The collection, transfer and integration of research information into different research information systems can result in different data errors that can have a variety of negative effects on data quality. In order to...
详细信息
Artificial neural networks (ANNs), while exceptionally useful for classification, are vulnerable to misdirection. Small amounts of noise can significantly affect their ability to correctly complete a task. Instead of ...
详细信息
A mobile ad hoc network (MANET) is an infrastructure less, autonomous, and standalone network. Routing protocol mechanism on MANET can be classified proactive, reactive and hybrid. On this paper researcher comparing Q...
A mobile ad hoc network (MANET) is an infrastructure less, autonomous, and standalone network. Routing protocol mechanism on MANET can be classified proactive, reactive and hybrid. On this paper researcher comparing QOS with reactive and proactive, reactive represented by DSR and proactive by DSDV. Performance of these routing protocols is evaluated with performance metrics such as Dropped Packets, Packet Delivery Ratio, Throughput, End to End Delay, Jitter, and Residual energy. Based on experiment shows that DSDV is better than DSR, performance DSDV more stable than DSR, DSR on little node better than DSDV, but in line with increment number of node performance is degrade.
In this paper, an attempt has been made to forecast two major exchange rates USDAUD (US Dolar versus Australian Dolar currency) and USDJPY (US Dolar versus Japanese Yen currency) using Non-Linear Autoregressive (NAR) ...
In this paper, an attempt has been made to forecast two major exchange rates USDAUD (US Dolar versus Australian Dolar currency) and USDJPY (US Dolar versus Japanese Yen currency) using Non-Linear Autoregressive (NAR) with monthly period data from January 1975 to April 2014. The data is collected from Bank of England. The ecchange rates forecasting use 3 layer models with input, hidden and output layer. The number of hidden nodes are 2, and 3 for USDAUD and USDJPY respectively. Levernberg-Marquardt (LM) learning algorithm is used to do training. The accuracy result for the experiments showed that Dstat parameter for USDAUD (60.56%) is a bit higher than industry standard accuracy but lower than industry standard accuracy for USDJPY (52.11%). The MSE result is 0.3239 for USDAUD and 7.518 for USDJPY.
The integration of Internet of Things (IoT) technologies into modern homes has enhanced safety and comfort, particularly in detecting gas leaks, which pose serious fire hazards. Gas leaks can often be detected by smel...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
The integration of Internet of Things (IoT) technologies into modern homes has enhanced safety and comfort, particularly in detecting gas leaks, which pose serious fire hazards. Gas leaks can often be detected by smell, but this method fails when no one is present. Previous research using microcontrollers and sensors to detect gas leaks faced challenges with accuracy due to noise interference. This paper proposes the use of a Kalman filter, developed by Rudolf Emil Kalman in 1960, to improve gas leak detection accuracy by filtering out noise. The system comprises an Arduino Nano, ESP8266 WiFi module, MQ-2 gas sensor, buzzer, and ThingSpeak cloud platform. By applying the Kalman filter, noise and data oscillations are reduced, enhancing detection accuracy. Experimental results show the system effectively detects gas leaks, provides real-time data, and triggers alarms. Future improvements could include additional sensors and features to further increase the system’s reliability and functionality.
There is a clinical need for HIV protease inhibitors that can evade resistance mutations. One possible approach to designing such inhibitors relies upon the crystallographic observation that the substrates of HIV prot...
详细信息
There is a clinical need for HIV protease inhibitors that can evade resistance mutations. One possible approach to designing such inhibitors relies upon the crystallographic observation that the substrates of HIV protease occupy a rather constant region within the binding site. In particular, it has been hypothesized that inhibitors which lie within this region will tend to resist clinically relevant mutations. The present study offers the first prospective evaluation of this hypothesis, via computational design of inhibitors predicted to conform to the substrate envelope, followed by synthesis and evaluation against wild-type and mutant proteases, as well as structural studies of complexes of the designed inhibitors with HIV protease. The results support the utility of the substrate envelope hypothesis as a guide to the design of robust protease inhibitors.
Energy consumption has become one of the major problems in Indonesia. The use of recent technology is highly beneficial since various automation could be done even in simple devices. In this research, portable smart h...
Energy consumption has become one of the major problems in Indonesia. The use of recent technology is highly beneficial since various automation could be done even in simple devices. In this research, portable smart home modules based on the internet of things (IoT) technology to monitor the power consumption in household electrical devices were built. The module consisted of current sensors, voltage sensors, and IoT Wi-Fi Development Board. It communicated with the server, built using the Raspberry Pi, using the MQTT protocol. The server was equipped with web pages that allowed users to monitor the devices' electrical power usage. Therefore, all of the connected modules could be monitored to provide information regarding an electric household device's defect. The results had shown that the prototypes of the modules had been successfully built. It was shown that very slight differences were found between the system measurements compared to the manual one using the 60 seconds interval measurements. The power consumed by the module was very low, where the current sensor uses 0.125 Watt while the voltage sensor uses 0.001 Watt. The portable devices were developed in the shape of small boxes; therefore, it could be easy to move and install.
Load Balancing is very well applied to the distribution of internet access at any point of the Wi-Fi area so that the use of limited devices can be optimal and on target. The proper use of the Greedy Algorithms when a...
Load Balancing is very well applied to the distribution of internet access at any point of the Wi-Fi area so that the use of limited devices can be optimal and on target. The proper use of the Greedy Algorithms when applied to an access point device is very capable in resolving excessive loading in a single resource to take the best choice at every stage in an optimum process. Access point device is also a success factor in running the optimization of the distribution of Wi-Fi access on the Access Point is strongly influenced by the parameters set. In this research, user access factor in one very high Wi-Fi area also influences the possibility of incoming access failure. For the application of the results of this study can be utilized on all access point devices that have limits, but for speed internet access remains at the capacity provided bandwidth.
Traffic signs are important markers in two-wheeled and four-wheeled vehicles. However, there is a change in direction or arrangement on the road that cannot be opened on a map which can cause incorrect information, wh...
Traffic signs are important markers in two-wheeled and four-wheeled vehicles. However, there is a change in direction or arrangement on the road that cannot be opened on a map which can cause incorrect information, which can cause traffic jams. In this journal the author uses a camera mounted on a car that provides a solution for drivers who issue problems that occur on the road that show directions or arrangements that are not directly updated using the HOG and MMOD methods. HOGs and MMODs are methods that can refute objects well, and move images and will be recognized immediately. The information received can be sent directly to an electronic map so that it can be accessed automatically by the driver's information and assistance and other information finds the right path, so that it can help the driver and can avoid traffic jams.
computer security is a very important thing in an information system. The strength of the NTRU algorithm is the difficulty of finding a short vector of a lattice (a discrete subgroup of a collection of vectors that in...
computer security is a very important thing in an information system. The strength of the NTRU algorithm is the difficulty of finding a short vector of a lattice (a discrete subgroup of a collection of vectors that includes the entire vector environment) of a random polynomial that has a large degree. The strength of the RSA algorithm lies in the level of difficulty in factoring non-prime numbers into the primary factor. As long as no efficient algorithm has been found to find the prime factors of large integers, the RSA algorithm is highly recommended for message encryption. And finally this is the TRIPEL DES algorithm designed using a 56-bit key, and that size is enough to run a secure encryption technique. This algorithm provides a simple solution that is running the DES Algorithm 3 times for data blocks. The results of our study of measuring speed on encryption and decryption using the same file are superior to the RSA algorithm compared to the NTRU and TRIPLE DES algorithms.
暂无评论