graphical view
Recently Published Documents


TOTAL DOCUMENTS

36
(FIVE YEARS 11)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 2 (2) ◽  
pp. 62-77
Author(s):  
Rajeev Kumar ◽  
Sanjeev Kumar ◽  
Sukhneet Kaur ◽  
Shrishty Jain

In this article, an attempt is made to achieve the series solution of the time fractional generalized Korteweg-de Vries equation which leads to a conditionally convergent series solution. We have also resorted to another technique involving conversion of the given fractional partial differential equations to ordinary differential equations by using fractional complex transform. This technique is discussed separately for modified Riemann-Liouville and conformable derivatives. Convergence analysis and graphical view of the obtained solution are demonstrated in this work.


2021 ◽  
pp. 23-35
Author(s):  
Viktor Bogomolov ◽  
Valeriy Klimenko ◽  
Dmytro Leontiev ◽  
Andrii Frolov ◽  
Oleksandr Suhomlyn ◽  
...  

Problem. For an hour, in the scientific-methodical recommendations of the ship-experts, it is installed in the scientific-technical literature of the day-to-day parameters of galvanizing of vantage, bug-capable transport equipment, so that it is inaccurate to introduce autotransport equipment for the eastern part to inaccurate zasob_v unique road transport suit. Goal. The value of the function of galvanizing large transport bridges on the basis of the coordinates of the position to the center of the heavy transport, realizable values, which are realized between the tires and the supporting surface, as well as the support for the rear axle of the transport bridges. Methodology. The approaches adopted in the work to solve this goal are based on the theoretical foundations of braking multi-axle vehicles, the scientific provisions of elastic deformations of pneumatic tires of automobile wheels, geometric and weight parameters of a wheeled vehicle. Results. The equations that allow to calculate the value of the braking coefficient of multi-axle vehicles based on the coordinates of the position of the center of gravity, the realized couplings between the tires and the bearing surface, as well as the load distribution between the respective front and rear axles of the vehicle. Rivnyannya is assigned, which allow the positioning of the coordinates to the center of the car of a multi-axle wheeled transport vehicle for both front and rear axles. The calculation schemes of the position of the coordinates of the center of mass for two-axle, three-axle and four-axle with different axle layout are presented in graphical form, which give a general idea of the mass distribution between the front and rear axles of the vehicle. Originality. Presented in a graphical view of the layout of the positioning of the coordinates to the center of the car for a two-axle, three-axle and one axle with a small layout of the bridges, which give a far-reaching display of the space between the front and rear axles of the transport vehicle. Practical value. The results can be recommended by the experts-auto technicians in the development of technical capabilities for the drivers of vantage transport means, uniqueness of the road-transport usability.


2021 ◽  
Vol 9 (1) ◽  
pp. 169-172
Author(s):  
P. Renjini Raveendran ◽  
S. Beena
Keyword(s):  

2020 ◽  
Vol 8 ◽  
Author(s):  
Yuhong Huo ◽  
Haidar Ali ◽  
Muhammad Ahsan Binyamin ◽  
Syed Sheraz Asghar ◽  
Usman Babar ◽  
...  

In theoretical chemistry, the numerical parameters that are used to characterize the molecular topology of graphs are called topological indices. Several physical and chemical properties like boiling point, entropy, heat formation, and vaporization enthalpy of chemical compounds can be determined through these topological indices. Graph theory has a considerable use in evaluating the relation of various topological indices of some derived graphs. In this article, we will compute the topological indices like Randić, first Zagreb, harmonic, augmented Zagreb, atom-bond connectivity, and geometric-arithmetic indices for chain hex-derived network of type 3 CHDN3(m,n) for different cases of m and n. We will also compute the numerical computation and graphical view to justify our results.Mathematics Subject Classification: 05C12, 05C90


CHIPSET ◽  
2020 ◽  
Vol 1 (02) ◽  
pp. 69-78
Author(s):  
Inge Frastika Fitri ◽  
Derisma

The purpose of this research is to implement an embeded system in a form of a device that can provide e-voting services and a realcount process that can quickly accumulate votes. With this device, it is expected to be a solution to conventional elections that are still prone to fraud, wasteful costs, and inefficient. This device applies NFC technology. Voter’s idcard is used as an identifier, the UID of voter’s idcard is read by the NFC reader and the verification process is running. Voters are entitled to vote if the voters' idcard number is verified and registered in the database. Here the voter will be allowed to proceed for choosing their preferred candidate from the pushbuttons. This device is expected to be saved huge cost by using pushbuttons instead of ballot papers. This device uses the SIM808 module as a data communication medium to send http packages containing uid and vote values to the webserver, to be further matched in a table in the database. When voters vote, the uid of the voter is stored in the results table in the following database with the value of the vote, and if an idcard with the same uid votes again, then the latest vote values will not be store. This method prevents duplication which often happens in conventional voting system. After whole voting ends, the final result is displayed on a web page in a graphical view for the satisfaction of voters. Voting and counting has become much faster and easier as the system doesn't really require counting personnel, therefore there has been a substantial reduction in the number of remuneration that is paid to them. This result menu can only be accessed after the specified time.


2020 ◽  
Vol 43 (1) ◽  
pp. 31-41
Author(s):  
Reza Alfajri ◽  
Hanief Jauhari ◽  
Andar Parulian Hutasoit ◽  
Sakti Parsaulian Siregar ◽  
Ernita Sembiring Meliala

In the era of industry 4.0, digitalization is a very significant step to adopt in a company. Every worldly renowned industry, oil and gas included, needs to assimilate this term into its business process. Reserves and resources report depicts an oil and gas company future cash flow, wealth, performance, as well as growth. Therefore, creating and managing this report need meticulous attention. In order to comply with demand in industry 4.0 and simplify reserves and resources reporting process, reserves and resources database and web-based application need to be developed. First task to carry in establishing database is to create and input master data. Companies’ asset is classified into four common entities: asset, area, structure, and layer – as the smallest entity. Layer contains fluid type and oil and gas specific attributes. After master data is established, a web-based application to handle data transaction and reporting is developed. In order to maintain data security, access to this application is restricted into four roles: data entry user, data approval user, administrator, and management. Every role has its own privilege, for example data entry user can create, edit, and view data, while management can only view it. Other employees that need to access this application are based on management approval and restricted into view privilege under their asset location. This application has already been tested in two reserves and resources reporting window, and underwent bug-fixing and improvement process. Implementing this application in oil and gas company’s business process gives several benefits: minimizing human error, establishing a single data source, and cutting time consumption in creating reserves and resources report. This application is the solution in creating and managing the report, as well as displaying data in graphical view to help management makes corporate decision.


2020 ◽  
Vol 18 (5) ◽  
pp. 1015-1035
Author(s):  
Rima Derradji ◽  
Rachida Hamzi

Purpose This paper aims to propose a process optimization approach showing how organizations are able to achieve sustainable and efficient process optimization, based on integrated process-risk analysis using several criteria to a better decision-making. Design/methodology/approach Several approaches are used (functional/dysfunctional) to analyze how processes work and how to deal with risks forming multi-criteria decision-making. In addition, a risk factor is integrated into the structured analysis and design techniques (SADT) method forming a novel graphical view SADT-RISK; it identifies process’s failures using the traditional failure modes, effects and criticality analysis (FMECA) and economic consideration “failure mode and effect, criticality analysis-cost FMECA-C” making a multi-criterion matrix for better decision-making. Subsequently, some recommendations are proposed to overcome the failure. Findings This paper illustrates a methodology with a case study in a company, which has a leading brand in the market in Algeria. The authors are integrating a varied portfolio of approaches linking with each other to analyze, improve and optimize the processes in terms of reliability and safety to deal with risks; reduce the complexity of the systems; increase the performance; and achieve a safer process. However, the proposed method can be readily used in practice. Originality/value The paper provides a new approach based on integrated management using new elements as an innovative contribution, forming a novel graphical view SADT-RISK; it identifies process’s failures using the traditional FMECA and economic consideration “a new multi-criterion matrix for better decision-making and using the SWOT analysis – Strengths, Weaknesses, Opportunities, Threats – as a balance to decide about the process improvement”. The authors conclude that this methodology is oriented and applicable to different types of companies such as financial, health and industrial as illustrated by this case study.


2019 ◽  
Vol 4 (1) ◽  
pp. 52-63
Author(s):  
Rozita Kadar ◽  
Jamal Othman ◽  
Naemah Abdul Wahab ◽  
Saiful Nizam Warris

Representing any ideas with pictures rather than words is intuitively more appealing because a visual presentation can be more readily understood than that of textual-based. Program visualisation is one of the techniques that can be used in teaching to help users in understanding how programs work. Program visualisation technique is a mental image or a visual representation of an object, scene, person or abstraction that is similar to visual perception. This technique is significant to users because the criteria of source code cannot be physically viewed. It is applicable in the process of writing programs as it helps users to understand their codes better. The purpose of program visualisation is to translate a program into a graphical view to show either the program code, data or control flow. Visualisation technique uses the capability of human visual system to enhance program comprehensibility. Thus, this study uses program visualisation technique to represent program domain in a graphical view to help novices in improving their comprehension. This research aims to support beginners or novice programmers who have been exposed to programming languages by providing effective visualisation technique.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3930-3933

The field of security Visualisation is an interesting and tough field of research. Enormous amount of (big) data is involved in the networking of devices. In order to analyse and get data for solving the problem, visualisation can be very helpful. Combination of security world as well as the network world is discussed in this paper. Identifying various visualisation techniques for security log data and executing workflow based composition of multiple analytic components will be identified. Interactive modes of the techniques will be discussed. Making the security files to be readable and the format for analysing are identified. More network visualisation tool allows the security analysts to quickly examine the large amount of information by rendering a millions of events and log entries in a single graphical view. Extracting files from full packet captures can save security analyst a great deal of time. There are tools available for capturing PCAP(Packet Capture) files. This PCAP files will be analysed for further details. In the proposed solution, the PCAP files will be generated with the help of Wireshark and it will be processed with the help of Apache drill for converting it into a readable format and the Visualisation can be done with R Studio. Various Visualisation tools in R will be used to visualise the PCAP files. This in order will thoroughly give some insight on the log files for any detection and prediction of malicious data.


2019 ◽  
Vol 42 ◽  
pp. e42792
Author(s):  
Luiza Barbosa Matta ◽  
Cosme Damião Cruz ◽  
Iara Gonçalves Santos ◽  
Claudio Guilherme Portela Carvalho ◽  
Aluisio Brigido Borba Filho ◽  
...  

This work aimed to present the optimum environment number methodology and propose the optimization of the National Sunflower Trials Network, by means of the environments exclusion that do not provide loss of the environmental variability already established. Grain and oil yield data of 16 genotypes evaluated at 16 environments of the National Sunflower Trials Network, obtained from trials conducted out-of-season in 2012 and 2013 were used. An analysis was proposed to establish the optimum environment number for genotypes evaluation, based on genotype performance in the various environmental combinations. The removal or maintenance of environments in the experimental network was dynamic, since different environmental combinations impacted the representativeness of the complete network in a different way. This analysis also provides a graphical view of the impact of the environment removal from the network. Once detected points below the established correlation, the researcher could infer about the network minimum environment number and, suggest through consistent information of several testing years, the environment exclusion.


Sign in / Sign up

Export Citation Format

Share Document