Electricity is one of the basic needs in the era of technological development, where all equipment must use electricity to operate such as computer, so that it requires a system that can monitor power consumption at c...
Electricity is one of the basic needs in the era of technological development, where all equipment must use electricity to operate such as computer, so that it requires a system that can monitor power consumption at computer cluster. To monitoring power consumption using WCS1800 to current sensor and microcontroller Atmega32 to data sensor process, and serial communication to send data to display at personal computer. From test system having two result, first is power consumption at computer cluster starting, where current value range is 0 to 38A with power consumption is 0 to 8360 watt. And second is power consumtion at computer cluster execution progran, current value is 27 to 40 A, with power consumption 5940 to 8800 watt. From this system has been design, the power consumption at computer cluster can be monitored and known value of energy consumption.
In this paper, we propose a novel Bridge Weight-In-Motion (B-WIM) detection method based on the bridge deck vibration signal analysis with the image mapping algorithm. The algorithm maps the vibration signals into 8-B...
详细信息
Informal caregivers of people with Alzheimer's disease and related dementias (ADRD) are at risk of poor mental health. This study aimed to investigate the feasibility and validity of studying caregivers' menta...
Informal caregivers of people with Alzheimer's disease and related dementias (ADRD) are at risk of poor mental health. This study aimed to investigate the feasibility and validity of studying caregivers' mental stressors using online caregiving forum data (March 2018-February 2022) and natural language processing and machine learning (NLP/ML). NLP/ML topic modeling generated eight prominent topics, which we compared with qualitatively defined themes and the existing caregiving framework to assess validity. Among a total of 60,182 posts, 5848 were mental distress-related; for the ADRD patients (symptoms, medication, relocation, care duty share, diagnosis, conversation strategy) and the caregivers (caregiving burden and support). While we observed novel topics from NLP/ML-defined topics, mostly those were aligned with the existing framework. For feasibility assessment, qualitative title screening was done. The findings shed new light on the potential of NLP/ML text analysis of the online forum for informal caregivers to prepare tailored support for this vulnerable population.
In complex (dynamic) systems, models are usually too complex for a direct evaluation, and simulation is the method of choice (indirect optimization). Another aspect is the structure of the design space for complex sys...
详细信息
The server room is a room that stores data, there is company information (Data Center). Hot server room conditions can cause performance on the device and network to decrease. Therefore an admin must keep the server s...
The server room is a room that stores data, there is company information (Data Center). Hot server room conditions can cause performance on the device and network to decrease. Therefore an admin must keep the server space stable so that the server and network performance is maintained. The temperature monitoring system can be used to monitor temperature and humidity in the server room. In addition, it provides a response to reduce the temperature if there is a temperature increase in the server room. This study uses the Internet of Thing (IoT), which is a device used by the Raspberry Pi and Wemos DHT Shield wireless sensor as a device that is able to read the temperature and humidity conditions of the room. Temperature and humidity log data is stored in the MySQL database, then displayed in a chart diagram in real time. IoT response based on predetermined temperature standards by giving notifications to users via Whatsapp Application on mobile devices.
One of the biggest challenges during the overall promotion of computer industry is the security risk issue. Most of the existing approaches for quantifying security risks are based on simple multiplications of frequen...
详细信息
ISBN:
(纸本)9781538670774;9781538670767
One of the biggest challenges during the overall promotion of computer industry is the security risk issue. Most of the existing approaches for quantifying security risks are based on simple multiplications of frequencies and quantitative consequences of hazard occurrence without considering dependencies among the hazards. In this paper, we model sequential attacks, which involve multiple sequence-dependent hazardous actions for a successful attack. We also explore a Markov-based method to estimate the occurrence probability of security risks for systems subject to the sequential attacks. The method is demonstrated through a detailed case study where Trojan attacks in the banking application are modeled and analyzed.
Core Ideas: We comprehensively validated the use of UAS in sorghum and maize breeding programs. Temporal estimates of plant growth will allow researchers to elucidate new phenotypes. The stage of the breeding pipeline...
This paper addresses the stability of a Kalman filter when measurements are intermittently available due to an unreliable communication channel between sensors and the estimator. This intermittent behaviour can be mod...
详细信息
ISBN:
(纸本)9781538626795
This paper addresses the stability of a Kalman filter when measurements are intermittently available due to an unreliable communication channel between sensors and the estimator. This intermittent behaviour can be modelled as a random and time-varying measurement system. We consider a general discrete-time system with a random measurement matrix and study the stability condition for the associate Kalman filter. By deep dissecting the system structure, the necessary and sufficient stability condition for the Kalman filter is given. We also give methods to checking the stability condition for specific linear systems. Our results generalize previously known stability conditions where the system matrix structure is restricted.
Collective knowledge is understood as the common knowledge state of a collective consisting of autonomous units. The knowledge states referred from these autonomous units to some degree reflect the real knowledge stat...
详细信息
暂无评论