Results (440)
Search Parameters:
Keyword: ProblemNonlinear parabolic problem with lower order terms in Musielak-Orlicz spaces
We prove an existence result of entropy solutions for the nonlinear parabolic problems: \(\frac{\partial b(x,u)}{\partial t} + A(u) - div(\Phi(x,t,u))+H(x,t,u,\nabla u) =f,\) and \(A(u)=-div(a(x,t,u,\nabla u))\) is a Leary-Lions operator defined on the inhomogeneous Musielak-Orlicz space, the term \(\Phi(x,t,u)\) is a Cratheodory function assumed to be continuous on u and satisfy only the growth condition \(\)\Phi(x,t,u)\leq…
Read MoreSteel heat treating: mathematical modelling and numerical simulation of a problem arising in the automotive industry
We describe a mathematical model for the industrial heating and cooling processes of a steel workpiece representing the steering rack of an automobile. The goal of steel heat treating is to provide a hardened surface on critical parts of the workpiece while keeping the rest soft and ductile in order to reduce fatigue. The high…
Read MoreSolving the SAT problem using Genetic Algorithm
In this paper we propose our genetic algorithm for solving the SAT problem. We introduce various crossover and mutation techniques and then make a comparative analysis between them in order to find out which techniques are the best suited for solving a SAT instance. Before the genetic algorithm is applied to an instance it is…
Read MoreSolving the Capacitated Network Design Problem in Two Steps
In this paper, we propose a two steps-based algorithm to solve the modular link version of the Capacitated Network Design Problem (CNDP) which consists to determine the optimal network that guarantees the routing of a set of commodities. In our proposition, CNDP is divided into two sub-problems: Network Design problem (NDP) and Network Loading Problem…
Read MoreThe Class Imbalance Problem in the Machine Learning Based Detection of Vandalism in Wikipedia across Languages
This paper analyses the impact of current trend in applying machine learning in detection of vandalism, with the specific aim of analyzing the impact of the class imbalance in Wikipedia articles. The class imbalance problem has the effect that almost all the examples are labelled as one class (legitimate editing); while far fewer examples are…
Read MoreDevelopment and Application of Value Karuta to Understand Value in Lean Management: Initial Small-group Trial in Japan and the UK
This study proposes the Value Karuta (VK), an application of the traditional Japanese card game karuta. Its goal is to contribute to the understanding of value, which is the first principle of lean management. After stating the problems of lean management and the specifications of VK, this paper confirms the validity of the proposal by…
Read MoreEvaluation of a Classroom Support System for Programming Education Using Tangible Materials
In recent years, the utilization of tangible educational materials has attracted attention on educational settings. They provide hands-on learning experiences for beginners. This trend is especially notable in the field of programming education. Such educational materials are employed in many institutions worldwide. They liberate learners of programming from programming languages that are confined in a…
Read MoreWeb Application Interface Data Collector for Issue Reporting
Insufficient information is often pointed out as one of the main problems with bug reports as most bugs are reported manually, they lack detailed information describing steps to reproduce the unexpected behavior, leading to increased time and effort for developers to reproduce and fix bugs. Current bug reporting systems lack support for self-hosted systems that…
Read MoreIoT and Business Intelligence Based Model Design for Liquefied Petroleum Gas (LPG) Distribution Monitoring
Gas leakage caused by various causes poses significant risks to public safety. To address this problem, an intelligent model is proposed for the accurate monitoring of Liquefied Petroleum Gas (LPG) distribution based on the integration of Internet of Things (IoT) and Business Intelli- gence (BI) technologies. Through the use of sensors and actuators, it seeks…
Read MoreOn Mining Most Popular Packages
In this paper, we will discuss two algorithms to solve the so-called package design problem, by which a set of queries (referred to as a query log) is represented by a collection of bit strings with each indicating the favourite activities or items of customers. For such a query log, we are required to design…
Read MoreAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreAnalysis of Components and Effects of Chest Compression Posture using CPR Training System
Cardiopulmonary resuscitation (hereafter CPR) is a life-saving procedure to combat our day-to-day risks of cardiac arrest. However, there are a few citizens who can accurately carry out CPR by encountering the scene of the cardiac arrest of others, and there are many unclear parts on the methods such as the correct attitude of CPR, and…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreTree-Based Ensemble Models, Algorithms and Performance Measures for Classification
An ensemble method is a Machine Learning (ML) algorithm that aggregates the predictions of multiple estimators or models. The purpose of an ensemble module is to provide better predictive performance than any single contributing model. This can be achieved by producing a predictive model with reduced variance using bagging, and bias using boosting. The Tree-Based…
Read MoreThe Graded Multidisciplinary Model: Fostering Instructional Design for Activity Development in STEM/STEAM Education
In a challenging and increasingly technological world, it is important to promote critical thinking, multidisciplinary problem solving, and collaboration through STEAM education; however, there are important economic, administrative, and especially pedagogical manage- ment limitations for its implementation at the secondary level. Therefore, this paper presents systematic recommendations for an effective and sustainable implementation of STEAM…
Read MoreThe Effect of Introduction of Wind Energy System on the Energy Networks
The increase electricity production based on renewable energies sources responds to the requirements of sustainable development. In recent years, the investment in the wind energy sector has increased to satisfy green electricity generation and environment protection. Wind energy is currently the most competitive energy resource that is part of the world’s countries views on the…
Read MoreA Circuit Designer’s Perspective to MOSFET Behaviour: Common Questions and Practical Insights
Metal Oxide Semiconductor Field-Effect Transistors are commonly taught in courses for electrical engineers as they are the most common components within integrated circuits. However, despite numerous papers and books on MOSFETs, students still struggle with understanding their behaviour, particularly in the saturation region. This paper presents an expanded explanation of MOSFET behaviour, with a consistent…
Read MoreImproving License Plate Identification in Morocco: Intelligent Region Segmentation Approach, Multi-Font and Multi-Condition Training
The exponential growth in the number of automobiles over the past few decades has created a pressing need for a robust license plate identification system that can perform effectively under various conditions. In Morocco, as in other regions, local authorities, public organizations, and private companies require a reliable License Plate Recognition (LPR) system that takes…
Read MoreSocial Financial Technologies for the Development of Enterprises and the Russian Economy
The main contradiction identified in the study is that the existing scientific and methodological solves of economy development management processes does not create prerequisites for improving the efficiency of their work, the introduction of progressive technologies for material and moral stimulation of the work of performers and administrative and managerial personnel, advanced social mechanisms for…
Read MoreForecasting the Weather behind Pa Sak Jolasid Dam using Quantum Machine Learning
This paper extends the idea of creating a Quantum Machine Learning classifier and applying it to real weather data from the weather station behind the Pa Sak Jonlasit Dam. A systematic study of classical features and optimizers with different iterations of parametrized circuits is presented. The study of the weather behind the dam is based…
Read MoreNavigation Aid Device for Visually Impaired using Depth Camera
People with visual impairment face daily struggle of navigating through unfamiliar places. This problem mainly caused by their lack of spatial awareness, i.e., the ability to estimate the distance between themselves and their surroundings. In order for visually impaired people to navigate independently, an effective navigation aid is required. The proposed navigation aid device utilizes…
Read MoreTemperature-Compensated Overcharge Protection Measurement Technology
Recently, many problems have been caused by battery fires. The existing BMS(Battery Managment System) measured the voltage of each cell of the battery through the physical connection between the battery and the control module. However, if a battery with up to 1000 VDC becomes inoperable due to an external factor, the battery is damaged, and…
Read MoreMultiple Criteria Decision-making: Risk Analyses for the Soft Target
This article focuses on risk analysis using a multi-criteria decision-making method. Due to many performed risk analyses for soft targets, we are constantly trying to find new methods for objective risk assessment. Many risk analyses are subjective, which is a problem when planning security measures and comparing results (different events, objects, places, etc.). In this…
Read MoreA Model for Teaching Mathematics to Gifted Students Based on an Effective Combination of Various Approaches for their Preparation
Currently one of the urgent goals of mathematical education is the organization of effective work with gifted students. Based on the study of various approaches to teaching mathematically gifted students, many years of experience of teachers, students’ work, and an analysis of curricula and materials for schools with in-depth study of mathematics, an author’s model…
Read More
