At the Unit Laka Lantas Polres Lhokseumawe determining accident-prone areas on roads in Lhokseumawe still using manual systems. Determination of accident-prone areas are less effective because the police Unit Laka Lan...
详细信息
Traffic Lights Signaling Optimization consists in optimizing traffic-light cycle using optimization algorithms. In this context, a traffic simulator can represent different road intersections and traffic lights and ca...
详细信息
Traffic Lights Signaling Optimization consists in optimizing traffic-light cycle using optimization algorithms. In this context, a traffic simulator can represent different road intersections and traffic lights and can calculate traffic quality measures. A solution to this problem can be encoded in a vector representing the time of each traffic light on the simulator and the objective functions are the traffic quality metrics. Since there are several metrics this problem can be defined as a many-objective optimization problem. In spite of the existence of several objective functions, the majority of the related work selects a small set, often two. This paper proposes a many-objective optimization framework based on objective reduction to solve Traffic lights Signaling Optimization Problem. Here, twelve objective functions are used. To deal with the high number of metrics, objective reduction techniques are applied along a multi-objective evolutionary algorithm. An experimental set is conducted to analyze if it possible to reduce the number of objective functions on the Traffic lights Signaling Optimization Problem and if this reduction enhances the performance of the optimization algorithm.
Autism Spectrum Disorder is a pervasive developmental disorder that will affect children in terms of interpersonal communication, social interaction, and imaginative levels in play. Many therapies to help the motor ne...
Autism Spectrum Disorder is a pervasive developmental disorder that will affect children in terms of interpersonal communication, social interaction, and imaginative levels in play. Many therapies to help the motor neuron performance is one of them Pretend Play. Pretend Play is a therapy that invites children in playing to demonstrate something else and tell how to use objects that are considered in the child's imagination. However, in the era of highly developed technology, many fields have used the Augmented Reality method as a visualization of various aspects. With this method researchers will present the therapeutic visualization of the block to 3D transportation tool that is useful for strengthening motor nerves and visual strength of the child. The system can run well during marker detection, marker movement, and 3D object display with the accuracy of precision angle and distance between virtual world with real world reach 100% with angle 0 at distance 31 cm and the maximum distance from the marker is 46 cm and the maximum angle is 30˚.
The Pongkor post-mining area is designated as one of the ecotourism areas in Bogor. This area has biodiversity of flora and fauna. This study aims to: (1) analysis the importance value index (IVI) of flora types; (2) ...
The Pongkor post-mining area is designated as one of the ecotourism areas in Bogor. This area has biodiversity of flora and fauna. This study aims to: (1) analysis the importance value index (IVI) of flora types; (2) analysis species richness index, species diversity index, and relative species abundance index; (3) analysis the beauty, the uniqueness and the rarity of the flora and fauna types. The method used in this research is quantitative descriptive. Based on the identification results, 185 species of flora are distributed in this region. During the rainy season, 15 species of herpetofauna were identified, 32 types of aves, and 4 types of mammals, while in the dry season 19 species of herpetofauna were identified, 23 types of aves, and 2 types of mammals. Based on the results of the analysis conducted on these flora and fauna, there are flora species that have high IVI values and some beautiful and unique flora species that are in the category of endangered species. Besides that, there are also fauna species which have a value of species richness index, species diversity index, and relative species abundance index, as well as some beautiful, unique, and fauna species that are in the category of endangered species.
The current rapid assessment of post-earthquake damaged houses has been done manually. The determination of the damage level is also very subjective. Moreover, the available time during a rapid assessment and limited ...
The current rapid assessment of post-earthquake damaged houses has been done manually. The determination of the damage level is also very subjective. Moreover, the available time during a rapid assessment and limited number of enumerators lead to ineffective decisions for responses and assistances. There are several application had appeared trying to answer the problems, but still they have many types of data that need to be input and even need a lot of time to process. The system design to be simple, more user-friendly and time efficient to be operated during the assessment. This study is aimed to develop a conceptual design of a system to collect data of houses damaged by earthquake using mobile application which propose to work both online and offline. The system will consists of five components: mobile device, user, data center (web server and database), internet, and data processing center (administrator and manager to verify and analyze the data). The application design to be integrated with Google Maps containing concise data entry to facilitate users (trained users and common users) and to shorten the time of data collection. Final collected data will be presented through the website and perform descriptive and spatial analysis.
This article proposes an approach to generate test cases from BPMN models, for automated testing of Web applications implemented with the support of BPM suites. The work is primarily focused on functional testing and ...
详细信息
This article proposes an approach to generate test cases from BPMN models, for automated testing of Web applications implemented with the support of BPM suites. The work is primarily focused on functional testing and has the following objectives: (i) identify execution paths from the flow analysis in the BPMN model and (ii) generate the initial code of test scripts to be run on a given Web application testing tool. Throughout the article, we describe the design and implementation of a solution to achieve these goals, targeting automated tests using Selenium and Cucumber as tools. The approach was applied to processes from a public repository and was able to generate test scenarios from different BPMN models.
Cloud computing has been a great ally in the development of products and services with highly scalable, flexible, on-demand, providing big data to users in different administrative domains services. In this context, f...
详细信息
ISBN:
(纸本)9781509006809
Cloud computing has been a great ally in the development of products and services with highly scalable, flexible, on-demand, providing big data to users in different administrative domains services. In this context, federated identity management assist in the administration of access to services and privacy of Personally Identifiable Information (PII). The cloud may impose some security issues, especially some threats to sensitive data such as PII. Therefore, we present a model that addresses privacy issues of PII, considering aspects of dynamic federations, different policies, data manipulation rules and encryption. A prototype of the federation agreement, dynamic scopes and security policies was developed using OpenID Connect (OIDC).
Delay/Disruption-Tolerant Networks (DTNs) have been used in many different scenarios and are characterized by the high mobility of nodes, the constant disconnection, the high delays for message delivery and the freque...
详细信息
ISBN:
(纸本)9781509025275
Delay/Disruption-Tolerant Networks (DTNs) have been used in many different scenarios and are characterized by the high mobility of nodes, the constant disconnection, the high delays for message delivery and the frequent partitioning. The union of Vehicular Ad hoc Networks (VANETs) and DTNs has created a new research field in Vehicular Delay-Tolerant Networks (VDTNs) based on DTN's stored-carry-and-forward mechanism and applying it to the vehicular context. This mechanism allows messages to be routed to their destinations without the need of end-to-end connections. Due to the widespread availability of low cost on-board communication devices, message routing in VDTN has become an important research target. That is why many protocols can be found in the literature with the goal of overcoming the challenges encountered by applications developed for this context. Nevertheless, these proposed protocols do not take into consideration important requirements such as: no dependency on Road Side Units (RSU) and mechanisms to obtain information about the location of vehicles. This paper proposes and describes a message routing algorithm based on consciousness and human behavior in order to address the main demands of the VDTN environment.
This paper presents an approach for Web service (WS) composition that enables the automatic adjustment of the composition at run-time to deal with WS execution flaws, e.g., WS unavailability, failure to execute proper...
详细信息
ISBN:
(纸本)9781509006809
This paper presents an approach for Web service (WS) composition that enables the automatic adjustment of the composition at run-time to deal with WS execution flaws, e.g., WS unavailability, failure to execute properly or to produce desired results. The WS composition problem is converted into a nondeterministic planning problem which, by its turn, is mapped to SAT. Afterwards, a SAT solver obtains all the possible WS compositions with a maximum length N, which are then fused into a contingency strategy (CS) according to compatibility criteria. Such strategy enables the process execution engine to readily choose the most suitable WS composition to enact, and switch to an alternative composition with minimum adaptation cost in case of any WS execution flaw.
暂无评论