Cable models for high-frequency studies require the calculation of per-unit-length parameters in a wide frequency range. Analytical methods, such as the one implemented in the Line/Cable Constants routine available in...
详细信息
Game Relations and Functions are digital game-based learning in junior high school mathematics subjects. In this study will discuss how to use the game Relationships and Functions that have been designed using the Bal...
Game Relations and Functions are digital game-based learning in junior high school mathematics subjects. In this study will discuss how to use the game Relationships and Functions that have been designed using the Balanced Design method. The research method used was a quasi-experiment with the One group Pretest Post-test design. A total of 40 junior high school students were involved in this study to determine differences in student learning outcomes in the cognitive domain before and after using the Relationship and Function games. The instrument used is a type of multiple choice objective test of 20 questions with details of 8 questions related to relations material and 12 questions related to functions material. The results showed that there were differences in the improvement of student learning outcomes before and after using the game Relations and Functions in Mathematics subjects.
This paper approaches the classic problem of robotics' Inverse Kinematics. This problem does not have a trivial solution due its solution complexity, in addition to multiple solutions for the same final position o...
详细信息
This paper approaches the classic problem of robotics' Inverse Kinematics. This problem does not have a trivial solution due its solution complexity, in addition to multiple solutions for the same final position of the robotic actuator. The number of solutions increases with the number of degrees of freedom. In this context, the goal of this paper is to present a solution to this problem through the application of an Artificial Neural Network (ANN) in a robotic arm with 4 degrees of freedom in three dimensions. Initial results with a set of seven points using two different ANN configurations were convincing.
This paper describes the development of a robust object recognition system which combines object's parts, for automatic construction equipment tracking camera on unmanned construction site. Although a construction...
详细信息
ISBN:
(纸本)9781509015740;9781509015733
This paper describes the development of a robust object recognition system which combines object's parts, for automatic construction equipment tracking camera on unmanned construction site. Although a construction equipment operator monitors manually and operates construction equipment through captured surveillance camera video in the worksite of unmanned construction, they need an automatic tracking system for construction equipment in order to work efficiently. Since there is difficulty of automation such as some parts of construction equipment are not captured in the video because of construction works, we have developed a robust system which recognizes construction equipment using combination of their parts. Before we start making whole system, we developed object recognition algorithm for construction equipment. The object: construction equipment, recognition algorithm discussed in this paper is developed based on estimating its type by combining its parts found in an image. This system has three features to realize the process: part extraction step, part recognition step and part combination step. The part extraction step extracts object candidates including parts of construction equipment from an input image. In the part recognition step, they are recognized and labeled. The part combination step combines the labeled data and estimates construction equipment's type using neural networks. Experimental results show that the system which combines parts of construction equipment is able to estimate its type even if some parts of it are hidden. We also describe its improvement in terms of the processing time.
This research aims to develop an anomaly prediction method only based on sensor data acquired from machine tools. In order to realize this aim, first of all, it is necessary to extract the feature to classify whether ...
详细信息
ISBN:
(纸本)9781509015740;9781509015733
This research aims to develop an anomaly prediction method only based on sensor data acquired from machine tools. In order to realize this aim, first of all, it is necessary to extract the feature to classify whether the machine tool is in an anomalous state or normal state. This paper shows the result of examining the feature extraction method of machine tool applying distribution and chaos theory to acquired sensor data. In the distribution method, an anomalous state and a normal state are compared by creating a frequency distribution diagram using the heat map. In chaos theory, the anomalous state and the normal state are compared by reconstructing attractors using Takens' embedding theorem. In addition, quantitative evaluation using topological geometry to the anomaly prediction of machine tools is considered and its result is shown. Both methods, the distribution and chaos theory, were confirmed their features for classifying the normal state and the anomalous state. And, we also confirmed the effectiveness of the quantitative analysis of the reconstructed attractors by using the method of topological geometry.
Cryptography is the science and art of maintaining the security of messages when messages are sent from one place to another. One of the ways securing the form of text message information is by the encryption process ...
Cryptography is the science and art of maintaining the security of messages when messages are sent from one place to another. One of the ways securing the form of text message information is by the encryption process using the Vigenere Cipher algorithm and utilizing the One Time Pad (OTP) algorithm as a key generator, where the message will be random when it is opened. The message encryption process used the vigenere cipher algorithm while OTP is used to secure the key with the same formula. After this research has been done, an application was designed to secure text messages by converting the text message into a random message so that the message was unreadable due to a secret message that could not be known by others. The results achieved can secure an encrypted message that cannot be reopened and if those messages were reopened, they must be decrypted.
Module as a media of learning and training, which especially the students studying in institutions offering education at undergraduate and associate levels can employ as a PLC (programmable Logic Controller) controlle...
Module as a media of learning and training, which especially the students studying in institutions offering education at undergraduate and associate levels can employ as a PLC (programmable Logic Controller) controlled simulator of the logic gate, timer and counter. During industrial manufacturing processes, has been actualized through this work, for the purpose of training qualified technical personnel needed by companies, who are specialized in control and electro mechanics. It was found that, students are very happy learning to use the module so with very significant contributes to a large extent to the training process in favor of faculty members, who are to train personnel for the sector, and in favor of students, who should be able to acquire proper education. Working on the training tool allows students to acquire knowledge and practical skills and then make use of those skills for troubleshooting and control of machinery.
An in situ measurement of spin transport in a graphene nonlocal spin valve is used to quantify the spin current absorbed by a small (250 nm × 750 nm) metallic island. The experiment allows for successive depositi...
详细信息
In consumer generated media (CGM) site, such as YouTube and nicovideo, only few contents are viewed very much, but most contents are only viewed few times. Our research target CGM sites are *** and ***. *** is a popul...
详细信息
暂无评论