base system
Recently Published Documents


TOTAL DOCUMENTS

770
(FIVE YEARS 138)

H-INDEX

25
(FIVE YEARS 6)

Author(s):  
Prashant Dixit ◽  
◽  
Harish Nagar ◽  
Sarvottam Dixit

Higher education management problems in delivering 100% of graduates who can satisfy business demands. In industry it is often difficult for qualified graduates to identify the appropriate means to evaluate problem - solving abilities as well as shortcomings in the evaluation of problem solving skills. This is partially due to the lack of an adequate methodology. The purpose of this paper is to provide the appropriate CBR-KBS model for predicting and evaluating the characteristics of the student's dataset so as to comply with the parameters of selection required by the university industry. Machine learning algorithms have been used in these study areas under supervision, uncompleted and uncontrolled; K-Nearest neighbor, Naïve Bayes, Decision Tree, Neural Network, Logistic Regression and Vector Support Machines. The proposed model would allow university management to make easier, more professional, experienced and industry-specific plans for the manufacturing of graduates and graduates who passed the type I and II examinations held by the employment opportunities.


2021 ◽  
pp. 004051752110639
Author(s):  
Xian-Wei Cheng ◽  
Wen-Jie Jin ◽  
Chen Zhang ◽  
Yan-Xiang Wu ◽  
Jin-Ping Guan

Durable and formaldehyde-free flame-retardant (FR) modification of wool fabric using phosphorous compounds is of great interest. In this study, Schiff base imine groups were firstly introduced onto wool fiber through aldehyde-amine condensation between p-hydroxybenzaldehyde and wool fiber. Then, an efficient and durable FR wool fabric was fabricated by incorporating diethyl phosphite (DEP) into a Schiff base intermediate via the Pudovik reaction. The potential reaction mechanism among p-hydroxybenzaldehyde, DEP and wool fiber was explored. The thermal stability, smoke generation ability, FR ability and washing durability of the modified wool fabric were studied. The FR modification significantly increased the thermal resistance of wool fabric and suppressed smoke generation by half. The wool fabric modified by 20 g/L DEP was able to self-extinguish during the burning test, suggesting the higher FR efficiency of the DEP-incorporated Schiff base system. The modified wool fabric still self-extinguished after 20 commercial launderings, which is attributed to the covalent grafting of DEP onto wool fiber. Char residue analyses revealed the condensed charring FR mechanism of the DEP-incorporated Schiff base system on wool. This work provides a novel approach to prepare efficient and durable FR functional wool fabric via the Schiff base reaction and Pudovik reaction among p-hydroxybenzaldehyde, DEP and wool fiber.


2021 ◽  
pp. 119-131
Author(s):  
Володимир Вікторович Бараннік ◽  
Наталія Вячеславівна Бараннік ◽  
Олександр Олексійович Ігнатьєв ◽  
Вікторія Вікторівна Хіменко

It is substantiated that steganographic systems should be used to ensure the protection of special information resources in conditions of its prompt delivery. Here, steganographic technologies are an integral part of complex information protection systems. Simultaneously, for steganographic systems, there is a contradiction between the density of embedded data and level of information compaction of video container (level of reduction of volume bit volume of compact presented video image concerning bit volume of an initial video image). It leads to the fact that under the conditions of the required quality (reliability) of digital video information, the bit rate level of the covert channel is insufficient. Consequently, the scientific-applied problem concerns the necessity to increase the integrity (the level of correspondence of the hidden information before its embedding in a video container and after its extraction) and bit rate of the hidden channel of special information transmission. It is relevant. The solution of the described problem in the field of application of steganographic transformations can be realized based on the application of two different approaches. The first approach is based on methods of direct message embedding. But this approach is characterized by introducing distortions in the video images used as a container. Therefore, changes in structural and statistical patterns in the syntactic description of the video container happen. It reduces the potential for video container compaction. The second approach to creating steganographic transformation methods is based on information hiding using indirect embedding technique. Here, the embedding process exploits the functional dependency between the elements of the video container and the elements of the embedded message. Setting a specific dependency between the elements in the video container corresponds to the embedded element with a value of "0" or "1". However, the existing indirect steganographic transformation methods have a disadvantage. It consists of an insufficient value of embedded data density. To eliminate these disadvantages, it is proposed to develop an approach that allows using not only psychovisual but also structural redundancy of video container for concealment. Therefore, the research objective of this paper is to develop a method for indirect information withholding in the video container compression process to increase the bit rate of the hidden message channel. In the process of research, a steganographic multiagent system is constructed, which allows embedding hidden message elements without loss of information based on the indirect approach by modifying the active bases of the multiagent basis considering their uncertainty. To select transformants (data sets) as containers for information embedding, the requirement of the existence of a base system with all active bases is taken into account. The number of embedded bits of the hidden message is equal to the number of active bases in the base system of the multiadic space. Because of the made experiments, the following results have been received: in the process of embedding messages based on the created method distortions in a video container is not brought; for the created method the additional increase in the hidden channel bit rate in average 5 … 7 times are reached.


Buildings ◽  
2021 ◽  
Vol 11 (11) ◽  
pp. 536
Author(s):  
Seokjae Heo ◽  
Seunguk Na ◽  
Moo-Won Hur ◽  
Sanghyun Lee

In this study, the shape of a vertical expansion module with a rotary-type damping device is proposed. The external energy dissipation capacity is confirmed through experiments and the performance of the module is simulated. It can be easily applied to high-rise structures, as the module is directly supported by the bearing walls without the need for a separate base system. Additionally, as the damper can be replaced, it is possible to enhance seismic performance even after construction. The simulation results show that the rotary-type damper is more effective in reducing the displacement, shear force, and moment than free and fixed joints. In the pushover analysis of a system modeled using the moment hinge of the rotary damper of the joint, the best response reduction effect is obtained when the yield moment of the hinge is defined as 1% of the frame plastic moment. As a result of the analysis of the multi-degree-of-freedom system considering a harmonic load, we determined that it is efficient for the hinge to yield after the displacement, and the acceleration response of the resonant structure reaches steady state during the installation. In the multi-degree-of-freedom system with slab joints added to the analytical model, the displacement response decreased gradually as the natural period of the structure decreased and the joint increased. This provides evidence that the damper does not affect the overall behavior of the structure. The most important design factor of the rotary-type friction damper, shown through the experiment, is the relationship between the frictional surface and the tightening force of the bolt.


2021 ◽  
Author(s):  
◽  
Valentin B Bura

<p>This thesis establishes new results concerning the proof-theoretic strength of two classic theorems of Ring Theory relating to factorization in integral domains. The first theorem asserts that if every irreducible is a prime, then every element has at most one decomposition into irreducibles; the second states that well-foundedness of divisibility implies the existence of an irreducible factorization for each element. After introductions to the Algebra framework used and Reverse Mathematics, we show that the first theorem is provable in the base system of Second Order Arithmetic RCA0, while the other is equivalent over RCA0 to the system ACA0.</p>


2021 ◽  
Author(s):  
◽  
Valentin B Bura

<p>This thesis establishes new results concerning the proof-theoretic strength of two classic theorems of Ring Theory relating to factorization in integral domains. The first theorem asserts that if every irreducible is a prime, then every element has at most one decomposition into irreducibles; the second states that well-foundedness of divisibility implies the existence of an irreducible factorization for each element. After introductions to the Algebra framework used and Reverse Mathematics, we show that the first theorem is provable in the base system of Second Order Arithmetic RCA0, while the other is equivalent over RCA0 to the system ACA0.</p>


2021 ◽  
Vol 2074 (1) ◽  
pp. 012009
Author(s):  
Yanjing Cai

Abstract Differentiated service for packets entering the network is available through packet matching. Network security and differentiated services mean an inevitable choice for routers. Recursive data flow matching algorithm (RFC) is a high performance packet matching algorithm. However, with the increase of rule dimension and scale in the rule base, system memory consumption is unavoidable. This paper lowers memory consumption via improvement on RFC by dividing the rule base into several subsets and storing each rule in a separate subset. In addition, a variety of methods are used to streamline the RFC data structure for further improvement in algorithm speed and memory performance. The experimental results show that the improved algorithm of RFC greatly reduces the overall memory consumption of RFC, while greatly improving package matching performance.


2021 ◽  
Vol 2 (3) ◽  
pp. 312-323
Author(s):  
Melvitasari Tinambunan ◽  
Sanriomi Sintaro

Android, Geographic Information Systems, RESTful, Web One of the mapping technologies widely used today is Geographic Information Systems. Geographic Information Systems (GEOGRAPHIC INFORMATION SYSTEMS) is a mapping technology in the form of computer-based information systems, designed to work using data that has spatial information or spatial reference. Mapping technology is widely used to facilitate human work. In this research, Geographic Information System technology was used to support one of the business processes at the Bandar Lampung City Tourism Office. This system was built to assist related agencies in recording tourist sites. The system consists of a web-based system and Android-based applications that are connected using RESTful Web Service. The system is implemented using the PHP programming language with the help of CodeIgniter for web-based systems, and the Java programming language for Android-based applications. The method of developing the system used is the waterfall model method according to Rossa U.S. and Saladin (2014). Application design is based on Unified Modeling Language (UML), flowchart diagrams, and interface design. While the application used in the creation of the Android base system is Android Studio. The testing method used is the system's functional Black-Box. The results of black-box testing data show that the system runs as it should, the system is easy to understand by users, and can meet the functional needs of the system needed by the Bandar Lampung City Tourism Office


2021 ◽  
Author(s):  
◽  
Jordan Barrett

<p>Using the tools of reverse mathematics in second-order arithmetic, as developed by Friedman, Simpson, and others, we determine the axioms necessary to develop various topics in commutative ring theory. Our main contributions to the field are as follows. We look at fundamental results concerning primary ideals and the radical of an ideal, concepts previously unstudied in reverse mathematics. Then we turn to a fine-grained analysis of four different definitions of Noetherian in the weak base system RCA_0 + Sigma-2 induction. Finally, we begin a systematic study of various types of integral domains: PIDs, UFDs and Bézout and GCD domains.</p>


2021 ◽  
Author(s):  
◽  
Jordan Barrett

<p>Using the tools of reverse mathematics in second-order arithmetic, as developed by Friedman, Simpson, and others, we determine the axioms necessary to develop various topics in commutative ring theory. Our main contributions to the field are as follows. We look at fundamental results concerning primary ideals and the radical of an ideal, concepts previously unstudied in reverse mathematics. Then we turn to a fine-grained analysis of four different definitions of Noetherian in the weak base system RCA_0 + Sigma-2 induction. Finally, we begin a systematic study of various types of integral domains: PIDs, UFDs and Bézout and GCD domains.</p>


Sign in / Sign up

Export Citation Format

Share Document