Robots also have been trusted to help human to complete difficult jobs, for example, finding for the earthquake, a fire, or a sinking ship victims. The robot must be reliable, clever and moving automatically. The aim ...
详细信息
Robots also have been trusted to help human to complete difficult jobs, for example, finding for the earthquake, a fire, or a sinking ship victims. The robot must be reliable, clever and moving automatically. The aim of this study is to develop and apply the application of artificial RAM-based neural networks (WNNs) on a mobile robot using a multilayer processing architecture with memory optimizations on to address and input pattern, so that producing smart navigation model which it has a simpler computational load and faster execution time. The gained result from the first study was the percentage of memory optimization in the amount of 50%. This result obtained from the formerly RAM using 8 bit data width has been optimized to 4 bits. Both of the percentage of data optimization pattern is 93.75%. This percentage is obtained from the optimization pattern (pattern taken is 4 bits MSB), each 1 bit data can handle 15 unseen patterns.
The paper presents a method to determine a position of objects in three dimentional coordinates. The proposed method uses a vision-based localization using two low cost cameras. The formulation is derived by using a p...
详细信息
The paper presents a method to determine a position of objects in three dimentional coordinates. The proposed method uses a vision-based localization using two low cost cameras. The formulation is derived by using a pin-hole camera principal to project a location of a point in a 2D image into 3D space. This method can be used for indoor unmanned aerial vehicles localization to provide position information for control and navigation purposes.
Space time models such as the Generalized Space Time Autoregressive (GSTAR) is an important theoretical research topics with many applications in large number of areas ranging from the spread of diseases, mining, econ...
Space time models such as the Generalized Space Time Autoregressive (GSTAR) is an important theoretical research topics with many applications in large number of areas ranging from the spread of diseases, mining, economic growth, ecology, agriculture and population development. In this paper we introduce a clustering spatial for determining a group of locations for weight matrix of the GSTAR model. We use Ordinary Least Squares method to estimate the parameters of model and apply the result to develop a GSTAR-Kriging model for replacement new oil wells at volcanic field in Jatibarang, West Java-Indonesia.
To investigate the genetic basis of type 2 diabetes (T2D) to high resolution, the GoT2D and T2D-GENES consortia catalogued variation from whole-genome sequencing of 2,657 European individuals and exome sequencing of 1...
To investigate the genetic basis of type 2 diabetes (T2D) to high resolution, the GoT2D and T2D-GENES consortia catalogued variation from whole-genome sequencing of 2,657 European individuals and exome sequencing of 12,940 individuals of multiple ancestries. Over 27M SNPs, indels, and structural variants were identified, including 99% of low-frequency (minor allele frequency [MAF] 0.1-5%) non-coding variants in the whole-genome sequenced individuals and 99.7% of low-frequency coding variants in the whole-exome sequenced individuals. Each variant was tested for association with T2D in the sequenced individuals, and, to increase power, most were tested in larger numbers of individuals (>80% of low-frequency coding variants in ~82 K Europeans via the exome chip, and ~90% of low-frequency non-coding variants in ~44 K Europeans via genotype imputation). The variants, genotypes, and association statistics from these analyses provide the largest reference to date of human genetic information relevant to T2D, for use in activities such as T2D-focused genotype imputation, functional characterization of variants or genes, and other novel analyses to detect associations between sequence variation and T2D.
The use of circulant matrix as the sensing matrix in compressed sensing (CS) scheme has recently been proposed to overcome the limitation of random or partial Fourier matrices. Aside from reducing computational comple...
详细信息
BlackBerry is not just an ordinary smartphone which rich in its multimedia features. BlackBerry also has very reliable internet services, include BlackBerry Messenger, e-mail, other instant messaging, and other intern...
详细信息
Software development is a series of processes activity involving more than one person, especially in medium to large software projects. Each activity of software development is carried out by various combination of di...
详细信息
BlackBerry is not just an ordinary smartphone which rich in its multimedia features. BlackBerry also has very reliable internet services, include BlackBerry Messenger, e-mail, other instant messaging, and other intern...
详细信息
BlackBerry is not just an ordinary smartphone which rich in its multimedia features. BlackBerry also has very reliable internet services, include BlackBerry Messenger, e-mail, other instant messaging, and other internet service that Blackberry Internet Service (BIS) covers. However, there's an open question that all services that go through BIS is safe or not; considering the data includes text and files which is sent through BIS have to pass through the main server which is located in Canada. Therefor in this paper we chose to make software that can encrypt and decrypt text and even files, which will be sent through BlackBerry's internet or just to be stored in the BlackBerry device. In this paper, we use cipher block encryption algorithm with Cipher Feedback (CFB) 8-bit mode. This mode is chosen because it suits with the data inside BlackBerry device which is 8-bit aligned. The encryption algorithm uses cipher block encryption with 64-bit block size. We designed the algorithm based on Feistel network combined with some encryption/decryption algorithm. Then the cipher block encryption algorithm is implemented in software based on Java for BlackBerry. In this software development, we use the IDE Eclipse Ganymede with certain plugins. The expected result is software for BlackBerry capable to encrypt and decrypt some texts, either directly typed or saved as files on the BlackBerry device. This software also handles specific file types, such as picture and audio by preserving their file header, and also handles text encryption by transforming the ciphertext data to hex digits. After conducting some experiments, we conclude that the software has good compatibility with many kinds of BlackBerry devices and has good security level.
The tsunami evacuation simulation which combines tsunami inundation simulation and people evacuation simulation was confirmed to be one of the effective disaster education tools from the experiences in Japan. This sim...
详细信息
ISBN:
(纸本)9781880843826
The tsunami evacuation simulation which combines tsunami inundation simulation and people evacuation simulation was confirmed to be one of the effective disaster education tools from the experiences in Japan. This simulation technology has been advanced and applied to the west half of the tsunami risk area of Banda Aceh. And, its utilization methodology for tsunami disaster education and for city planning has been studied under the cooperation with the school teachers and the city office staffs. Linking these two simulations onto a common time-domain, the animation is compiled and the number of casualties is counted from the location of evacuee and the spot depth of tsunami. The study originated the road network data and population data of Banda Aceh using a high resolution satellite image and door-to-door visits. Several simulations were developed under different scenario parameters such as the timing of the start of evacuation, the method of moving (car is available or not), and the destination of the evacuees. The simulation handles more than 10 thousand agent models.
暂无评论