Results (482)
Search Parameters:
Keyword: algorithmWilson-Hilferty-type Approximation for Poisson Random Variable
The possibility to apply non-linear transformation of the Wilson-Hilferty type to the Pois- son random variable is investigated using an analytic approach, in order to improve the convergence towards the large-parameter Gaussian limit. Considering the already existing non-linear transformation for the Gamma distribution, the original Wilson-Hilferty and a higher-order transformations are showed and approximations for…
Read MoreThe Adventure of BipBop: An Android App Pathfinding Adventure Game
The purpose of this research is to build an android based pathfinding adventure game where user gets information about Indonesian culture, especially the traditional houses including the folk songs and the traditional weapons in certain areas. The method used is by questionnaires, interviews, observation, and literature study. This application also implements the A* algorithm to…
Read MoreSystem of Sequential D-Optimal Identification for Dynamic Objects in Real-Time Scale
The article is devoted to the formalization and development of the theory of sequential experimental design for optimal identification of dynamic objects. The algorithmic and technical support for a system of sequential D-optimal identification for a wide class of dynamic objects in real time is considered. This system is universal and can be used for…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read MoreNew Color Image Encryption for Medical Images Based on Three Dimensional Generalized Chaotic Cat Map and Combined Cellular Automata
Medical images are transmitted via the Internet or the hospital intranet which include many important information about the patient’s personal information. Medical image encryption is a technology that can effectively protect the information contained in these medical images. In this paper, we give a secure and trusty Combined Cellular Automata (CoCA) based medical image encryption…
Read MoreA Regenerative Energy Recovery System for Electric Vehicles Charging A Battery at A Low Speed
In this paper, a regenerative energy recovery system for electric vehicles charging a battery at a low speed is proposed. When a permanent magnet synchronous motor driving the electric vehicles is driven by a generator, the generated voltage is controlled to rise or drop by using the L-C resonance circuit. As the circuit only has…
Read MoreDistributed Linear Summing in Wireless Sensor Networks with Implemented Stopping Criteria
Many real-life applications based on the wireless sensor networks are equipped with data aggregation mechanisms for suppressing or even overcoming negative environmental effects and data redundancy. In this paper, we present an extended analysis of the linear average consensus algorithm for distributed summing with bounded execution over wireless sensor networks. We compare a centralized and…
Read MoreA New Distributed Reinforcement Learning Approach for Multiagent Cooperation Using Team-mate Modeling and Joint Action Generalization
This paper focuses on the issue of distributed reinforcement learning (RL) for decision-making in cooperative multi-agent systems. Although this problem has been a topic of interest to many researchers, results obtained from these works aren’t sufficient and several difficulties have not yet been resolved, such as, the curse of dimensionality and the multi-agent coordination problem.…
Read MoreResource Selection Service Based on Neural Network in Fog Environment
As an emergent technology in Internet of Things (IoT), the ultimate target of fog computing is to provide a widely distributed computational resources and data repository closer to the network edge providing heterogeneous systems both in terms of software and hardware. The fog system must have the capability to deal with huge number of resources…
Read MoreStress Response Index for Traumatic Childhood Experience Based on the Fusion of Hypothalamus Pituitary Adrenocorticol and Autonomic Nervous System Biomarkers
Stress occurring in the early days of an individual was often assumed to cause several health consequences. A number of reports indicated that having to deal with unfavourable events or distress situation at a young age could tweak stress responses leading to a broad spectrum of poor mental and physical health condition. Therefore, changes identified…
Read MoreA Smart Box for Blood Bags Transport: Simulation Model of the Cooling Autonomy Control System
This paper faces the topic of blood products transport by applying simulation, control and data exchange technologies in order to implement a safe and efficient integrated transportation system. As known, the bio-chemical properties of blood and its derivatives are subjected to deterioration whenever a well determined temperature range is not respected for an excessive time…
Read MoreClassification Model of Contact Center Customers Emails Using Machine Learning
E-mail is one of the media services used at the contact center. The challenge faced by e-mail services is how to handle e-mails that enter large quantities every day efficiently to provide fast and appropriate service to customers. The purpose of this study is to find which method has the best accuracy in classifying emails…
Read MoreConstrained Path Planning for Both Smooth Motion Profile and Stable Control
In our era, human and machine must share the same workspace in various plants such as warehouse logistics, material transportation, manufacturing factory or assisted human. The collaboration is essential to maintain the safe operation and the complete mission. In this paper, a design of anti-vibration scheme using Spline generator for grounded vehicle platform in human-machine…
Read MoreModelling the Methodology to Assess the Effectiveness of Distributed Information Systems
This research aims to develop the methodology to assess effectiveness of distributed information systems (hereinafter IS). The effectiveness of information systems is reviewed along with their reliability. The article underlines the importance of reliability assessment for large geographically distributed systems. We suggest the approach based on the hierarchical presentation of reliability scheme that constitutes the…
Read MoreWindowing Accuracy Evaluation for PSLR Enhancement of SAR Image Recovery
Synthetic aperture radar (SAR) is an imaging device mounted on a moving platform. Its ability to identify a weak target from a nearby strong one depends upon the peak side lobe ratio (PSLR). This paper is intended to ameliorate such important ratio through the use of windowing of the transmitted pulse and studying the noise…
Read MoreANFIS-Based Climate Controller for Computerized Greenhouse System
The greenhouse climate system is very hard to manipulate because the variables involved are closely correlated. This study aims to enhance the regulation performance of greenhouse climate system based on adaptive neural-fuzzy inference system (ANFIS). The ANFIS is a hybrid technique that incorporates the fuzzy logic theory and artificial neural network algorithms. The employed control…
Read MorePerformance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. Due to the mobility-related instability of the paths between nodes and due to the limited buffer and energy resources, the ultimate objective of routing protocols in opportunistic…
Read MoreNovel Cost Function based Motion-planning Method for Robotic Manipulators
In this paper an offline motion-planning algorithm is presented for robotic manipulators. In this method to solve the path-planning task, the Transition-based Rapidly-exploring Random Tree (T-RRT) algorithm was applied, that requires a cost-function over the search space. The goal of this cost-function is to keep distance between the actual position and configurations that cause collisions.…
Read MoreA Multi-Objective Voltage Optimization Technique in Distribution Feeders with High Photovoltaic Penetration
With increasing photovoltaic (PV) penetration on distribution feeders, voltage functions is always a challenge. To control these variations due to the intermittent nature of PV generation,many utility companies use the traditional voltage regulating devices such as ON/OFF load tap changers, voltage regulators, switched capacitor banks and reactors. The use of smart inverters (SI) has been…
Read MoreA Method for Mosaicking Aerial Images based on Flight Trajectory and the Calculation of Symmetric Transfer Error per Inlier
In recent years, development of aerial autonomous systems and cameras have allowed increasing enormously the number of aerial images, and their applications in many research areas. One of the most common applications is the mosaicking of images to improve the analysis by getting representations of larger areas with high spatial resolution. This paper describes a…
Read MoreData Dashboard for Decision Support Systems for Intrapreneurship in A Company
Nowadays, as the Information and Technology rapidly growing all across the world, Indonesia as one of many developed countries always tries to keep up relating to this trend. Regarding to this situation, the use of Information and Technology in various fields are greatly enhanced, and not to mention businesses. There are a lot of businesses…
Read MoreA New Wire Optimization Approach for Power Reduction in Advanced Technology Nodes
In advanced technologies nodes, starting from 28 nm to 7 nm and below, the power consumed of integrated circuits (ICs) becomes a big concern. Consequently, actual electronic design automation (EDA) tools are facing many challenges to have low power, reduced area and keep having required performance. To reach required success criteria, and because each picosecond…
Read MoreSpiral Curve for Revocable Touchless Fingerprint Template Securisation
Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…
Read MoreA Word Spotting Method for Arabic Manuscripts Based on Speeded Up Robust Features Technique
The diversity of manuscripts according to their contents, forms, organizations and presentations provides a data-rich structures. The aim is to disseminate this cultural heritage in the images format to the general public via digital libraries. However, handwriting is an obstacle to text recognition algorithms in images, especially cursive writing of Arabic calligraphy. Most current search…
Read MoreEKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection
Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…
Read More
