Results (23)
Search Parameters:
Author/Affiliation: AlexanderThe First Study on Ionospheric Peak Variability over Equatorial Africa (COSMIC-2)
In regions like the African equatorial region, where ground-based sensors like ionosondes and incoherent scatter radars are limited, satellite-based radio occultation (RO) observations offer a new alternative for ionospheric data collecting and optimization. Using RO measurements from the mostly newly launched COSMIC-2 (Constellation Observing System for Meteorology, Ionosphere, and Climate-2) mission, hence, the equatorial Africa,…
Read MoreARAIG and Minecraft: A Modified Simulation Tool
Various interruptions to the daily lives of researchers have necessitated the usage of simulations in projects which may not have initially relied on anything other than physical inquiry and experiments. The programs and algorithms introduced in this paper, which is an extended version of research initially published in ARAIG And Minecraft: A COVID-19 Workaround, create…
Read MoreEffectiveness of Gamified Instructional Media to Improve Critical and Creative Thinking Skills in Science Class
Gamified Instructional Media has recently been widely used in the education sector to improve students’ abilities. Using Gamified Instructional Media at the elementary school level becomes more interesting because it is in accordance with the way children learn K1-K6. The research aims to identify the gamified instructional using Genially to improve students’ critical and creative…
Read MoreEstimation of Non-homogeneous Thermal Conductivity using Fourier Heat Equation Considering Uncertainty and Error Propagation
The present work develops an estimator for thermal conductivity using a simple exper- iment implemented in a simulated solid metallic bar. The bar is sectioned in a finite number of segments, lately called nodes, and a discretization of the Fourier heat equation is applied in each node to generate a timed-spaced model of the temperature…
Read MoreProblems of Increasing the Intelligence of Algorithms for Optimal Distribution of the Current Load on the Combined Heat and Power Plant and Ways to Solve Them
The problem of optimal distribution of the current load of a combined heat and power plant with a complex composition of equipment is considered. A multi-criteria approach is proposed for parts of graphs with a constant load in time, considering the factors of economy, reliability and ecology. For sections of the graph with a time-variable…
Read MoreSEA WAF: The Prevention of SQL Injection Attacks on Web Applications
The security of website application has become important in the last decades. According to the Open Web Application Security Project (OWASP), the SQL Injection is classified as one of the major vulnerabilities found in web application security. This research is focused on improving website security in dealing with SQL Injection attacks by stopping, monitoring, and…
Read MoreCurrent Views on Issues and Technology Development in Forensic Accounting Education of Indonesia
The objective of this study is to examine the current views of academics on issues and technology development in forensic accounting education. By applying the explanatory sequential mixed method, this study tries to acquire a better understanding of current perception regarding forensic accounting education. This study indicates that demand for forensic accounting services is expected…
Read MoreDevelopment of Secondary Processing Data Methods under Single Point Thunderstorm Activity Monitoring
Forecasting the occurrence and development of thunderstorms near insured mobile objects, such as aircraft carriers, oil tankers, requires the usage of appropriate single-point monitoring systems (SPMS) of thunderstorm activity. These systems must be small and included in the equipment of the objects. A SPMS based on EH location finder meets the requirements of small dimensions.…
Read MoreAccelerating Decision-Making in Transport Emergency with Artificial Intelligence
The paper addresses speeding up meetings in a networked environment during rescue works in a transport emergency. Several groups of representatives of various services and observers participate in those meetings. The number of wrong decisions tends to increase because remote participants cannot understand each other quickly. First, the meetings must be efficiently held to avoid…
Read MoreTo the Question of Multi-Criteria Optimization of Aircraft Components in Order to Optimize its Life Cycle
The paper examines the impact on the product life cycle of reducing the duration of the development stages of aviation technology through the use of multi-criteria optimization. The subject of the study is the nose of a supersonic aircraft and the process of linking it. This example describes in detail the application of a comprehensive…
Read MoreFour-Dimensional Sparse Data Structures for Representing Text Data
This paper focuses on a string encoding algorithm, which produces sparse distributed representations of text data. A characteristic feature of the algorithm described here, is that it works without tokenizing the text and can avoid other data preparation steps, such as stemming and lemmatization. The text can be of arbitrary size, whether it is a…
Read MoreEnergy Recovery Equipment and Control Strategies in Various Climate Regions
Different types of air-to-air energy recovery technologies such as coil loops, heat pipes, sensible wheels, and total energy wheels are frequently incorporated in HVAC systems in an attempt to reduce energy consumption. This study examines the impact of various types of energy recovery technologies and capacity control strategies on a building’s cooling, heating, and fan…
Read MoreThe Adventure of BipBop: An Android App Pathfinding Adventure Game
The purpose of this research is to build an android based pathfinding adventure game where user gets information about Indonesian culture, especially the traditional houses including the folk songs and the traditional weapons in certain areas. The method used is by questionnaires, interviews, observation, and literature study. This application also implements the A* algorithm to…
Read MorePerformance Analysis of Thyristors Switched Capacitors used for Reactive Power Compensation of Induction Motor
This paper analyzes the process of reactive power compensation using thyristors switched capacitors TSC topology based on multiterminal switch during the starting of induction motor. The paper explains the control principle of this TSC topology which depends on the multiterminal switch. To actively track the required reactive power for the dynamic load and to perfectly…
Read MoreCognitive Systems for Monitoring: Architectural View
The modern stage of information technology development is characterized by the acute need to use cognitive technologies for the solution of tasks of practice, in particular, in the sphere of real world objects monitoring and management. Practical usage of cognitive systems of monitoring is significantly limited to two factors now: operation at the level of…
Read MoreComputational and Technological Models of Cognitive Monitoring Systems
The approach to the construction of promising cognitive monitoring systems is considered. Based on the analysis of known solutions, the problem of automatic synthesis of computational models of cognitive monitoring is posed. In the synthesis of models, it is proposed to reduce them to relatively finite operational automata. An example of a synthesized model of…
Read MoreDesign of an Additively Manufacturable Multi-Material Light-Weight Gripper with integrated Bellows Actuators
Combining state-of-the-art additive manufacturing technologies with structural optimization has the potential to produce geometrically complex multi-material components with integrated functionalities and desired structural behavior. In this article, the simulation-driven design process of a multi-material light-weight gripper with an integrated pneumatic bellows actuator is described. The design of the bellows structure is based on a previously…
Read MoreProbabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots
This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…
Read MoreVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read MoreMathematical Model Based on Newton’s Laws and in First Thermodynamic Law of a Gas Turbine
The present article explains the modeling of a Gas Turbine system; the mathematical modeling is based on fluid mechanics applying the principal energy laws such as Euler’s Law, Newton’s second Law and the first thermodynamic law to obtain the equations for mass, momentum and energy conservation; expressed as the continuity equation, the Navier-Stokes equation and…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MoreDesign of Petri Net Supervisor with 1-monitor place for a Class of Behavioral Constraints
This paper studies the design of supervisory controllers with a minimum number of monitor places for Manufacturing System modeled as safe Petri Nets. The proposed approach considers a class of safety specifications known as Behavioral Constraints with a restricted syntax. The set of Behavioral Constraints are represented as predicate logic formulas in normal conjunctive form.…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read More
