In this study, Tech Zone Plaza conducted a testing phase using the system usability scale method, which is used with the aim of measuring how good a user experience is from software. The results of this test is used a...
详细信息
Accurate prediction of students’ graduation time is a significant challenge for academic institutions, especially in the context of optimizing educational outcomes and resource allocation. However, there is a researc...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
Accurate prediction of students’ graduation time is a significant challenge for academic institutions, especially in the context of optimizing educational outcomes and resource allocation. However, there is a research gap in identifying which machine learning algorithms are best suited for this task, particularly in the electrical and informaticsengineeringdepartment. This study addresses this gap by evaluating the performance of various machine learning algorithms in predicting students’ graduation time. Several algorithms, including Logistic Regression (LR), Decision Tree (DT), K-Nearest Neighbors (KNN), Random Forest (RF), Support Vector Machines (SVM), and Naive Bayes, were applied to a dataset consisting of academic and demographic records of students from a university in Indonesia. The evaluation used performance metrics such as accuracy, precision, recall, and F1-score. The results demonstrate that LR, KNN, DT, RF, and SVM exhibited comparable accuracy rates of 74%, with a weighted average F1-score of 0.85, indicating these algorithms are effective in classifying data. In contrast, Naive Bayes, while showing superior speed with an execution time of 0.018322 seconds, achieved lower performance with an accuracy of only 39% and a weighted average F1-score of 0.44. These findings suggest that selecting an algorithm should balance the trade-off between accuracy and time efficiency. For scenarios where both are important, LR and DT are optimal choices, while Naive Bayes may be suitable for faster processing at the expense of accuracy.
In this study, Tech Zone Plaza conducted a testing phase using the system usability scale method, which is used with the aim of measuring how good a user experience is from software. The results of this test is used a...
In this study, Tech Zone Plaza conducted a testing phase using the system usability scale method, which is used with the aim of measuring how good a user experience is from software. The results of this test is used as a reference for improving and adjusting the user interface based on the result and input from the test. Testing Tech Zone Plaza e-commerce uses System Usability Scale (SUS) Methods. There are several steps that must be followed in conducting a system usability scale. The steps are divided into 3 parts, Preparation, Execution, and Analysis The overall average SUS score is 74, on a scale of 0 to 100, indicating a moderately positive perception of the system's usability. According to the findings of this study, SUS ratings and individual responder feedback provide essential information for evaluating the system's usability. They serve as critical indications of strengths and shortcomings, highlighting areas for improvement and informing decision-making to improve the user experience. A full knowledge of the system's usability may be obtained by supplementing quantitative data from SUS scores with qualitative input from users, resulting in a system that better matches user expectations and requirements.
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...
详细信息
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this pap...
详细信息
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this paper,we introduce a cost-effective and energy-efficient mmWave-NOMA system that exploits sparse antenna arrays in the *** analysis shows that utilizing low-weight and small-sized sparse antennas in the Base Station(BS)leads to better outage probability *** also introduce an optimum low complexity Equilibrium Optimization(EO)-based algorithm to further improve the outage *** simulation and analysis results show that the systems equipped with sparse antenna arrays making use of optimum beamforming vectors outperform the conventional systems with uniform linear arrays in terms of outage probability and sum rates.
In the electric power equipment industry,various insulating materials and accessories are manufactured using petroleum-based epoxy ***,petrochemical resources are gradually becoming *** addition,the global surge in pl...
详细信息
In the electric power equipment industry,various insulating materials and accessories are manufactured using petroleum-based epoxy ***,petrochemical resources are gradually becoming *** addition,the global surge in plastic usage has consistently raised concerns regarding greenhouse gas emissions,leading to worsening global ***,to facilitate eco-friendly policies,industrialising epoxy systems applicable to high-pressure components using bio-based epoxy composites is *** results of the characterisation conducted in this research regarding bio-content were confirmed through thermogravimetric analysis and differential scanning calorimetry,which showed that as the bio-content increased,the thermal stability *** the operating temperature of 105℃ for the insulation spacer,structurally,no issues would be encountered if the spacer was manufactured with a bio-content of 20%(bio 20%).Subsequent tensile and flexural strength measurements revealed mechanical properties equivalent to or better than those of their petroleum-based *** impact strength tended to decrease with increasing *** the dielectric properties confirmed that the epoxy composite containing 20%biomaterial is suitable for manufacturing insulation ***,a series of tests conducted after spacer fabrication confirmed the absence of internal metals and bubbles with no external discolouration or cracks observed.
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochast...
详细信息
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochastic systems in state space form,subject to an average cost constraint.C_(FB) is the maximum rate of encoding signals or messages into randomized controller-encoder strategies with feedback,which control the state of the system,and reproducing the messages at the output of the system using a decoder or estimator with arbitrary small asymptotic error *** the first part of the paper,the authors characterize C_(FB) by an information theoretic optimization problem of maximizing directed information from the inputs to the outputs of the system,over randomized strategies(controller-encoders).The authors derive equivalent characterizations of C_(FB),using randomized strategies generated by either uniform or arbitrary distributed random variables(RVs),sufficient statistics,and a posteriori distributions of nonlinear filtering *** the second part of the paper,the authors analyze C_(FB) for linear-quadratic Gaussian partially observable stochastic systems(LQG-POSSs).The authors show that randomized strategies consist of control,estimation and signalling parts,and the sufficient statistics are,two Kalman-filters and an orthogonal innovations *** authors prove a semi-separation principle which states,the optimal control strategy is determined explicitly from the solution of a control matrix difference Riccati equation(DRE),independently of the estimation and signalling ***,the authors express the optimization problem of C_(FB) in terms of two filtering matrix DREs,a control matrix DRE,and the covariance of the innovations *** the paper,the authors illustrate that the expression of C_(FB) includes as degenerate cases,problems of stochastic optimal control and channel capacity of information transmission.
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB...
详细信息
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB),which is high-dimensional,non-convex,and non-linear,presents a significant *** address this problem,this paper proposes a method for approximating the SSRB in power systems using the feature non-linear converter and improved oblique decision ***,to better characterize the SSRB,boundary samples are generated using the proposed sampling *** samples are distributed within a limited distance near the ***,to handle the high-dimensionality,non-convexity and non-linearity of the SSRB,boundary samples are converted from the original power injection space to a new fea-ture space using the designed feature non-linear ***-sequently,in this feature space,boundary samples are linearly separated using the proposed information gain rate based weighted oblique decision ***,the effectiveness and generality of the proposed sampling method are verified on the WECC 3-machine 9-bus system and IEEE 118-bus system.
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectab...
详细信息
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the *** authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or *** authors present verification methods for strong CA-detectability and weak *** authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented *** development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.
暂无评论