GET THE APP

..

Global Journal of Technology and Optimization

ISSN: 2229-8711

Open Access

Current Issue

Technology Evolution: What need to know (2021)

    Mini Review Pages: 1 - 2

    Computing Technology for Industrial Production Planning

    Tony Walker*

    This manuscript based on the results of a survey, reviews the typical computer applications encountered in the manufacturing industry. The use of computers and available operations research techniques, for production planning and control, amongst companies participating in this survey is discussed. Difficulties, encountered by existing users, in implementing their computer systems are outlined. The article concludes with a brief discussion of the impact of computer use on a number of significant measures of performance.

    Letter Pages: 1 - 2

    Cell of Human Body

    Jackson Jones*

    This manuscript based on the results of a survey, reviews the typical of cell application which can be used for there development of the human and technology in this manuscript we are focusing on the computer and technology and show our well defined to technology in the manuscript. Difficulties, encountered by existing users, in implementing their computer systems are outlined. The article concludes with a brief discussion of the impact of computer use on a number of significant measures of performance.

    Volume 11, Issue 3 (2020)

      Mini Review Pages: 1 - 2

      Space Communication and Technology

      Yudum Sibru*

      DOI: 10.37421/2229-8711.2020.11.251

      Space correspondence is turning into an essential piece of national and worldwide frameworks. Nations are progressively subject to worldwide satellite abilities for national and global frameworks, which incorporate frameworks overseeing the route of airplane and boats, military choice emotionally supportive networks, money related exchanges, and interchanges through the Internet. Digital security dangers to space interchanges are a moderately new wonder, with expanding associations with the bleeding edge of worry for the basic frameworks because of the weaknesses that such dangers may misuse and contrarily sway. Truth be told, such weaknesses may influence military order frameworks, dispatch frameworks, correspondences, telemetry, following and order, and mission finishing. All the more significantly, space frameworks are frequently utilized as reinforcement answers for customary correspondence system: thus, they are not made sure about by structure.

      Volume 12, Issue 1 (2021)

        Research Article Pages: 1 - 8

        Adding Bluetooth Capabilities to the Vehicle Key Fob

        Ziad AlHihi*

        While working to deliver an app that send commands to the vehicle, I noticed it will not function properly when the phone battery dies. I thought to have the other regular key as alternative solution but the customers did not like to carry the bulky keys. I did some research and came up with a credit card form factor with the same functionalities of a regular key. I added value of Bluetooth chip that connects to the app. I also realized some customers own multiple vehicles and I added a memory chip to save the key learning of up to four vehicles. From the app we can decide what the active profile is.

        A system includes a mobile device and a fob, each having a short-range wireless transceiver. The mobile device is programmed to transmit a message to the fob indicating a fob action using the mobile device transceiver. The fob is programmed to, using the fob transceiver, receive the message and transmit a second message to a vehicle requesting the vehicle to perform the fob action.

        In one or more illustrative examples, a system includes a mobile device and a fob, each having a short-range wireless transceiver. The mobile device is programmed to transmit a message to the fob indicating a fob action using the mobile device transceiver, and the fob is programmed to, using the fob transceiver, receive the message and transmit a second message to a vehicle requesting the vehicle to perform the fob action.

        In one or more illustrative examples, a method includes transitioning a fob into valet mode by sending a wireless short-range message to the fob responsive to receiving input to a mobile device to set the fob into valet mode; and transitioning the fob from valet mode into full access mode by sending a second wireless short-range message to the fob responsive to receiving second input to the mobile device to remove the fob from valet mode. In one or more illustrative examples, a system includes a mobile device and a fob, each having a short-range wireless transceiver. The mobile device is programmed to, responsive to user input, transmit a message using the mobile device transceiver to the fob to transition the fob from being configured to control a first vehicle profile to being configured to control a second vehicle profile, and the fob is programmed to, using the fob transceiver, receive the message and control the second vehicle.

        Research Article Pages: 1 - 4

        Comparative Analysis of Multi-Verse Optimizer with Time Freeze Effect and basic Multi-Verse Optimizer

        Ameer Khan*

        In this paper an improvement of a well-known nature inspired meta-heuristic algorithm is compared with the original algorithm i.e. Multi-Verse Optimizer (MVO). Multi-Verse Optimizer with Time Freeze Effect (MVOTFE) is compared with original MVO in terms of optimization performance, time taken and convergence behavior. MVOTFE is first tested with same 19 benchmark test problems that are used by MVO. MVOTFE uses same mathematical model as used by MVO with only addition of time freeze effect in the algorithm. Comparative analysis suggests that MVOTFE not only outperforms original MVO in 16 out of 19 test problems but also provides faster convergence in lesser time. As indicated by convergence curves, it also effectively escapes from local optima present in the search space.

        Image Article Pages: 1 - 1

        3D Body Scanning Technology and its Applications

        Erica Cohen*

        Share this article
        Image Article Pages: 1 - 1

        Forensic Facial Reconstruction and Optimization

        Erica Cohen*

        Share this article
        Viewpoint Pages: 1 - 1

        A Cordial Welcome to Participate as Editor for Global Journal of Technology and Optimization

        Erica Cohen

        Firstly we would like to extend our warm gratitude to the Editors of this Open Access Journal. Global Journal of Technology and Optimization has collaboration with more than 50 eminent Editors and is successfully publishing quality articles in the field of ‘technology and optimization’. We are using an Editorial Tracking System for quality in peer-review process which is an online manuscript submission, review and tracking systems. Review processing is performed by the editorial board members of the Journal or outside experts; at least two independent reviewers approval followed by editor approval is required for acceptance of any citable manuscript. Authors may submit manuscripts and track their progress through the system, hopefully to publication.

        Volume 12, Issue 3 (2021)

          Research Article Pages: 1 - 8

          Vehicle With Extended Range Remote Control Key Fob

          Ziad AlHihi*

          A vehicle that includes in-vehicle controller(s) coupled to an external network transceiver, and configured to register a key fob and/or a mobile device configured as a key fob. The transceiver is configured to communicate autonomously with remote servers to respond to a key fob signal received from the server, which includes an authentication code and a remote control command generated by the key fob and/or mobile device configured as the key fob. In further variations, the key fob is also configured to be paired and/or registered by an external mobile device, by the authentication code, and to generate the remote control command via the mobile device. In response to the key fob signal, the controller(s) autonomously adjust vehicle systems, such as locking or unlocking, arming and disarming a security system, adjusting cabin and/or seat temperature and configuration preferences, as well as other driver vehicle preferences.

          Many types of personal, commercial, and industrial vehicles, including combustion engine and hybrid, plug-in hybrid, and battery electric vehicles, hereafter collectively referred to as "vehicles," include several types of in-vehicle computing systems, controllers, interfaces, networks, communications capabilities, and applications. Such onboard systems and applications enable vehicle operation, as well as vehicle to vehicle and vehicle to infrastructure communications, and related communications and remote control capabilities that utilize key fobs and other types of mobile devices via such contemplated communications systems.

          The disclosure is directed to a vehicle that includes at least one and/or one or more in-vehicle and/or onboard controller(s) that is/are coupled to an external network transceiver. The controller(s) are configured to register and/ or "pair" a key fob having an authentication code, to enable remote control of the vehicle by the key fob. The transceiver is configured to communicate autonomously with one or more remote server(s) in communication with an external network, such as the internet, and may be one or more transceivers each configured for particular communications protocols and capabilities, such as for example, Wi-Fi and cellular communications.

          Review Article Pages: 1 - 6

          Preferred Contexts in Learning Number Concepts Integers in The Intermediate Phase Addition and Subtraction: Focus on Three Intermediate Phase Learners in Johannesburg North District

          Pardon Marufu*

          The focus of the study is to apply the mapping method to innovate curriculum design. The purpose is to explore how to use the teaching method concept mapping to help learners build scaffolding, so that learners can organize scattered knowledge and construct meaningful integer knowledge through concept mapping. In other words, it helps the intermediate phase learners to present integer abstract concepts in a practical way and show the interrelated concepts and facts when working with integers. Concept mapping is regarded as a powerful tool for teaching Science and this study explores how effective the concept mapping skills can be used in exploring Mathematical concepts such as integers. The analysis of this paper is done using the Blooms Taxonomy.

          Research Article Pages: 1 - 5

          Learning Number Concept Integers Using Preferred Contexts: The Use of Contexts Facilitates the Learning of the Number Context Integers in the Intermediate Phase Classroom

          Pardon Marufu*

          The purpose of this paper was to investigate the preferred contexts in learning number concepts in integers. The research also looked at the impact of contexts in the interpretation of the integer using stories. The researcher decided to interrogate and find out if the use of contexts could enhance the learners’ academic performances. The problem is the intermediate phase learners are operating two grade levels behind the expected and South African intermediate phase learners are performing poorly in Mathematics. The scope is on focus relevance, appropriateness, and correctness in the development of mathematical thinking and practice. The argument is the use of contexts in learning number concepts can facilitate the understanding of the learning of the number concept integers. Discussions on different contexts for learning integers were done by intermediate phase learners (Grade 4-6) in one primary school in Johannesburg North in Gauteng Province. Interviews on preferred contexts in learning number concept integers comprised 29 learners. The research adopted a qualitative approach of analyzing the interview responses from the learners. Analysis of results indicates that the use of preferred contexts in learning number concepts in contexts can either facilitate or hinder the learning of number concepts in integers in the intermediate phase. The findings imply that the use of contexts has a positive or a negative impact on the learning of number concepts in context integers. These results can be generalized to all the other learners who are in the same phase.

          Research Article Pages: 1 - 4

          A Comparative Study of Centroid Ranking Method and Robust Ranking Technique in Fuzzy Assignment Problem

          Arun Pratap Singh*

          Allocation of subjects is an important task for every educational institution. Subject allocation is considered as a major factor to the teaching quality.

          In this study, we used the Fuzzy allocation methods: centroid ranking method and Robust ranking method, for allocating the subjects in a department for the coming semester. We used the scores obtained by the faculty members, from the Chairman, Course Director and the students, based on the performance in the previous semester.

          Volume 12, Issue 6 (2021)

            2021 Conference Announcement Pages: 1 - 1

            World Machine Learning and Deep Learning Conference

            Natalia Williams

            ME Conferences cordially welcome all the participants all over the world to the "8th World Machine Learning and Deep learning Conference" which is going to be held at November 15-16 in Barcelona, Spain The theme of the conference is “Intensify the world with Machine Learning”. Check out where the world is going with the recent advancements in the field of Machine Learning by grabbing this magnificent opportunity.

            2021 Conference Announcement Pages: 1 - 1

            Mechatronics

            Natalia Williams

            Webinar on Mechatronics Scheduled on August 17, 2021 in London, UK. The goal of the webinar is therefore to bring together international researchers from industry and academia, from authorities and other institutions, from all over the world, to convey the information and share the latest developments across the immense and distinct fields of Mechatronics.

            2021 Conference Announcement Pages: 1 - 2

            2nd International Conference on Automation and Artificial Intelligence

            Natalia Williams

            Conference Series invites all the experts and researchers from the Automation and Artificial Intelligence sector all over the world to attend “2nd International Conference on Automation and Artificial Intelligence which is going to be held on June 24-25, 2022 at Toronto, Canada. Artificial Intelligence 2022 conference includes Keynote presentations, Oral talks, Poster Presentations, Workshops, and Exhibitors. Artificial Intelligence is a region of software engineering that emphasizes the production of intelligent machines that work and respond like people. Artificial intelligence is expert in studying how human brain thinks, learn, decide, and work while trying to solve a problem, and then using the products of this study as a source of increasing smart software and systems. In the real life, the knowledge has some undesirable properties. In the modern world, Artificial Intelligence can be used in many ways to control robots, Sensors, actuators etc.

            Image Article Pages: 1 - 1

            Optimizing Scenes for Better WebGL Performance

            Erica Cohen

            Geometry lies at the root of a 3D application as it forms the main shape of a model. To get smoother reflections and faster rendering you should keep
            the mesh as regular as possible. In the beginning, you should decide on the level of details you want to have in your scene, and stick to that when modelling; (B):
            When modeling creases, better use smooth groups instead of adding more polygons

            Image Article Pages: 1 - 1

            Simple SEM and TEM

            Erica Cohen

            A simple sketch of a Transmission Electron Microscope (TEM) and Scanning Electron Microscope (SEM) compared to an optical transmission microscope and a cathode ray tube (CRT) TV screen-both systems have many things on common with the electron microscope. The optical microscope uses lenses to control the lights pathway through the system and is in many ways built up like a TEM-only the TEM uses electromagnetic lenses to direct the beam of electrons. The CRT uses electromagnetic lenses as the TEM and SEM to control the electron beam, and generates an image for the viewer by scanning the beam over a fluorescent screen - in the same way the a SEM generates an image by scanning the electron beam over a small sample.

            Volume 13, Issue 8 (2022)

Google Scholar citation report
Citations: 664

Global Journal of Technology and Optimization received 664 citations as per Google Scholar report

Global Journal of Technology and Optimization peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward