用文章允许一名作者免费参会;
2、参会类型
(1)口头汇报:10-15分钟的全英PPT演讲;
*开放给所有投稿作者与自费参会人员;针对论文或者论文里面的研究做一个10-15min的英文汇报,需要自备PPT,无模板要求,会前根据会议邮件通知进行提交,详情联系会议秘书。
(2)海报展示:自制电子版海报,会议安排展示;
*开放给所有投稿作者与自费参会人员;格式:全英-A1尺寸-竖版,需自制;制作后提交海报图片至会议邮箱IC_CITCE@163.com,主题及海报命名格式为:海报展示+姓名+订单号。
(3)仅参会:非投稿作者,现场听众参会。
*仅开放给自费参会人员
(4)投稿参会链接:https://ais.cn/u/IJfQVv
Relevant answer
Answer
For more details about the conference, please visit the official website of the conference: https://ais.cn/u/IJfQVv
  • asked a question related to Computer Engineering
Question
6 answers
会议征稿:第七届机械、控制与计算机工程国际学术会议(ICMCCE2024)
Call for papers: IEEE 2024 7th International Conference on Mechanical, Control and Computer Engineering (ICMCCE 2024), organized by Chaohu University and Shenyang Ligong University will be held in Hangzhou during October 25 to 27, 2024.
Conference website(English):https://ais.cn/u/IrMvmq
重要信息
大会官网(投稿网址):https://ais.cn/u/IrMvmq
大会时间:2024年10月25-27日
大会地点:中国杭州
收录类型:EI Compendex,Scopus
主办单位:巢湖学院
会议详情
第七届机械、控制与计算机工程国际学术会议定于2024年10月25日至27日在中国杭州召开。本届会议由巢湖学院主办,主要围绕“机械”、“控制”与“计算机工程”等研究领域展开讨论。旨在为机械、控制与计算机工程方面的专家学者及企业发展人提供一个分享研究成果、讨论存在的问题与挑战、探索前沿科技的国际性合作交流平台。欢迎海内外学者投稿和参会。
会议征稿主题(包括但不限于)
1、机械工程
2、自动化及控制工程
3、计算机工程
4、电子和通信技术
更多相关主题请查看官网
论文出版
本次会议投稿论文都须经过2-3位组委会专家审稿,最终录用的论文将提交出版,见刊后提交至 EI Compendex、Scopus检索,目前该出版社EI检索非常稳定。往届会议已被EI检索!
投稿参会方式
所有参会人员均可申请报告或海报展示,可开具证明
1、作者参会:录用文章允许一位作者免费参会
① 申请听众参会,无需准备报告或海报;
② 申请口头报告,时间为15分钟,PPT&报告语言为英文;
③ 申请海报展示,A1尺寸,彩色打印(自行打印);
2、主讲嘉宾:申请主题演讲,由组委会审核;
3、听众参会:只参会听讲不投稿,也可申请口头报告或海报展示;
4、报名参会:https://ais.cn/u/IrMvmq
Relevant answer
Answer
interested
  • asked a question related to Computer Engineering
Question
3 answers
IEEE 2024 6th International Conference on Electronics and Communication, Network and Computer Technology (ECNCT 2024) will be held in Guangzhou on July 19-21, 2024.
Conference Webiste: https://ais.cn/u/NbyUja
---Call For Papers---
The topics of interest for submission include, but are not limited to:
Communication Technology
Computer Engineering
Network Engineering and Application Technology
Intelligent System
Information Science
Image Processing
Application Technology
6th Generation Networks
Access Networks
Advances in Internet Protocols
Real Time Communication Services
Signal Processing for Communications
Optical Networking
Web Services and Service Oriented Architectures
Electronic control technology
Other Related topics
---Publiation---
All accepted full papers will be published in IEEE (ISBN: 979-8-3503-6614-3) andwill be submitted to IEEE Xplore, EI Compendex, Scopus and Inspec for indexing.
Important Dates:
Full Paper Submission Date: May 5,2024
Registration Date: June 30, 2024
Final Paper Submission Date: : June 30, 2024
Conference Dates: July 17-19, 2024
For More Details please visit:
Relevant answer
Answer
definitely yes
  • asked a question related to Computer Engineering
Question
2 answers
IEEE 2024 4th International Symposium on Computer Technology and Information Science(ISCTIS 2024) will be held during July 12-14, 2024 in Xi’an, China.
Conference Webiste: https://ais.cn/u/Urm6Vn
---Call For Papers---
The topics of interest for submission include, but are not limited to:
1. Computer Engineering and Technology
Computer Vision & VR
Multimedia & Human-computer Interaction
Image Processing & Understanding
PDE for Image Processing
Video compression & Streaming
Statistic Learning & Pattern Recognition
......
2. Information Science
Digital Signal Processing (DSP)
Advanced Adaptive Signal Processing
Optical communication technology
Communication and information system
Physical Electronics and Nanotechnology
Wireless communication technology·
......
All accepted papers of ISCTIS 2024 will be published in conference proceedings by IEEE, which will be submitted to IEEE Xplore,EI Compendex, Scopus for indexing.
Important Dates:
Full Paper Submission Date: June 20, 2024
Registration Deadline: June 25, 2024
Final Paper Submission Date: June 26, 2024
Conference Dates: July 12-14, 2024
For More Details please visit:
Relevant answer
Answer
Thanks for sharing. I wish you every success in your task.
  • asked a question related to Computer Engineering
Question
2 answers
My name is kiranbir kaur and m student of MSC Computer Engineering in Solent University Southhampton (United Kingdom).Please suggest me the topic for dissertation.Include the Problem and Solution.
Relevant answer
Answer
Dear Kiranbir Kaur,
This answer deals with a research area that has been my central one for many decades. I do recommend thinking about and considering working in complex systems. There are many existing research areas that require solid programs as tools to study the properties of complex systems. 
Personally, I do recommend this area as it has a huge potential to work on a vital research problem, which will be interesting to many non-programming researchers. 
Program prototypes of even more advanced software are highly welcomed by many researchers who are not IT specialists. Examples follow. In collaboration with Jakub Tkac during his master degree in IT, the old program on dynamic recrystallization was rewritten into C++ and Qt using OOP. There is quite a huge interest in it in the community of researchers working on metal-forming models. 
Another example is the GoL-N24 software that is used to simulate an extended 'Game of Life' cellular automaton to search for emergents. This is gradually gaining quite some traction and is used to perform research about emergent information processing, which can help bring more light into the functioning of not only biological systems. 
Another vital area of research can be agent-based modeling, network dynamics, bioelectricity of living cells with respect to morphology, and the list goes on. In my review of complex systems in biology and medicine, I have systematically reviewed all major methods on which you can work. 
The best would be to contact some active complex systems researchers and offer cooperation on the development of some software. 
Good luck. :-) 🙏 
  • asked a question related to Computer Engineering
Question
4 answers
Hi,
My name is kiranbir kaur and m student of MSC Computer Engineering in Solent University Southhampton (United Kingdom).Please suggest me the topic for dissertation.Include the Problem and Solution.
Relevant answer
Answer
You are unlikely to get a response to such a question. You must find an area of your research interest. Spend some time on Research Gate looking for papers published in your research area. Focus on recent papers. Collect and read at least 10 papers. You will begin to identify your problem. Take help from your professors if you get stuck. Wish you all the best.
  • asked a question related to Computer Engineering
Question
6 answers
Hi,
My name is kiranbir kaur and m student of MSC Computer Engineering in Solent University Southhampton (United Kingdom).Please suggest me the topic for dissertation.Include the Problem and Solution.
Relevant answer
Answer
something like this:
Title: "Securing IoT Communications: An Investigation into Cybersecurity Threats and Development of a Scalable Secure Communication Protocol"
Introduction:
The Internet of Things (IoT) has revolutionized the way we live and work, with an estimated 20 billion devices expected to be connected by 2025 .....(include citation with its reference). This rapid growth has led to a significant increase in IoT device adoption, with 73% of organizations already using IoT devices (include citation with its reference). However, this growth has also exposed IoT devices to various cyber threats, compromising user data and privacy. In 2021, IoT device attacks increased by 80% compared to the previous year, with 75% of organizations experiencing an IoT security breach (include citation with its reference). The existing security protocols for IoT devices have limitations in terms of scalability, interoperability, and adaptability, making them vulnerable to attacks such as device spoofing, data breaches, and man-in-the-middle attacks. To address this critical issue, this research aims to conduct a comprehensive analysis of IoT security threats and develop a secure communication protocol using encryption, authentication, and access control mechanisms. The proposed protocol will prioritize scalability, interoperability, and adaptability to ensure the security and privacy of IoT devices and their users. By investigating IoT security threats and developing a secure communication protocol, this research aims to contribute to the development of a safer and more secure IoT ecosystem.
Problem Statement:
Internet of Things (IoT) devices have become an integral part of modern life, but their rapid growth and deployment have exposed them to various cyber threats. The existing security protocols for IoT devices have limitations in terms of scalability, interoperability, and adaptability, making them vulnerable to attacks such as device spoofing, data breaches, and man-in-the-middle attacks. This vulnerability compromises user data and privacy, posing significant risks to individuals, businesses, and critical infrastructure.
NOTE
Kindly do not forget to cite your paper and also reference as I was guiding above in the text (include citation with its reference), it is so crucial
  • asked a question related to Computer Engineering
Question
5 answers
I'm a 5th year Electrical Engineering and Computer Engineering student in Democritus University of Thrace in Greece and I have to do a 30-page paper on Wireless Brain-Machine Interface but I don't know how to organize my paper. I don't know in what topics to divide such a big paper. It is a completely new topic, one that we didn't discuss in class so I need some help with this. Any help is appreciated. Thank you in advance for your time.
Relevant answer
Answer
You may want to begin by collecting reference materials first. If you are writing a review paper, try to get about 15 reference papers from reputed journals and conferences. Read these papers and start capturing notes. This will get you started.
  • asked a question related to Computer Engineering
Question
6 answers
Dear colleagues from academia and industry,
dear friends or sansfriends :)
I presented this summer on the "languages" conference the idea of the need for change in the area of English for Computer Science (Computer Engineering etc).
I see a lot of people that are ready to be involved in this actions in Bulgaria and abroad.
So I'm writing this description not to discuss here but to use the community to find out appropriate team (people with values, skills and experience). And I think we can manage this problem with some efforts. In this team I think different type of people are more then welcome (e.g. academics/teachers English/Computer Science/Engineering, students, professionals from IT Industry).
Please reply here in this post (to support me and the initiative) and also register here https://docs.google.com/forms/d/e/1FAIpQLSd2h527OHr6gkdxL5ZAOsJyzQEKaXt-YhW7nNxOAM6aQcvGsg/viewform
My suggestion for the first meeting is December 18, 19 h BG time
To all of registered people I will send a link (Google meet).
Galina Momcheva
Relevant answer
Answer
Sorry (Mr Breuer), I'm not interested in having this dialogue with you anymore!
I expect the people who want to join my initiative to let me know!
  • asked a question related to Computer Engineering
Question
3 answers
Dear Sir,
Could you please  append my research papers depicted in the  web link  https://www.researchgate.net/profile/Jagannath-Dass
to this account of Reseracgate KKIT ?
Best Wishes
With Kind regards
Prof (DR) Jagannath Dass, PhD  IIT Delhi and Professor, Computer Engineering, KIIT University, Bhubaneswar
Relevant answer
Answer
It is valid journals it automatically append else they are not valid ie , Scopus,sci ,
  • asked a question related to Computer Engineering
Question
4 answers
Economists and Industrial Engineering folks
I'll be teaching Engineering Economics to our Electrical and Computer Engineering students this Spring, after a three years break.
Please advise me on the topics/concepts/examples you believe should be stressed on, or any other issues.
Thank you
لطفا اگر توصیه‌ای در رابطه با ارایه بهتر و سودمندتر درس اقتصاد مهندسی برای دانشجویان مهندسی برق و کامپیوتر دارید، با ما در میان بگذارید.
متشکرم
#engineering #economics #engineeringeconomics #teaching #kntu #alirezafereidunian #isosg #feasibilitystudy #economicanalysis
  • asked a question related to Computer Engineering
Question
6 answers
How can I calculate ANOVA table for the quadratic model by Python?
I want to calculathe a table like the one I uploaded in the image.
Relevant answer
Answer
To calculate an ANOVA (Analysis of Variance) table for a quadratic model in Python, you can use the statsmodels library. Here is an example of how you can do this:
#################################
import statsmodels.api as sm
# Fit the quadratic model using OLS (Ordinary Least Squares)
model = sm.OLS.from_formula('y ~ x + np.power(x, 2)', data=df)
results = model.fit()
# Print the ANOVA table
print(sm.stats.anova_lm(results, typ=2))
#################################
In this example, df is a Pandas DataFrame that contains the variables y and x. The formula 'y ~ x + np.power(x, 2)' specifies that y is the dependent variable and x and x^2 are the independent variables. The from_formula() method is used to fit the model using OLS. The fit() method is then used to estimate the model parameters.
The anova_lm() function is used to calculate the ANOVA table for the model. The typ parameter specifies the type of ANOVA table to compute, with typ=2 corresponding to a Type II ANOVA table.
This code will print the ANOVA table to the console, with columns for the source of variance, degrees of freedom, sum of squares, mean squares, and F-statistic. You can also access the individual elements of the ANOVA table using the results object, for example:
#################################
# Print the F-statistic and p-value
print(results.fvalue)
print(results.f_pvalue)
#################################
I hope that helps
  • asked a question related to Computer Engineering
Question
15 answers
I want to express my willingness to collaborate with you on my project, which supports researchers. If you know in Computer Engineering, Computer Science, or Artificial Intelligence
Kindly please send your C.V, including Google Scholar, Scopus, Publons (Web of Science), ORCID, or ResearchGate, to email :
Relevant answer
Answer
Yes, I am ready to collaborate with your domain area
  • asked a question related to Computer Engineering
Question
18 answers
A lot of debate is around these two words. What do you think about these two streams?
Relevant answer
Answer
It depends on the career objectives. If it's more towards the design and building hardware then computer engineering is more relevant. On the other hand, computer science mainly targets those who wish to work in analyzing, designing and developing software systems. Of course, there are always some intersections between both disciplines but they are mainly distinguished this way.
  • asked a question related to Computer Engineering
Question
12 answers
How long does it take to a journal indexed in the "Emerging Sources Citation Index" get an Impact Factor? What is the future of journals indexed in Emerging Sources Citation Index?
Relevant answer
Answer
According to Web of Science, ESCI Journal can be included in Science Citation Index (SCI), Social Science Citation Index (SSCI), or Arts and Humanities Citation Index (AHCI), if they meet "Impact Criteria".
Accordingly, journals are included in Web of Science Core Collection (SCI, SSCI, AHCI, and ESCI) if they meet 2 criteria, namely; 1) Quality 2) Impact. The "Quality criteria" comprises 24 sub-criterion, while the "Impact criterion" consist of 4 sub-criteria.
Hence, any journal captured in ESCI have already meet the quality criteria , therefore the quality criteria is the only requirement for journal to be considered in ESCI. Similarly, any journal on ESCI must wait to meet the "Impact Criteria", which can take time, and may be impossible to be predicted. This is because the Impact Criteria is evaluated according to the number of citations the journal is receiving, the performance of authors who published in the journal before, and the number of cross-references between journals in web of science, etc. Waheed Ur Rehman .
  • asked a question related to Computer Engineering
Question
5 answers
Hi
Do you know a journal or conference for publishing Book review in computer engineering ?
can you suggest me one?
thanks in advance
Relevant answer
Answer
FWIW: I used to submit such book reviews to the "Microelectronics Journal". Admittedly, when I did so was in the mid 1980s, and the editor in chief was my boss. You can probably find somewhere else more appropriate these days, so I will eagerly await how others reply to your question. Good luck.
  • asked a question related to Computer Engineering
Question
6 answers
I wanted to use OMNeT ++, VEINS and SUMO , but I can not install them.
is  it  best to use VANETsim for security and privacy concepts in VANETs .
thank you
Relevant answer
Answer
Is there some simulator that can integrate VANET with blockchain networks?
  • asked a question related to Computer Engineering
Question
5 answers
Dear researchers
I am wondering about journals specializing in engineering and computer science that are:
1-Free of charge
2-Fast acceptance and publication
3- Open Access
4- Scopus or Clarivate indexed
Relevant answer
Answer
  • asked a question related to Computer Engineering
Question
6 answers
Faculty of Computing Should have what are the following departments or suggest anyone you like?
Computer Science
Information Systems / Information Technology
Software Engineering
Computer Engineering
Data Science
Cyber Security
Bioinformatics
Robotics
Relevant answer
Answer
I am not sure what your question is. I think you want to subdivide your faculty in a number of departments and your question is how that should be done. How many staff is there? My experience is that you should burn the candle from two sides. What kind of expertises do you have today? What are your strong positions? The other side is: where do you want to be in say the next 5 to 10 years? It should fit in the strategic plans of the faculty. This strategy depends on funding opportunities and relationships with industry and so on. I hope this
helps you some how.
  • asked a question related to Computer Engineering
Question
8 answers
I know this has no fixed answer. To give the question a direction, what are the best set of feature engg, data validation, data cleaning, feature extraction, feature selection (these cover data-centric approach), image data modeling, language modeling, hyper-parameter opt. and deployment techniques which should be adopted to get optimal models in less number of hit and trials. Answer to this questions demands experience and structuring best yielding methods you've learned till date. This question is open so that different domain experts can give their own views. E.g. A researcher who has extensively worked in NLP can suggest a pipeline which he/she may follow.
Relevant answer
Answer
Good. Generally, the industrialists works for AutoML framework with complete pipeline.
If you want to know more, please visit this site.
  • asked a question related to Computer Engineering
Question
5 answers
Hello,
I have three queries mentioned below:
  1. I have submitted my manuscript around two months ago at "COMPUTERS AND ELECTRICAL ENGINEERING, AN INTERNATIONAL JOURNAL". The average number of weeks to the initial decision is 4-7 weeks (as written on a Journal webpage) and it's been around 11 weeks and still, I have not got any updates from them. Please let me know what can I do next?
  2. Also, is it possible to submit the same manuscript to more than one journal at once to save time? If any of the journals will reply me, I will withdraw the manuscript from other journals.
  3. Please let me know some free Scopus Indexed Journals related to Computer Engineering/Computer Security which will take little time to make decisions because I am in a hurry. It is my first time publishing a paper and I want it to be published anyhow at the earliest (because I need to go abroad and the deadline for scholarships is approaching).
Thank You
Relevant answer
Answer
You may also have a look into this discussion: https://www.researchgate.net/post/Unreasonable_review_times
  • asked a question related to Computer Engineering
Question
11 answers
"Self-fulfilling prophecy" is Moore's own definition, while "a convenient fiction" is somebody else's...
I have decided that, giving some excerpts from two relevant articles will be more helpful than trying to explain my personal views in detail.
A.Z.
Excerpts from the article "Was Moore’s Law Inevitable?" by Kevin Kelly:
(...) Writing in 2005, (...) Moore says, “Moore’s Law is really about economics.” [Moore's colleague] Carver Mead made it clearer yet: Moore’s Law, he says, “is really about people’s belief system, it’s not a law of physics, it’s about human belief, and when people believe in something, they’ll put energy behind it to make it come to pass.”
(...) Finally, in a another reference, Mead adds : “Permission to believe that [the Law] will keep going,” is what keeps the Law going. Moore agrees in a 1996 article: “More than anything, once something like this gets established, it becomes more or less a self-fulfilling prophecy. The Semiconductor Industry Association puts out a technology road map, which continues this [generational improvement] every three years. Everyone in the industry recognizes that if you don’t stay on essentially that curve they will fall behind. So it sort of drives itself.”
(...) Andrew Odlyzko from AT&T Bell Laboratories concurs: “Management is *not* telling a researcher, ‘You are the best we could find, here are the tools, please go off and find something that will let us leapfrog the competition.’ Instead, the attitude is, ‘Either you and your 999 colleagues double the performance of our microprocessors in the next 18 months, to keep up with the competition, or you are fired.'”
Excerpts from the article "A Moore’s Law Mystery" by Rose Eveleth:
(...) Moore’s Law probably didn’t start as a marketing ploy. Even Carlson will admit that. But it then became, what he called, “a convenient fiction.”
Thomas Haigh, a historian of technology at the University of Wisconsin, had a similar idea. “[Moore’s Law] has always been more of a self-promotion for the wondrous accomplishments of the semiconductor industry than a law of nature,” (...) “It’s also been a kind of self-fulfilling prophecy, since it’s taken ever larger investments of research and development money to keep it coming true."
Relevant answer
Answer
The so-called Moore's laws are distinguished by the fact that they are formulated in such a way as to serve as a "self-fulfilling prophecy."
Regards,
Dariusz Prokopowicz
  • asked a question related to Computer Engineering
Question
6 answers
I need to write a MATLAB code that has the ability to process a GIS image in order to extract the coordinates of the grid points within the red region (R) and that are at least distance "d" from its boundary. Each point in the R is given a weight w1 (attached figure). The same procedure is to be made for the green region (G) but w2 is the weight of any point in G. The gathered data are saved in a matrix formed of three rows: row 1 contains the abscissa, row 2 contains the ordinate, and row 3 the weight.
I am looking forward to getting your suggestions...thanks in advance.
Relevant answer
Answer
im=imread('GIS.jpg');
%imshow(im);
BW = im2single(im);
numclust=5;
[L,Centers] = imsegkmeans(BW,numclust); % matlab inbuilt
temp_mask = L==1;
figure,imshow(temp_mask);
might help:)
  • asked a question related to Computer Engineering
Question
7 answers
Has anyone heard about IJCERT? Can someone please answer whether this journal is fake?
I have submitted a research paper on their site and there is no acknowledgement whether it is received or not.
Relevant answer
Answer
Besides the inclusion of this journal (https://www.ijcert.org/ ) in the stand-alone journal version of the Beall’s list (https://beallslist.net/standalone-journals/ ) as indicated by Anton Vrdoljak , there are more red flags (pretty classical for predatory journals):
-Contact mail is a Gmail
-Low quality (lay-out) website
-Prominently mentioned impact factor has nothing to do with a real impact factor (they are definitely not indexed in SCIE or Scopus)
-The mentioned impact factor is Scientific Journal Impact Factor (SJIF) which is together with other mentioned ‘indexing’ like CiteFactor, Global Impact Factor (GIF), DRIJ and Cosmos Impact factor all notorious examples of misleading metrics: https://beallslist.net/misleading-metrics/
-Misleading mentioning of Scopus suggested (while they are not indexed), Web of Science Researcher ID (and ORCID) which has nothing to do with a journal (and certainly not with indexing in one of Clarivate’s databases)
-DOI looks legit but for the number of papers I checked it is not
So, this journal is showing too many characteristics of a predatory journal. One better avoid.
Best regards.
  • asked a question related to Computer Engineering
Question
14 answers
What kind of scientific research dominate in the field of Computerization of conducting economic and financial analyzes of enterprises?
Please, provide your suggestions for a question, problem or research thesis in the issues: Computerization of conducting economic and financial analyzes of enterprises.
Please reply.
I invite you to the discussion
Best wishes
Relevant answer
Answer
Infrastructure and technology readiness... Arvanitis, S. (2005). Computerization, workplace organization, skilled labour and firm productivity: Evidence for the Swiss business sector. Economics of innovation and new technology, 14(4), 225-249.
  • asked a question related to Computer Engineering
Question
15 answers
I am doing a survey on existing biometric identifiers. I would appreciate feedback from you on existing identifiers, and their known issues.
The few I know are: Retina, fingerprint, voice, face
Is ECG a stable identifier ? or, too early in research stages ?
Relevant answer
Answer
The most popular biometric identifiers, i.e. fingerprint, eye retina, face geometry, voice recognition, scan of the blood vessel mesh of a finger or hand, etc., are used to identify people in banking as a form of signing and / or coding access to a bank account, etc.
Regards,
Dariusz Prokopowicz
  • asked a question related to Computer Engineering
Question
4 answers
I am currently researching the impacts of components of digital transformation and Industry 4.0 (optimization, automation, digitalization) on the fairly old field of mechanical engineering.
Has mechanical engineering been able to keep up? Are mechanical engineers adapting - taking programming courses/getting involved in something that was once for electrical engineers?
Thank you in advance for any input.
Monica
Relevant answer
Answer
Automation without physical system is nothing. Automation is applied on mechanical system. You should be competent and expert in your field. Mechanical engineering is a bone of automation. Without bone no one can built structure.
  • asked a question related to Computer Engineering
Question
3 answers
I am doing atm gui for my project in java. In my opinion using array of objects is the best option to store customer data. When i try to access it in an ActionListener method, i get this error: Exception in thread "AWT-EventQueue-0" java.lang.NullPointerException. This happens when i hit the register button. I tried to delete the array and use a normal object in the ActionListener and it worked smoothly but it is not useful to store multiple customer data. Is there another way to store these or to fix this error? I uploaded the source file so you can check the code. Thanks in advance.
Relevant answer
Answer
Check with the above recommendation. Such error are often caused by trying to access a non-existing object.
Although your attached code is not complete, you could consider checking the array of objects which you constructed.
musteri musteriler[] = new musteri[40];
personel kadro[] = new personel[20];
In here you have just pre-allocated the array space, inside array cells no object has been created yet!
So, you need to initialize that with the empty constructor or a constructor with params in a for loop:
for (int i = 0; i < musteriler.length; i++) {
musteriler[i] = new musteri();
//Calling the empty constructor to initialize the instance variables -if any-
}
  • asked a question related to Computer Engineering
Question
3 answers
I want to do programming in Ansys and I need to determine the value of stress in specified keypoint?
Relevant answer
Answer
Use the following steps :
Main menu - General post pro - path operation - Define path - By nodes
Main menu - General post pro - path operation - Nap onto path
Main menu - General post pro - path operation - Plot path item - on Graph
  • asked a question related to Computer Engineering
Question
28 answers
Agile methods are very useful for software development projects in small development teams. I am looking for a way to adapt these methods to traditional development of technical products.
Relevant answer
I think that Agile methods are more fit for small projects which have small development teams. The following research have more information:
Hass, K. B., The Blending of Traditional and Agile Project Management. PM World Today, May 2007. IX(V): p. 1-8.
  • asked a question related to Computer Engineering
Question
96 answers
Hello to all professors and researchers,
What is your suggested topic for conducting an academic-operational thesis in one of the most up-to-date and efficient fields?
Please express your proposal in a combination of two fields of computer engineering and industrial engineering.
Thank you ...
Relevant answer
I believe that applications are today one of the priorities of Science.
  • asked a question related to Computer Engineering
Question
5 answers
Hi,
I am in pre-final year of my B.Tech in Computer Engineering, and I would like to do in my final year a project on High Performance Computing.
So, I would like to have some guidance from you on how can I go about that to have a good project and that can be published in a journal of high repute.
Thanking you in advance for your answers/guidance, for your time, and for your kindness.
Relevant answer
Answer
I would suggest that you pick up the proceedings of the most recent conferences on HPC and check out what problem excites you. Best wishes.
  • asked a question related to Computer Engineering
Question
6 answers
Dear All,
What kind of small mobile robots are available in market to undertake multi-robot research? Would you have anything to be recommended?
Thanks!
Chaomin Luo
~~~
Chaomin Luo, Ph.D.
Associate Editor of IEEE Transactions on Cognitive and Developmental Systems
Associate Editor of International Journal of Robotics and Automation (SCI-indexed)
Associate Editor of International Journal of Swarm Intelligence Research (IJSIR)
Associate Professor
Department of Electrical and Computer Engineering
Mississippi State University
312 Simrall Bldg., 406 Hardy Rd., Box 9571
Mississippi State, MS 39762
USA
Relevant answer
Answer
I have read about the smart dust robot. It is still under investigation. You may go though , the project has a lot of limitations like ( power consumption, communication overhead, processing cost. Somehow you can get your aim.
regards
  • asked a question related to Computer Engineering
Question
10 answers
I'm working on WSN. I want to do clustering and aggregation, and I want to optimize the results. Does OMNeT++ support this? 
Since I'm a beginner with this tool, can anyone provide any ideas on how to learn about this tool? Where can we add our code?
Relevant answer
Answer
how to install omnett++ ?
Follow these few steps:
Download the desired version.
Open the OMNeT++ folder.
Open the mingwenv file
Tab any key to continue /2
Type "./configure" and hit the enter key
Type "make" and hit the enter key
Type "omnetpp" and hit the enter key
  • asked a question related to Computer Engineering
Question
7 answers
I have summarizer system(single document), I want evaluate it using Rouge. For that i need original text that i will to my system to generate system summary then i need human generated summary. So where is the original text and human generated summary in DUC 2002 data set.
Relevant answer
Answer
I have a summarizer system , but i can't find the original duc2002 data set.
can u share me too, the orginal text data in duc2002 data set?
thank you
  • asked a question related to Computer Engineering
Question
5 answers
I'm looking for already developed BN models of competencies related to PBL.
Relevant answer
Following
  • asked a question related to Computer Engineering
Question
9 answers
The Wikipedia says:
"To convert from a base-10 integer numeral to its base-2 (binary) equivalent, the number is divided by two, and the remainder is the least-significant bit. The (integer) result is again divided by two, its remainder is the next least significant bit. This process repeats until the quotient becomes zero."
But my students ask, "Why? What do we actually do when repeatedly dividing by two? Why is the first bit LSB?"
I have an explanation but it is interesting for me to see your opinion.
Relevant answer
Answer
  • asked a question related to Computer Engineering
Question
11 answers
Any algorithm ? Many Citations still go unrecognized !! But are still atleast entered or feeded manually by respective author. Why doesn't it use a universal, simple method to update its citations? I am also aware of the fact about the very large database of Google Scholar! I may be ignorant !!!
Relevant answer
Answer
no solution yet for this matter.
  • asked a question related to Computer Engineering
Question
4 answers
For lightweight encryption.
Relevant answer
Answer
Respected Sir,
Please send me the source code of your project.
  • asked a question related to Computer Engineering
Question
4 answers
I am using the Lagrange Multiplier for maximizing the Normal/Gaussian distribution of objective functions under some constraints. So, I am searching for better techniques other than lagrange multiplier.
Relevant answer
Answer
See ICA papers... FastICA, infomax,...
  • asked a question related to Computer Engineering
Question
4 answers
I am a Computer Engineer, so do not have any knowledge of FEA and have never used Ansys before. I have a 4x4 plain fabric weave model with properties of vectran and I want to do creep analysis on this model. But I am not sure which creep model to use and how to calculate the creep constants.
From one of the research papers, I have obtained some constant values (beta) for vectran (%elongation/log(t)). But I am not sure if I can make use of these values directly as C1 or C2 in Ansys.
This is the research paper for reference.
Relevant answer
Answer
Following the answers.
good question
  • asked a question related to Computer Engineering
Question
6 answers
In google map, we can see the travel time from a source address to destination address. I want to store those data. Is there any tool gor this?
Relevant answer
Answer
You can try this R package: https://cran.r-project.org/web/packages/gmapsdistance/gmapsdistance.pdf (here is an example on how to use it: https://rdrr.io/cran/gmapsdistance/src/demo/example6.R). The only difficult part is that the API has restrictions, i.e. not everything is free. But, if you have only a few queries, it can work out just fine.
  • asked a question related to Computer Engineering
Question
11 answers
Respected Sir/Madam,
I am looking to submit our (my teammate) research article in special theme of Electrical and Computer Engineering in SCI/SCIE indexed Journal? If some body have special issues where article can be processed then kindly share issues and journal details with submission procedure.
Thanks and Regards
Relevant answer
Good topics
  • asked a question related to Computer Engineering
Question
2 answers
I want to start to work on some stepper motors bipolar with arduino mega and ramps 1.4 but I don't know how to do it. Can anyone explain how to do this?
Relevant answer
Answer
I don't understand exactly what you mean? What is your goal? What do you want to do?
  • asked a question related to Computer Engineering
Question
4 answers
I have a data for image recognition using neural networks. The images are in pgm format.how to pre-process that data to get into a suitable matrix in cpp.
  • asked a question related to Computer Engineering
Question
13 answers
Hello all,
I have been wondering about differences between true random number generator and pseudo-random number generator.
In my system there are three main components; clock signal ,push button, and output (LED). When the button is pressed, the LED simultaneously represents the state of the clock signal and remains the last state while the button is released. For instance, I release my finger when the LED is 'ON' so, it is on until the next pushing and vice versa. let's say the period of the clock is relatively fast so human is not able to know whether the current state is 0 or 1.
However, I got be confused that is my system a TRNG or PRNG. First, i thought it is a TRNG because the randomness is only determined by human decision. Therefore in this case I may say the source of randomness is non-deterministic However, the second thought can be raised that what if the clock can also be considered as a source then the randomness is likely not random ( non-deterministic) anymore
Notably, the real system is much more complicated, for an ease of discussion i just briefly explain the principle of the system.
what do you think about this?
Thank you in advance
Korakot
Relevant answer
Answer
Dear Korakot Boonyaphon,
The difference between true random number generators(TRNGs) and pseudo-random number generators(PRNGs) is that TRNGs use an unpredictable physical means to generate numbers (like atmospheric noise), and PRNGs use mathematical algorithms (completely computer-generated).
Pseudo-RNG's are sets of algorithms (i.e. logical instructions for by a computer program) that utilize mathematical formulas to produce a certain sequence of numbers that will appear random, or at least will have the effect of randomness. Other RNG's use pre-calculated tables instead of mathematical formulas, but either way table or formula, the objective is still the same.
A lot of research has been done (and is still ongoing) on RNG's insomuch that our modern algorithms used for Pseudo-RNG's produce number sequences that do exactly mimic truly random sequences. But that may be the outcome of today's research there is still room for improvement since the results of Pseudo-RNG's are really "pseudo".
Comparing the results of a Pseudo-RNG with that from a True-RNG will prove useful. If you list down the results of a Pseudo-RNG mimicking dice rolls the numbers will really appear as if they are random. But statistical analysis will prove that the numbers produced by a Pseudo-RNG is not really random but is rather predetermined. Thus its results can be measured and standardized, and, we can say, controlled.
True-RNG's behave differently since the results are truly random and unpredictable. If we try to get a computer to produce a really random sequence of numbers then the computer must base its numbers on a naturally occurring physical phenomenon, which may include the radioactive decay of isotopes, static in the airwaves, and the waves of the sea. True-RNG's will not really be cost-efficient if you compare it to Pseudo-RNG's. True-RNG's will be subject to wear and tear since all things natural will really be subject to entropy. A Pseudo-RNG will not be subject to such physical phenomena.
Another efficiency of a Pseudo-RNG is that you can reproduce the same sequence of numbers in another time by simply knowing the starting point of the sequence (thus it is also periodic and the sequence will repeat itself in due time). This better facilitates inspections done by casino control boards. But you can be sure that the sequence of numbers produced by a Pseudo-RNG, though periodic, the time to reproduce the same sequence will eventually take a really long time that unless you acquire the actual algorithms, the correct sequence will be very difficult (almost impossible) to crack.
Many online casinos have settled for Pseudo-RNG's for its cost-efficiency, periodicity, and efficiency. These are good reasons to choose this type of random number generator, though a True-RNG will also have its own benefits as well.
I hope I have answered your question.
With Best Wishes,
Samir G. Pandya
  • asked a question related to Computer Engineering
Question
10 answers
Does anyone know of any good articles on research methods taught in Phd/Masters programmes in the field of Computing Sciences (Computer Science, Information Systems, IT or Computer Engineering)?
Relevant answer
Answer
  • asked a question related to Computer Engineering
Question
13 answers
Hi,
As per the definition of logic obfuscation, obfuscated circuit stays in obfuscated mode upon global reset (i.e. initial state) and generates incorrect output; upon receiving correct initialization sequence it enters into functional mode and generates intended outputs.
This is fine with respect to the design that does not connected with any further critical systems. If at all, the obfuscated logic needs to be connected to further safety critical systems, won't incorrect value generated in obfuscated mode affects the critical systems??
In such case, how to apply logic obfuscation??
Thanks in advance.
Relevant answer
Answer
You can read the literature yourself and come up with your own conclusions. It would do you good, you would sound less like a non-expert rambling about something you have very little clue about. I am done here.
  • asked a question related to Computer Engineering
Question
25 answers
as reviewers are not getting any thing for reviewing article hence they are considering , as second preference.
sometime we have to wait 8 months for review ?
what is the best possible solution to hasten the publishing process?
please suggest your an insightful remarks
Thanks
Relevant answer
For you there is no solution to do that if you named a specific journal for this issue. Every journal or publisher has its own instruction o do that.
  • asked a question related to Computer Engineering
Question
9 answers
What is the main difference between dual band and dual radio?
Let
A system equipped with:
Dual Band= 2.4 GHz and 5 GHz
Dual Radio=802.11 and 802.14.5
where 802.11 with 5GHz is deploy between air to air link
and 802.11 with 2.4 GHz between air to ground.
similarly some nodes are also connected through 802.15.4 with 2.4 GHz between air to air.
The above system is dual band dual radio
or triple band dual radio
or triple band triple radio?
Relevant answer
Answer
Dual band refers to a device which uses two different frequencies to communicate.
Dual radio refers to a device which uses two different protocols to communicate.
Maybe an illustration would help. A dual band device is like a person at a party who can move between two different rooms (different frequencies) to talk with other people, while a single band device would be limited to talking to people in only one room. On the other hand, a dual radio device can speak with people who speak in two different languages, while a single radio device can only speak one language.
A dual radio device is typically used as an intermediary between two different networks like 802.11 (like WiFi) and 802.15.4 (like many wireless sensors).
  • asked a question related to Computer Engineering
Question
1 answer
The noise phenomena could reduce the signal quality and the elimination of these phenomena becomes more necessary to suppress and enhance receiver signal quality in many applications. The noise cancellation has high consideration and recognize as a very important technique to eliminate the noise associated with original signal.
Papers:
Prasetyowati S.A, Susanto A. Multiple Processes for Least Mean Square Adaptive Algorithm on Roadway Noise Cancelling. International Journal of Electrical and Computer Engineering (IJECE), 5(2): 355, 2015
Das, Aritra, et al. "An Improved Energy Detector for Spectrum Sensing in Cognitive Radio System with Adaptive Noise Cancellation and Adaptive Threshold," Computational Advancement in Communication Circuits and Systems, vol. 335, pp. 113-119, 2015.
Relevant answer
Answer
Some of the standard performance metrics include the Signal to
reconstruction ratio (SRER), Root square
error (RMSE), Pulse amplitude distortion
(PAD), Standard deviation (STD), and
mean absolute error (MAE).
  • asked a question related to Computer Engineering
Question
3 answers
I am working towards line tunneling based TFETs, where gate is placed on the source. Now, if , source overlap is increased than the current should increase. But unfortunately, my simulation fails to obtain the same using ebarriertunneling model of Sentaurus TCAD, where a non local mesh is defined by user.
Although the dynamic non local  path model of sentaurus tcad is working well, but AC simulation are not supported. (Here user doesnot define the nonlocal mesh)
Relevant answer
Answer
Hello Sir, I am currently attempting to recreate the results of your paper. We are stuck on the exact same problem you have mentioned above. Any help you could provide would be much appreciated.
  • asked a question related to Computer Engineering
Question
2 answers
Chronic autoimmune skin disease. This condition occurs when the immune system sends out wrong signals .These signals increase the speed of the skin's growth cycle, that is, excessive increase in skin cells from the amount of shedding them.so I want to know that can we prevent this wrong signals by using things like electrodes.?
Relevant answer
Answer
Still needs more trials though. But I think it's a good start to find molecular evidence behind this;)
  • asked a question related to Computer Engineering
Question
245 answers
Everyone, at some point, has probably thought about the problem artificial intelligence(AI) may represent in the future when the rate of unemployment is rising at an alarming speed thanks to robots that do a much better job than any human ever did but the question is : how, when, and where will the impact of artificial intelligence hit hardest?!
Relevant answer
Answer
Perhaps another way to answer the question is with another question. Did electronic calculators, and subsequently computers, replace mathematicians, accountants, statisticians, and engineers? No. Just made them that much more productive.
  • asked a question related to Computer Engineering
Question
52 answers
If a Journal was not indexed at the time of publication. After few years if that specific journal gets indexed with Scopus or SCI/SCIE. What will be the status of previously published papers?
Relevant answer
Answer
Previously published papers are not considered. Only those papers are considered, which are submitted after the journal is indexed.
  • asked a question related to Computer Engineering
Question
5 answers
Cuckoo search clustering algorithm.
Relevant answer
Answer
This might be helpful
function [z] = levy(n,m,beta) % Input parameters % n -> Number of steps % m -> Number of Dimensions % beta -> Power law index % Note: 1 < beta < 2 % Output % z -> 'n' levy steps in 'm' dimension num = gamma(1+beta)*sin(pi*beta/2); % used for Numerator den = gamma((1+beta)/2)*beta*2^((beta-1)/2); % used for Denominator sigma_u = (num/den)^(1/beta);% Standard deviation u = random('Normal',0,sigma_u^2,n,m); v = random('Normal',0,1,n,m); z = u./(abs(v).^(1/beta)); end
  • asked a question related to Computer Engineering
Question
6 answers
Hi, I am using MiXim and I need to calculate the throughput for 802.15.04 narrow network. Can anyone tell me how can I calculate this metric?
Relevant answer
Answer
I want also to calculate throughput and delay for 802.15.4 please any one here provide me the suggestions how to do this.
  • asked a question related to Computer Engineering
Question
2 answers
Hello,
According to the NIST test suite's instruction, there are 15 tests for proving randomness and each tests require different minimum length of the sequence (i.e. Frequency : n > 100, Maurer's Universal : n> 10^6). Thereby, some tests are not applicable to examine the randomness of short sequences (I want to use the sample length n = 128 or 256. ). In fact, I have seen some studies omit those tests that require long sequence instead. I would like to ask a couple questions.
1. In the case of testing such short sequences, is it to neglect the test which require long length of sequence such as Binary Matrix Rank Test, Non-overlapping Template Matching Test, Overlapping Template Matching Test. and report only results from the remained tests?
2. Is there any other way to examine the randomness of short sequences ?
Thank you in advance
Relevant answer
Answer
Dear Karakot,
I suggest you to see links and attached files in topic.
-Statistical Testing of Cryptographic Randomness - DergiPark
-NIST SP 800-22: Documentation and Software - Random Bit ...
-CryptRndTest: An R Package for Testing the ... - The R Journal
-true random number sequences from gamma ... - Academia Romana
-Using Information Theory Approach to Randomness Testing
Best regards
  • asked a question related to Computer Engineering
Question
4 answers
I am trying to connect different UAVs in ad-hoc manner.I am interested to use Wimax from the base station to the backbone UAV, that would be further connected with WIFI.
Relevant answer
Answer
you can make some different choice, Wimax is not the best.
  • asked a question related to Computer Engineering
Question
5 answers
How can we differentiate between D2D communication and Adhoc networks?
I am also wondering what D2D covers what ad hoc networks haven't covered yet ?
Relevant answer
Answer
Dear Khan,
I suggest you to see links and attached files in subject.
-Device-to-Device Communication in LTE-Advanced Networks: A ...
- Futuristic device-to-device communication paradigm in vehicular ad ...
- A Scheme of Ad-hoc-Based D2D Communication in Cellular Networks
- Device-to-Device (D2D) Communication: Fundamentals with ... - WNCG
- A Software-Defined Device-to-Device Communication Architecture for ...
- Performance Analysis of mmWave Ad Hoc Networks
Best regards
  • asked a question related to Computer Engineering
Question
4 answers
What kind of projects are out there in neural system analysis?
What are the take aways?
I know it can be applied to many of the industries, commercials, and at home.
But I am bit vague or cannot grip on what the term stands for and what can be done within.
I honestly thought neural systems are somewhat related to bioengineerings.
Would you kindly give some explanations??
Relevant answer
Answer
Having hands on to data makes it easier to understand, Pick a language(matlab or python) and select an algorithm to see how it works on the data, look for youtube videos with simple examples..
  • asked a question related to Computer Engineering
Question
27 answers
Hi everyone.
I have a problem to model concrete crack in abaqus.
I use Concrete Damaged Plasticity (CDP) in my model, I can run my model but I can not show the crack pattern.
I read one paper, and in that paper they can show crack pattern, (I have attached the crack pattern from this paper).
My question is, how can I show crack pattern like in my attachment?
Thank you
Relevant answer
Answer
I am new to abaqus 6.14. I am trying to make One RCC model to get Load Vs Deflection curve, But could not achieved. Kindly anyone help me from scratch. I will give the geometry.
Cross Section Beam 150mmx250mm
Bottom Reinforcement - 2 bars 12mm dia
Top bars - 2 nos. 8 mm dia
2-Leggeed Strirpps-100mm c/c
Total length - 2000mm
length of cage - 1950mm
Effective span - 1800mmBoundary condition - Simply supported
Two point loading at L/3 means.
My experimental result showed ultimate load is 150kN
I want to confirm from this model
Grade of COncrete M45
Steel Fe 500
  • asked a question related to Computer Engineering
Question
4 answers
How can we simulate directional and omnidirectional antenna in Opnet simulator for UAVs Networks?
Thanks
Relevant answer
Answer
Dear Mr. Muhammad Usama,
It would be great if he can integrate the pattern of the designed antenna for either RFID or WSN into the OPnet. This is because I think he wants to simulate a real scenario for the complete system including the communication layers and accordingly he can test and/or edit to have better performance.
Regards,
Ahmed Elawamry
  • asked a question related to Computer Engineering
Question
10 answers
How can we differentiate message-oriented protocols and stream-oriented protocols?
Explanation with examples would be highly appreciated.
Relevant answer
Answer
TCP is a stream oriented protocol and UDP is a message-oriented protocol.
TCP receives the stream of bytes from application layer protocols and divide it in to segments and pass it to IP. But UDP receives already divided or grouped bytes of data from application protocols and add UDP headers which will become datagram and send it to IP, then application layers has the burden of dividing the streams of data in to messages when they run on top of UDP .
  • asked a question related to Computer Engineering
Question
3 answers
I need materials in any form regarding antenna pattern in Opnet for learning purpose.Your help would be highly appreciated.
Relevant answer
Answer
Yes Aparna Sathya Murthy .
I need useful tutorials and links,which might be useful in implementing it in Opnet simulator.
  • asked a question related to Computer Engineering
Question
5 answers
how to configure ad hoc network using OPNET and get parameters like packet loss, throughput, and delay. 
  • asked a question related to Computer Engineering
Question
29 answers
Kindly guide me about choosing best simulator for dynamic routing in Adhoc networks.
Can we use Opnet simulation for high level work?
Thanks
Relevant answer
Answer
NS2 is no longer used and active development stopped 7 years ago. So its best you use NS3 or NetSim or OPNET. And like you say you need to have lots of time and be very good at programming (in multiple languages) for Ns3.
  • asked a question related to Computer Engineering
Question
5 answers
I want to separate the clouds form the sky using the automatic graph cut method. Can anyone please help me. I read a paper which says we need to identify the hard constrained seeds first but I am unable to understand that. I am giving a sample image here.