Airport runway designs must consider wind climatology to reduce the potential for crosswind and tailwind events that can cause accidents and aircraft delays. The large potential of crosswind and tailwind on a runway a...
Airport runway designs must consider wind climatology to reduce the potential for crosswind and tailwind events that can cause accidents and aircraft delays. The large potential of crosswind and tailwind on a runway at the airport is very detrimental to aircraft passengers and airlines. Therefore, it is necessary to know the potential of crosswind and tailwind on the runway of Soekarno Hatta Airport and find the right parameters for the approximate direction and speed of the wind on the airport runway. Analysis was carried out using the direction and wind speed data from the Soekarno Hatta meteorological station in 2007-2017 to determine the potential for crosswind and tailwind on the runway of Soekarno Hatta airport and run a Weather Research and Forecasting (WRF) weather model to determine the parameterization of the right weather model for wind forecast at Soekarno Hatta airport. The highest maximum crosswind component in the 2007-2017 period occurred in August 30.53 knots, while the highest maximum tailwind of 25 knots occurred in January for a 250-degree runway and 24 knots occurred in August for a 070-degree runway. The potential for crosswind and tailwind is different every month. The scheme produces forecasts of wind direction and speed with a strong level of correlation with observations of wind direction and speed from the Soekarno Hatta meteorological station, the correlation value is 0.61. The most significant social impact of plane delays is time loss for passengers. While the economic impact on one of the crosswind events at Soekarno Hatta airport was an economic loss for one airline of US $ 43,392.
Document management system makes user to access information anytime and anywhere. The purpose of this research is to analyze what variables have impact on the intention to use of document management system. To achieve...
详细信息
As machine learning methods see greater adoption and implementation in high stakes applications such as medical image diagnosis, the need for model interpretability and explanation has become more critical. Classical ...
详细信息
Various deep learning applications on smartphones have been rapidly rising, but training deep neural networks (DNNs) has too large computational burden to be executed on a single smartphone. A portable cluster, which ...
详细信息
This Full-paper in the Innovative-Practice Category introduces an innovative visual-privacy themed experiential-learning tool, and discusses how it is used for building human-privacy plus societal-security awareness i...
详细信息
ISBN:
(数字)9781728117461
ISBN:
(纸本)9781728117478
This Full-paper in the Innovative-Practice Category introduces an innovative visual-privacy themed experiential-learning tool, and discusses how it is used for building human-privacy plus societal-security awareness in middle-school and high-school youth. The new GDPR driven business-communications are touching the lives of worldwide-consumers, including youth, who use technology-services, like internet and email, from an early age. A lack of privacy-security awareness in this context may expose youth. The new CSTA-standards advocate for inclusion of privacy, safety, ethics, societal-security and human-privacy topics in K-12. Existing literature show multiple instances of K-12 research-studies on data-privacy education and cybersecurity awareness. However, very few of these explore the visual-privacy theme in a way that middle-school and high-school youth can learn privacy, security and ethics through the lens of privacy-enhancing video-surveillance. This paper presents our simple but novel, visually interactive experiential-learning tool, which is based upon the PVA theme as applicable to visual-media contents. Our unique tool introduces young learners to privacy-security concepts, illustrates applied-cryptography and discusses privacy-security tradeoffs in surveillance-space. The educational application of this tool addresses the gap within the current K-12 educational-research work in societal-security implications and human-privacy domain. We discuss our experimental-studies with this tool, including piloting the tool-based hands-on workshop sessions with middle-school and high-school learners, as part of GICS and NSA-GenCyber projects. Additionally, we share and analyze the learning-assessment data and survey-responses collected from participants, in an effort to evaluate the prospects of our experiential-learning model as a potential educational and outreach medium for engaging and recruiting K-12 students in computing-disciplines.
Multiple-input multiple-output (MIMO) system relies on a feedback signal which holds channel state information (CSI) from receiver to the transmitter to do pre-coding for achieving better performance. However, sending...
Multiple-input multiple-output (MIMO) system relies on a feedback signal which holds channel state information (CSI) from receiver to the transmitter to do pre-coding for achieving better performance. However, sending CSI feedback at each time stamp for long duration is an overhead in the communication system. We introduce a deep reinforcement learning based channel estimation at receiver end for single user MIMO communication without CSI feedback. In this paper we propose to train the receiver with known pilot signals to analyse the stochastic behaviour of the wireless channel. The simulation on MIMO channel with additive white Gaussian noise (AWGN) shows that our proposed method can learn the different characteristics affecting the channel with limited number of pilot signals. Extensive experiments show that the proposed method was able to outperform the existing state-of-the-art end to end reinforcement learning method. The results demonstrate that the proposed method learns and predicts the stochastic time varying channel characteristic accurately at receiver's end.
The main issue related to Software-Defined Network emulators is how to replicate real behavior in experiments. Mininet and others SDN emulators have an architecture that limits both the scope of experiments and the fi...
详细信息
IntroductionStandard maximum vertical jump (MVJ) has been applied to assess lower limb long countermovement (CM) on countermovement jump (CMJ) and short CM on drop jump (DJ) for comparison to squat jump (SJ) without C...
IntroductionStandard maximum vertical jump (MVJ) has been applied to assess lower limb long countermovement (CM) on countermovement jump (CMJ) and short CM on drop jump (DJ) for comparison to squat jump (SJ) without CM [1,2]. Research questionNevertheless, the ability for lower limb joint accelerations depending on lower limb joint angles at long, short and no CM remains an open issue [3,4], in particular linearity assessment of these relations at long, short and no CM in association with MVJ whole-body impulsion. MethodsFor this reason, we applied piecewise linear detection of segmented subphases on lower limb joint angles ( θ)-angular acceleration ( α) diagrams for the hip (H), knee (K) and ankle (A) during impulse phases on CMJ, DJ and SJ. Selected sample corresponds to best MVJ trials based on higher flight-time of 3 CMJ, DJ and SJ repetitions for six healthy untrained subjects with ages (21.5±1.4) years, (76.7±9.3)kg mass and (1.79±0.06)m height. Adhesive reflective markers were applied at lower limb and torso, with sagittal hip, knee, and ankle θ, α obtained by inverse kinematics. H,K,A ( θ, α) diagrams were plotted and impulsion subphases segmented at selected instants of ∂ a/∂ q phase reversal with linear fit by the least-squares method, Fig. 1. Fig. 1. Hip, knee, ankle joint ( θ, α) diagrams at CMJ, DJ, SJ with segmented subphases time span(Δt), |∂α/∂θ| slope magnitudes and R² linear fit regression. ResultsSJ presented larger number of ( θ, α) subphases than DJ, both larger than CMJ with higher |∂ α/∂ θ| variation at DJ and SJ than CMJ, pointing to higher complexity of neuromuscular control and contributing to explain reduced SJ, DJ performance without CM (0.33±0.05)m and with short CM (0.27±0.03)m in relation to CMJ with long CM (0.36±0.04)m for untrained selected subjects, Fig. 1. Thus, despite the larger total time span Δt at CMJ (0.76±0.10)s in relation to SJ (0.36±0.08)s and DJ (0.23±0.05)s, CMJ presented lower number of subphases with longer time span
Goldilocks quantum cellular automata (QCA) have been simulated on quantum hardware and produce emergent small-world correlation networks. In Goldilocks QCA, a single-qubit unitary is applied to each qubit in a one-dim...
详细信息
暂无评论