Every human has a face pattern and certain characteristics even though identical twins, but the human face pattern still has its own distinctiveness as well as old face patterns and young face patterns even though the...
Every human has a face pattern and certain characteristics even though identical twins, but the human face pattern still has its own distinctiveness as well as old face patterns and young face patterns even though the human face pattern is very diverse but for young and old face patterns will be a difference between one face and the other face. Face detection (face detection) is one of the initial stages that very important in face recognition that is used in biometric identification. Face detection can also be used to search or index face data from images or videos that contain faces of various sizes, positions, and backgrounds. Face detection (face detection) automatically with the help of a computer is a problem that is not easy because the human face has a high level of variability both intra-personal and extra-personal variability. This study shows that systems with template matching methods combined with FAM can successfully detect differences in human faces, 80% accuracy, 10% better by using ordinary template matching.
This study proposes large force generation by a robotic manipulator by means of providing series elastic actuators exploiting mechanical resonance to it instead of powerful actuators. To this end, the authors designed...
This study proposes large force generation by a robotic manipulator by means of providing series elastic actuators exploiting mechanical resonance to it instead of powerful actuators. To this end, the authors designed and assembled a prototype of series elastic actuator that resonates at around 1.0 Hz on the basis of its model and identified parameters, and carried out preliminary experiments with it and a load. The prototype actuator consists of a geared DC motor with an encoder and an elastic element. The elastic element is made of two torsion springs so that it can generate torque in both directions. It was confirmed in the preliminary experiments that the prototype actuator resonated at around 0.7 Hz. In addition, in order to prove efficacy of mechanical resonance for large force generation, output torque of the prototype actuator with the elastic element and without it was estimated using their identified physical parameters and dynamics, and compared them. The estimation results showed that the prototype actuator exploiting mechanical resonance generated 2.24 times larger torque than the one without the elastic element.
The RSA public key cryptosystem was among the first algorithms to implement the Diffie-Hellman key exchange protocol. At the core of RSA's security is the problem of factoring its modulus, a very large integer, in...
The RSA public key cryptosystem was among the first algorithms to implement the Diffie-Hellman key exchange protocol. At the core of RSA's security is the problem of factoring its modulus, a very large integer, into its prime factors. In this study, we show a step-by-step tutorial on how to factor the RSA modulus using Euler's factorization algorithm, an algorithm that belongs to the class of exact algorithms. The Euler's factorization algorithm is implemented in Python programming language. In this experiment, we also record the relation between the length of the RSA moduli and its factorization time. As a result, this study shows that the Euler's factorization algorithm can be used to factor small modulus of RSA, the correlation between the factoring time and the size of RSA modulus is directly proportional, and better selection of some Euler's parameters may lead to lower factoring time.
Affinity Propagation Method it is necessary to modify the algorithm by using Principal Component Analysis (PCA). PCA method is used to reduce the attributes or characteristics that are less influential on the data so ...
Affinity Propagation Method it is necessary to modify the algorithm by using Principal Component Analysis (PCA). PCA method is used to reduce the attributes or characteristics that are less influential on the data so that the most influential attributes are obtained to then be carried out the clustering process with Affinity Propagation. The comparison results of the PCA + AP grouping model have better performance than the conventional AP grouping model. This is justified because the number of iterations and clusters produced by the PCA + AP clustering model does not change and converges when there are 8 optimal cluster clusters. While the performance of conventional clustering models produces an optimal number of clusters from 14 clusters with a significant number of iterations. So it can be concluded that the PCA + AP grouping model is suitable for the Air Quality dataset because it produces an optimal number of clusters and iterations of 8 clusters. The comparison results of the PCA + AP grouping model have better performance than the conventional AP grouping model. This is justified because the number of iterations and clusters produced by the PCA + AP clustering model does not change and converges when the optimal number of clusters is 5 clusters. While the performance of conventional clustering models produces a suboptimal number of 10 clusters with a significant number of iterations. So it can be concluded that the PCA + AP grouping model is suitable for the Water Quality Status dataset because it produces an optimal number of clusters and 5 cluster repetitions.
This study integrates the daily intercity migration data with the classic Susceptible-Exposed-Infected-Removed (SEIR) model to construct a new model suitable for describing the dynamics of epidemic spreading of Corona...
详细信息
BACKGROUND Radiologic adjacent segment degeneration(ASDeg)can occur after spinal *** segment disease(ASDis)is defined as the development of new clinical symptoms corresponding to radiographic changes adjacent to the l...
详细信息
BACKGROUND Radiologic adjacent segment degeneration(ASDeg)can occur after spinal *** segment disease(ASDis)is defined as the development of new clinical symptoms corresponding to radiographic changes adjacent to the level of previous spinal *** pre-existing ASDeg is generally considered to result in more severe ASDis;nonetheless,whether the ASDeg status before index surgery influences the postoperative risk of revision surgery due to ASDis warrants *** To identify possible risk factors for ASDis and verify the concept that greater preexisting ASDeg leads to more severe *** Data from 212 patients who underwent posterior decompression with Dynesys stabilization from January 2006 to June 2016 were retrospectively *** who underwent surgery for ASDis were categorized as group A(n=13),whereas those who did not were classified as group B(n=199).Survival analysis and Cox proportional hazards models were used to compare the modified Pfirrmann grade,University of California-Los Angeles grade,body mass index,number of Dynesys-instrumented levels,and *** The mean time of reoperation was 7.22(1.65–11.84)years in group A,and the mean follow-up period was 6.09(0.10–12.76)years in group *** significant difference in reoperation risk was observed:Modified Pfirrmann grade 3 vs 4(P=0.53)or 4 vs 5(P=0.46)for the upper adjacent disc,University of California-Los Angeles grade 2 vs 3 for the upper adjacent segment(P=0.66),age of<60 vs>60 years(P=0.9),body mass index<25 vs>25 kg/m2(P=0.3),and sex(P=0.8).CONCLUSION Greater preexisting upper ASDeg was not associated with a higher rate of reoperation for ASDis after Dynesys *** overweight tended to increase reoperation risk after Dynesys surgery for ASDis.
Z-bar shoeing has been implemented to relieve uniaxial palmar pain arising from the structures in the affected region. However, there have been no reports on the long-term application of the z-bar shoe during exercise...
In senior high schools, especially in the first class were required to place a department that is in accordance with the value produced. The application predicts student majors based on the value of students using art...
In senior high schools, especially in the first class were required to place a department that is in accordance with the value produced. The application predicts student majors based on the value of students using artificial neural network algorithms using rapid miner to be able to produce more precise and faster accuracy results. The results obtained from the analysis carried out obtained an accuracy value of 71.86%.ANN has a network architecture that is a single layer net. Networks that have more than one layer are called multilayer net and competitive layer networks (competitive layer net). The shape of a multilayer net 1 or more has between the input layer and the output layer, which weighs between 2 adjacent layers. ANN architecture using 3 layers is 7 input layers, 6 hidden layers, and 2 output layers. 20 neurons are the number of neuron outputs to artificial neural networks
K-Nearest Neighbor is a method of lazy learning method which is a group of instances-based learning. K-NN searches by searching for groups of objects in the training data that are closest to the object on new data or ...
K-Nearest Neighbor is a method of lazy learning method which is a group of instances-based learning. K-NN searches by searching for groups of objects in the training data that are closest to the object on new data or testing data. Support Vector Machine is a learning machine method that works with the aim of finding the best hyperplane that separates two classes in input space. school Achievement is an achievement obtained by serious learning and discipline. The category of outstanding students is to get a good average score and not have an attendance list, especially Absent (A) and a list of late attendance at school can be classified to obtain information on the accuracy of the data being tested. In the testing process both methods obtained good accuracy results between the two methods, namely K-NN obtained an accuracy of 88.52% while SVM is 91.07%.
暂无评论