We propose a family of multivalue collocation methods for the numerical solution of differential problems, potentially candidate to be stiff. For this reason, the suggested numerical schemes have strong stability prop...
We propose a family of multivalue collocation methods for the numerical solution of differential problems, potentially candidate to be stiff. For this reason, the suggested numerical schemes have strong stability properties, such as A-stability. Moreover, in order to obtain an efficient implementation, it is desirable to impose the conditions gaining a structured coefficient matrix of the nonlinear system for the computation of the internal stages. The construction of these methods has been presented and the properties of the resulting formulae have been verified experimentally.
The car crash caused by unconcentrated driving always happens. Meanwhile, these car accidents not only crash cars, but also hurt innocent people. In order to avoid the accidents mentioned above, this study refers to a...
The car crash caused by unconcentrated driving always happens. Meanwhile, these car accidents not only crash cars, but also hurt innocent people. In order to avoid the accidents mentioned above, this study refers to a number of methods to detect driving concentration. Moreover, we find that detecting driving concentration for vehicle drivers is an important research gap. Therefore, we combined the computer vision method and proposed the driving monitoring system for concentration on mobile devices.
Currently, the Database Management System (DBMS) keeps growing and is available on various platforms. The use of various types of DBMS in a system can cause problems with limitations in the synchronization process bec...
Currently, the Database Management System (DBMS) keeps growing and is available on various platforms. The use of various types of DBMS in a system can cause problems with limitations in the synchronization process because each DBMS only provides synchronization methods for similar DMBS. Previous research has examined heterogeneous database synchronization algorithms on mobile devices using the Message Digest 5 (MD5) method. The process of synchronization with this method is done by comparing the hash values of each record data in the source table with the data hash values in the destination table. If a different hash value is obtained, the synchronization process is based on the type of transaction that has been determined. Based on the principle of work, this algorithm requires a long synchronization time for large-scale databases because it has to check the hash values of each data record. This study examined the performance analysis of the DBMS synchronization method using MD5. The testing was performed by observing the parameters of execution time of synchronization ptocess for the MySQL DBMS and PostgreSQL types. The results showed that the execution time of the MD5 synchronization process was proportional to the number of data records that need to be synchronized. This is because the hashing process that must be done on every data record and synchronization mechanism requires all data to be sent to check and compare the hash values of each data record in the destination synchronization database even though the data has not changed.
Conjugate heat transfer due to the solid at the inner surface is investigated when the outer surface is heated to hot temperature and inner surface is maintained at lower temperature. The present article is continuati...
Conjugate heat transfer due to the solid at the inner surface is investigated when the outer surface is heated to hot temperature and inner surface is maintained at lower temperature. The present article is continuation of the article that discussed the effect of physical parameters. This article is specifically focused to discuss the geometric parameters such as aspect ratio, radius ratio and the solid width radio on heat transfer characteristics. Finite element method is used to solve the equations derived from basic principles to represent momentum equation, energy equation and the conduction equation in solid wall.
The process of generating keys is an important topic in the field of information security and networks and there is a need to generate good keys that are not easily breakable. In this paper, a method is suggested for ...
The process of generating keys is an important topic in the field of information security and networks and there is a need to generate good keys that are not easily breakable. In this paper, a method is suggested for generating numbers based mainly on the movement of the knight tour in the chessboard and digital images. The generated keys used an image that could be found anywhere possible in mobile images or social media or websites. The image is taken and divided into blocks and then determine the primary path as well as Identifying possible knight tour movements with a condition not returning to the place in the track, the unused place in chessboard is merged at the end of the series for increasing randomness, as well as the exclusive or operation applied between the block and it's transposed before starting a movement. The results obtained show that the proposed approach can effectively produce pseudo-random numbers, high linear complexity, security properties, and good statistical. The quality measurement of the generated key is assigned using NIST tests, some of these tests are applied and passed the tests. It is possible to combine the method with other key generation methods such as future work.
Economic emission dispatch (EED) problems are one of the most crucial problems in power systems. Growing energy demand, limitation of natural resources and global warming make this topic into the center of discussion ...
Economic emission dispatch (EED) problems are one of the most crucial problems in power systems. Growing energy demand, limitation of natural resources and global warming make this topic into the center of discussion and research. This paper reviews the use of Quantum Computational Intelligence (QCI) in solving Economic Emission Dispatch problems. QCI techniques like Quantum Genetic Algorithm (QGA) and Quantum Particle Swarm Optimization (QPSO) algorithm are discussed here. This paper will encourage the researcher to use more QCI based algorithm to get better optimal result for solving EED problems.
Nowadays, there are more and more robots replace human being’s job. In recent years, the researches accelerate the technology development of multi rotor drone and make it become the flying robot that can self-stabili...
Nowadays, there are more and more robots replace human being’s job. In recent years, the researches accelerate the technology development of multi rotor drone and make it become the flying robot that can self-stabilize and fly according to the waypoints setting by ground station. Therefore, this project designs a system to detect the efficacy of solar panel by UAV integrated with thermal sensors. Firstly, UAV flies above solar panel, takes picture by thermal sensors and transmits to website automatically. Secondly, the system cuts out the area that out of the panel, examine every pixel of the picture and calculates the ratio of red pixels that present the area of overheat. Finally, the system reports the efficacy of solar panel by program that judges from the ratio of overheat, weather condition, etc. By this way, we can save a lot of time and detect the solar panel safely.
This paper presents a study on GPS Based Location Monitoring System with Geo-fencing Capabilities. This system provided a high-security system that prevents vehicles from being stolen. It also issued an alert to the u...
This paper presents a study on GPS Based Location Monitoring System with Geo-fencing Capabilities. This system provided a high-security system that prevents vehicles from being stolen. It also issued an alert to the user based on the boundary of the location by using the Internet of Things (IoT). In this study, the system could easily monitor and track the location of the vehicle and was able to issue an alert when the vehicle exited the geofence area. This system was separated into two parts which were the hardware and software. The hardware parts were the ESP8266 NodeMCU and GPS module while Google Maps and IoT platform were the software parts. The admin could monitor the vehicle via the computer, and the notification alert was sent to the registered email of the admin when the vehicle exited or entered the geofence area. The prototype system was tested by moving the vehicle around the geofence area. The results showed the correct location of the vehicle and email notification alert when it exited or entered the boundaries. The location accuracy of about 95% compared to the real-map on the mobile phone.
The usage of technologically advanced devices has seen a boom in many domains, including education, automation, and healthcare; with most of the services requiring Internet-connectivity. To secure a network, device id...
The usage of technologically advanced devices has seen a boom in many domains, including education, automation, and healthcare; with most of the services requiring Internet-connectivity. To secure a network, device identification plays key role. In this paper, a device fingerprinting (DFP) model, which is able to distinguish between Internet of Things (IoT) and non-IoT devices, as well as uniquely identify individual devices, has been proposed. Four statistical features have been extracted from the consecutive five device-originated packets, to generate individual device fingerprints. The method has been evaluated using the Random Forest (RF) classifier and different datasets. Experimental results have shown that the proposed method achieves up to 99.8% accuracy in distinguishing between IoT and non-IoT devices and over 97.6% in classifying individual devices. These signify that the proposed method is useful in assisting operators in making their networks more secure and robust to security breaches and unauthorised access.
The pyrotechnic mixtures are highly explosive in nature. In this research a mixture of flash powder composition is used. The mixture is prepared by mixing aluminium, potassium nitrate and sulphur. In the manufacturing...
The pyrotechnic mixtures are highly explosive in nature. In this research a mixture of flash powder composition is used. The mixture is prepared by mixing aluminium, potassium nitrate and sulphur. In the manufacturing process of flash powder composition, the total weight consist of 23% of aluminium (grade 999), 57% of potassium nitrate and 20% of sulphur are added. Till date various accidents were reported during the manufacturing process of the flash composition. As an alternate for of this, five different mixture proportions were taken by varying components percentage level in the mixture. Subjected to various study those five different composition mixture are taken determine their effective function and also to understand their performance during processing and burning. Impact sensitivity experiment is performed for five different mixtures in order to determine the minimum energy which is required to initiate the firing and it has been analysed. Thermal Characteristics of five different composition were analysed using Differential Scanning Calorimeter (DSC) to determine the rate of heat flow with respect to time.
暂无评论