computer security is a very important thing in an information system. The strength of the NTRU algorithm is the difficulty of finding a short vector of a lattice (a discrete subgroup of a collection of vectors that in...
详细信息
Traffic signs are important markers in two-wheeled and four-wheeled vehicles. However, there is a change in direction or arrangement on the road that cannot be opened on a map which can cause incorrect information, wh...
详细信息
Motion planning for many unmanned aircraft is challenging because they have a larger configuration space than self-driving automobile development (Automated guided vehicles). Additionally, there are more significant u...
详细信息
Motion planning for many unmanned aircraft is challenging because they have a larger configuration space than self-driving automobile development (Automated guided vehicles). Additionally, there are more significant uncertainties and disruptions in UAV environments, which makes inter automatic navigation more difficult. In this letter, I proposed a 2 recurrent neural networks (RL) oriented multi-UAV collision avoidance technique by modeling the unpredictability or noise in the environment. Our objective is to create a strategy that can construct a path without clashing with anything using local noisy data. But unlike supervised algorithms, RL lacks a steady training data set with floor labels, thus its collision avoidance strategies often show significant fluctuation and are difficult to reproduce. To solve these issues, we created a two-stage training method for RL-based collision avoidance. We first optimize the policy, and then we utilize a supervised learning methodology with a loss function that encourages the agents to adopt the well-known reciprocity obstacle detection mechanism. In the second step, we use transmission to fine-tune the policy. The complete computer simulation findings demonstrate that this approach can handle noisy local views with erratic sound levels and can design moment & accident paths under inadequate sensing. We review the impact of our policies in a variety of ways.
Raspberry Pi is a mini-computer that is provided to carry out activities quickly and precisely, but Raspberry Pi was created to not be able to do the real-time system with the support of Windows 10 IoT operating syste...
详细信息
This research is about smooth support vector machine (SSVM) and Decision Tree in data mining. Many researchers conduct and develop methods to improve the accuracy and classification of data on good results. This resea...
详细信息
Indonesia meets the needs of 50% of the world's palm oil needs. Sources of Indonesian palm oil, 34 % are produced by independent smallholders. The lack of governance of independent smallholders leads to low produc...
Indonesia meets the needs of 50% of the world's palm oil needs. Sources of Indonesian palm oil, 34 % are produced by independent smallholders. The lack of governance of independent smallholders leads to low productivity of their crops. Global market demands for palm oil derivative sources become an obligation to compete. The development of blockchain technology that favors traceability and transparency is applied in the supply agriculture sector, and this is an opportunity for how blockchain technology can help the palm oil supply chain become transparent and can find its source. This research uses the system development life cycle (SDLC) method. And business process model and notation in business model design. The results of the design of the FFB sale and purchase transaction system with blockchain technology have succeeded in connecting farmer transactions as FFB providers with traders and PKS as FFB buyers. Every transaction sent by the farmer will be locked by a hash, as immunity makes the data sent immutable. The system can display the traceability of transactions while maintaining the integrity of member information.
Inundating a system, network, or application with traffic is the goal of Denial of Service (DoS) attacks, a disruptive form of attack. SSL DoS attacks, particularly those involving renegotiation, are of particular con...
Inundating a system, network, or application with traffic is the goal of Denial of Service (DoS) attacks, a disruptive form of attack. SSL DoS attacks, particularly those involving renegotiation, are of particular concern. In order to address these types of attacks, the study proposes several security measures, including rate restriction, session caching, SSL acceleration, and integrating Intrusion Detection Systems (IDS) with a systematic technique method to reduce the risks associated with SSL renegotiation DoS attacks. This study investigates the security measures for preventing and mitigating SSL DoS attacks, with a focus on renegotiation attacks. It offers advice and insights for protecting systems to SSL server administrators and network security professionals by doing rate restriction, session caching, and SSL acceleration to avoid SSL DoS attacks.
This study aims to know the comparison design of electric motorcycle using hybrid systems (BLDC Motor) based on parameter testing, i.e., with and without load. The design of electric motorcycles is centered on determi...
This study aims to know the comparison design of electric motorcycle using hybrid systems (BLDC Motor) based on parameter testing, i.e., with and without load. The design of electric motorcycles is centered on determining a feasibility study comparing engine drive with electric drive. Electric vehicles are the answer to decreasing petroleum supplies and environmental concerns that are worsening every year due to oil-fueled cars’ exhaust emissions. The proportion of motor vehicle exhaust as an air pollution source is between 60 and 70 percent. The global decrease of fossil fuels is also a critical issue that has yet to be handled. A descriptive statistic methodology was employed in this work as an analytical tool. The results showed when the speed increases, the efficiency of the BLDC motor would increase; this is, of course, following the principle of Orsted’s law and Lorentz force. When compared to the no-load test, the efficiency by using the load will be greater because when the BLDC motor works with a load, it will require greater torque due to an increase in load so that it takes a large amount of power so that it will increase the efficiency of the BLDC motor. When compared in terms of using the battery, the time of using the battery with no load will be longer because it does not require too much current.
Nowadays, The roads have increased the number of streetlights for the roads vehicles/pedestrians, which raises investment and energy. Observations made to obtain most of the road lights are always active at night, eve...
详细信息
ISBN:
(数字)9780738125176
ISBN:
(纸本)9781665418614
Nowadays, The roads have increased the number of streetlights for the roads vehicles/pedestrians, which raises investment and energy. Observations made to obtain most of the road lights are always active at night, even when there are no vehicles or pedestrians on the road. The problems that occur are the waste of energy sources that are used in streetlights. This research designs the concept of intelligent traffic flow based (LED) for energy optimization, maximum efficiency. This concept uses intelligent light architecture using the LoRaWAN Mesh network. The application of this concept offers system reliability, reduces costs, and makes user satisfaction. The results of this study are demonstrated by experimenting with comparing conventional LED lights. The proposed system, resulting in 33% to 62% energy savings depending on when the usage process in streetlights. Smart lighting LEDs with LoRaWAN provide a remote-control mechanism that can be dynamically adjusted based on environmental conditions, distance, and automatic motion.
This work used a variational quantum circuit (VQC) in conjunction with a quantitative structure-property relationship (QSPR) model to completely investigate the corrosion inhibition efficiency (CIE) displayed by pyrid...
详细信息
This work used a variational quantum circuit (VQC) in conjunction with a quantitative structure-property relationship (QSPR) model to completely investigate the corrosion inhibition efficiency (CIE) displayed by pyridine-quinoline compounds acting as corrosion inhibitors. Compared to conventional methods like multilayer perceptron neural networks (MLPNN), the VQC model predicts the CIE more accurately. With a coefficient of determination (R 2 ), root mean square error (RMSE), mean absolute error (MAE), and mean absolute deviation (MAD) values of 0.989, 0.027, 0.024, and 0.019, respectively, VQC performs better. The established VQC model predicts the CIE with outstanding predictive accuracy for four newly synthesized pyrimidine derivative compounds: 1-(4-fluorophenyl)- 3-(4-(pyridin-4-ylmethyl)phenyl)urea (P1) , 1-phenyl-3-(4-(pyridin-4-ylmethyl)phenyl)urea (P2) , 1-(4-methylphenyl)-3-(4-(pyridin-4-ylmethyl)phenyl)urea (P3) , and quaternary ammonium salt dimer (P4) . It generates remarkably high CIE values of 92.87, 94.05, 94.96, and 96.93 for P1, P2, P3, and P4, respectively. With its ability to streamline the testing and production processes for novel anti-corrosion materials, this innovative approach holds the potential to revolutionize the market.
暂无评论