Additive manufacturing, mainly 3D printing, has emerged as a transformative technology with widespread applications across various industries. Despite its advancements, filament brittleness remains a significant chall...
详细信息
ISBN:
(数字)9798350389241
ISBN:
(纸本)9798350389258
Additive manufacturing, mainly 3D printing, has emerged as a transformative technology with widespread applications across various industries. Despite its advancements, filament brittleness remains a significant challenge, undermining the quality and reliability of printed objects. In order to address this challenge, this study built a specialized temperature and humidity management system specifically for 3D printing applications. The system utilizes a Proportional-Integral-Derivative (PID) control technique to regulate the temperature within the filament storage environment, mitigating the impact of thermal fluctuations and moisture absorption. The system has been carefully developed and tested to assure optimal printing conditions, exceptional filament quality, and uniform print accuracy and precision. Since hardware testing confirms minimum disparities between sensor readings and reference measurements, reliability in environmental management is ensured for optimized print outcomes. Moreover, software testing ensures the PID controller's efficient functionality by providing real-time monitoring and control capabilities. Functional testing reveals the system's effectiveness in maintaining optimal storage conditions for various filament types, improving the quality of prints, and minimizing waste. Incorporating essential components such as sensors, actuators, and user interface elements guarantees seamless operation and intuitive engagement.
Blockchain introduction has made a revolutionary change in the crypto currency around the world but it has not delivered on its promises of free and faster transaction confirmation. Serguei Popov's proposal of usi...
详细信息
This paper develops a new meta-heuristic algorithm, called Membrane Algorithm based on Quasi-Affine TRansformation Evolution (MA-QUATRE). The proposed algorithm combines the principles of QUATRE, the one-level membran...
详细信息
In today’s digital era, the internet is an indispensable platform for self-expression, facilitating communication, idea sharing, and community formation. Language, a pivotal tool in these online interactive spaces, i...
In today’s digital era, the internet is an indispensable platform for self-expression, facilitating communication, idea sharing, and community formation. Language, a pivotal tool in these online interactive spaces, is vital in reflecting personal identities, notably gender identification. This paper investigates gender identification on online discussion platforms, recognizing the crucial role of language in reflecting personal identities. The study employs Natural Language Processing techniques and machine learning algorithms to analyze data from a public discussion website. Beginning with a comprehensive literature review, the research explores the nexus between gender and language in online and offline contexts. The methodology involves data gathering, extensive preprocessing, and in-depth exploratory analysis, employing statistical methods and graphical representations. The study then rigorously evaluates their accuracy and effectiveness by applying diverse algorithms and models for gender-based text categorization. Results indicate the superior performance of transformer models, particularly distilBERT, in categorizing gender accurately. Additionally, the research underscores the challenges of gender-neutral analysis, emphasizing the need for inclusive methodologies in non-binary gender classification. The study contributes to the broader field of gender studies, providing valuable insights for future research and discussions on the interplay of gender and language in online spaces.
It is known that every tensor has an associated semi-symmetric *** purpose of this paper is to investigate the shared properties of a tensor and its semi-symmetric *** particular,a corresponding semi-symmetric tensor ...
详细信息
It is known that every tensor has an associated semi-symmetric *** purpose of this paper is to investigate the shared properties of a tensor and its semi-symmetric *** particular,a corresponding semi-symmetric tensor has smaller Frobenius norm under some conditions and can be used to get smaller bounds for eigenvalues and solutions of dynamical systems and tensor complementarity *** addition,every tensor has the same eigenvalues as its corresponding semi-symmetric form,also a corresponding semi-symmetric tensor inherits properties like being circulant,Toeplitz,Z-tensor,M-tensor,H-tensor and some ***,there are a two-way connection for properties like being positive definite,P-tensor,semi-positive,primitive and several others.
User Experience (UX) evaluation has a significant importance for any interactive application. Mobile device applications have additional limitations to convey good user experiences (UX) due to the usage and features o...
详细信息
Stress is a problem with various adverse effects, such as mental disorders and suicide. With these problems arising, a stress detection system is needed as an initial examination of the level of stress experienced. Ge...
详细信息
ISBN:
(数字)9798350379914
ISBN:
(纸本)9798350379921
Stress is a problem with various adverse effects, such as mental disorders and suicide. With these problems arising, a stress detection system is needed as an initial examination of the level of stress experienced. Generally, stress detection is done with a stress test at a hospital. However, medical examinations done in the hospital require high costs. Another alternative to examine stress levels is by using a biosignal electroencephalogram (EEG), which provides more objective and accurate results. In addition, there is a need to develop a portable device that can be used to detect stress. This study tries to detect stress levels using EEG Signals. The data used in this study is primary data that simulates several stress-level activities. In total, 55 subjects participated in this stress detection research. The received signal goes through preprocessing to clean it from noise and artifacts. The data will be extracted using Power Spectral Density (PSD) into power value for each signal frequency. The preprocessed input signals are then classified into indications of stress levels. This study uses Random Forest, SVM, and Decision Tree. The model is stored on a portable system with Raspberry Pi as the main component. EEG signals are taken using electrodes on Muse 2 and sent to the system. The classification model generates predicted stress levels and is displayed on a 16×2 LCD. SVM as the best model test result achieved a testing accuracy of 1, and an average computation time of 0.92.
3D object reconstruction is a vital obstacle within computer vision, and several techniques have been proposed to tackle it. However, the automation of the reconstruction process continues to pose a significant challe...
详细信息
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and wide...
详细信息
ISBN:
(数字)9798350368833
ISBN:
(纸本)9798350368840
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and widespread appeal, deception of this sort is hurting millions of people and growing more dangerous. The current work, as part of the AILA (Artificial Intelligence-driven Framework and Legal Advice Tools for Phishing Prevention and Mitigation in Information Systems) project, aims to specify and validate an AI-driven multifactor (human, technology and legal) anti-phishing data model, with the implementation of focus group studies. The findings assist to provide human, technology, and legislative user model endpoints that will be identified and discussed for explicit and implicit user modeling, which will guide the development of the corresponding AI-driven user modeling and profiling mechanisms. To this end a Large Language System is planned to be employed.
This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for anal...
This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for analyzing user activity in NGINX logs. The proposed method does not require a labeled dataset and is capable of efficiently identifying different user anomalies in large datasets with millions of daily requests. The results of the analysis provided a deeper understanding of user behavior when seeking updates through web requests and aided in interpreting the findings. Clustering the anomalies helped to produce typical clusters and further supported the interpretation of the results. This work provides valuable insights into user behavior in web server networks and highlights the importance of efficient anomaly detection techniques in large datasets. The findings have potential real-world applications in the field of cybersecurity, particularly in providing network security analysts with an automated and more objective approach to threat analysis. This study showcases the importance of automated methods for analyzing user activity in web server networks and provides a more objective and efficient approach to detecting user anomalies in large datasets. This approach contributes to the development of more effective and precise cybersecurity systems, ultimately improving the protection of network infrastructures from malicious attacks.
暂无评论