In this paper, a simple path correction and obstacle avoidance method with a bipedal robot for the learning stratification and performance, using an ultrasonic sensor and electronic compass sensor, is proposed. This b...
详细信息
In this paper, a simple path correction and obstacle avoidance method with a bipedal robot for the learning stratification and performance, using an ultrasonic sensor and electronic compass sensor, is proposed. This bipedal robot was comprised using the Lego NXT Intelligent Bricks. The proposed method is implemented on an autonomous humanoid robot (the ARSR). One ultrasonic sensor and one electronic compass sensor are installed on the ARSR to detect environmental information including obstacles, the distance to the obstacle, and the directional angle of the robot. Based on the obtained information, an obstacle avoidance and path correct method is proposed to decide the ARSR's behavior so that it can avoid obstacles and move effectively to the destination area. Obstacle avoidance experiments are carried out to confirm the effectiveness of the proposed method and confirm the learning stratification and performance.
Intrusion Detection System provides services related to surveillance of computer security, as one of the minimum components that must exist in a computer network architecture. Regarding the adoption of cloud technolog...
Intrusion Detection System provides services related to surveillance of computer security, as one of the minimum components that must exist in a computer network architecture. Regarding the adoption of cloud technology, many users have switched to using cloud computers to operate servers, applications, or the web in cloud computing. To meet the security needs of users, various open source and commercial tools are being developed. Although many developments have taken place in the IDS area, in cloud-based IDS many challenges such as security, interoperability, resource scheduling, virtualization still need to be improved. This paper reviews the paradigms and surveys about the Intrusion Detection System that runs on cloud computing in terms of concepts, technology, tools, and various challenges. A systematic literature review of selected papers, published from 2016 to 2020, was carried out to properly understand the Intrusion detection System paradigm in cloud computing and the security challenges faced in cloud computing. This review paper helps researchers who want to start their research careers in the cloud computing-based Intrusion Detection System
The complexity calculation is one of the things to be considered in choosing an algorithm to be applied to a decision support system (DSS). This study analyzes the complexity of Technique for Order Preference by Simil...
The complexity calculation is one of the things to be considered in choosing an algorithm to be applied to a decision support system (DSS). This study analyzes the complexity of Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) algorithm. This algorithm is applied to the ranking process to resolve the problems associated with Multi-Criteria Decision Making (MCDM). MCDM is used for Group Decision Making (GDM) problems in making a decision. The end output of this study is making DM ranking resulted from decision-making. This problem also produces TOPSIS algorithm complexity used in group decision-making. This algorithm complexity is in the part of attribute normalization and weighting which results in O(n2). Whereas the complexity of a positive-negative ideal solution and V distance to A1, A2, A3, and A4 is O(n) and the algorithm complexity ranking results in O(1).
This research is an analysis of the application of the SAW, WP and TOPSIS methods to the support system for decision making at university. The types of scholarships provided are PPA education scholarships given by the...
This research is an analysis of the application of the SAW, WP and TOPSIS methods to the support system for decision making at university. The types of scholarships provided are PPA education scholarships given by the Kementerian Riset, Teknologi dan Pendidikan Tinggi. The research variables are the attributes or criteria specified by the Directorate General of Learning and Student Affairs as contained in the 2018 Academic Achievement Improvement (PPA) guidebook. Decision Support Systems apply the classic FMADM method SAW, WP and TOPSIS. The results of this study are the application of the both methods of SAW and WP produce the same ranking and TOPSIS giving different rankings.
Determining the important weight of learning competency is an important problem for students’ assessment in credentialing and certification decision-making. Learning competencies should have importance weight that de...
Determining the important weight of learning competency is an important problem for students’ assessment in credentialing and certification decision-making. Learning competencies should have importance weight that definitely affect the final decision, and can represent strengths and weaknesses of student achievement of certain competencies. The weight of learning competency is determined based on its difficulty level, which is identified by the depth, scope and complexity of material involved in it. The dependency among learning competencies must also be considered in determining the weight. Therefore, this study aims to develop a weighting method based on combining rating scale and fuzzy analytic network process (FANP) to determine the weight of learning competency. Using the proposed method, the weight of learning competency is obtained and then can be used in calculating the final score for students’ assessment.
We consider a problem of quantitative static elastography, the estimation of the Lamé parameters from internal displacement field data. This problem is formulated as a nonlinear operator equation. To solve this e...
详细信息
For most herbivorous animals, group-living appears to incur a high cost by intensifying feeding competition. These costs raise the question of how gregariousness (i.e., the tendency to aggregate) could have evolved to...
详细信息
Due to the global situation, it is necessary for an industrial company to integrate production scheduling and traceability planning, in a way to get more reliable stand and to make economics advantages. This paper pre...
Due to the global situation, it is necessary for an industrial company to integrate production scheduling and traceability planning, in a way to get more reliable stand and to make economics advantages. This paper presents biomass supply chain company which could produce a renewable energy. Traceability is a tracking requirement to check whether the quality of the product is satisfied. The supply chain of biomass planning problem aims to meet customer demand subject to traceability and other restrictions. The problem is modelled as a mixed integer linear program, and then it is solved using neighborhood search approach.
作者:
Hafner, ANArnold N. Hafner
Ph.D.:is founder and president of Information Systems Research (ISR). He has twenty-five years of experience in systems development and is published in the field of systems development management. He served as corporate research scientist at Systems Exploration Inc. from 1988 to 1991 program director at Computer Science Corporation from 1983 to 1988director of operations at Republic Management Systems Corporation from 1981 to 1983
and program manager at Computer Science Corporation from 1972 to 1981. A 1962 graduate of the US. Naval Academy he holds a doctoral degree in human behavior and engineering degrees in electronics and communications. He has taught courses on information systems and systems management at most of the colleges in the San Diego area. Dr. Hafner has presented fourteen refereed research papers while publishing sixteen articles and a book A Manager's Guide to Software System Development.
Evaluating complex systems is the subject of this paper, the third in a series investigating prototyping. It provides an interesting and helpful overview of how to evaluate systems prototypes and outlines the iterativ...
详细信息
Evaluating complex systems is the subject of this paper, the third in a series investigating prototyping. It provides an interesting and helpful overview of how to evaluate systems prototypes and outlines the iterative stream of developer-user interactions that is replacing older approaches to testing and evaluating new military systems, which promise to reduce the time required to develop and field future military capabilities. Changes to the acquisition process, such as those the paper sketches, will facilitate the nation's rapid transit through its current revolution in military affairs.
Data Envelopment Analysis (DEA) is a linear programming-based technique used to evaluate the relative efficiency of multi-input and multi-output decision-making units based on observed data by comparing one decision-m...
Data Envelopment Analysis (DEA) is a linear programming-based technique used to evaluate the relative efficiency of multi-input and multi-output decision-making units based on observed data by comparing one decision-making unit (DMU) with another DMU. The efficacy assessment process sometimes involves a stochastic approach due to the uncertainty inherent in many real life problems, so the DEA model discussed in this paper is the stochastic DEA (SDEA) model. Data-driven decision-making is based entirely on the data involved. This paper proposes a framework for the completion of SDEA based on a data-driven approach.
暂无评论