short algorithm
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 6)

H-INDEX

1
(FIVE YEARS 0)

2021 ◽  
Vol 17 (4) ◽  
pp. 71-83
Author(s):  
Egor I. Safonov ◽  
Danil A. Parunov ◽  
Alexander D. Sinyagin

The article describes the stages of the process of creating a virtual reality simulator using the example of a standard operating procedure for replacing a check valve on a Christmas tree. A brief overview of the Christmas tree arrangement and an analysis of the stages of the check valve replacement are described. A short algorithm has been developed based on 11 out of 16 implemented stages. The choice of hardware platform and software is substantiated. Using the Christmas tree as an example, the processes of creating a three-dimensional model and unfolding textures in the three-dimensional editor 3ds Max, creating color maps, reflection and texture normals in the graphical editor Substance Painter are described. The process of creating a landscape in the Unity3D environment is described. Oculus Integration and VR TK assets were used in the development of the main scripts.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Qianbo Li

With the economic development in our country, there are more and more international exchanges and communications. Hence, the ability to read, write, and communicate in English is essential and very necessary. In traditional English classroom teaching, teachers are the disseminators of knowledge, whereas students only receive knowledge passively. Due to the limitation of teaching hours and the lack of teaching approaches, it is necessary to make up for the insufficiency in the teaching activities through computer technology and multimedia technology. Abundant teaching approaches can cultivate the independent inquiry ability of students, and the establishment of such an English learning platform is conducive to improving the students’ ability to make full use of the information technology. Through teaching and learning, the students can become the main entity in the English teaching, which can stimulate their enthusiasm and form a good awareness for English learning. In this paper, the radial basis function (hereinafter referred to as RBF for short) algorithm is adopted. Combined with the constructive English teaching method, practical design and construction are carried out by analyzing the concepts, principles, and application strategies of smart classroom teaching in the multimedia background. The practice has proved that the method proposed in this paper is effective and has certain research value and positive significance for the research on English teaching.


PeerJ ◽  
2021 ◽  
Vol 9 ◽  
pp. e12040
Author(s):  
Gershwin Davis ◽  
Nelleen Baboolal ◽  
Vrijesh Tripathi ◽  
Robert Stewart

Background Trinidad is an island that not only has a population at high vascular risk but also one that is in epidemiological transition with high dementia prevalence. The aim of the study was to investigate modifiable risk factors associated with dementia in middle-old (75–84 years) individuals. Methods As part of a large national community survey of dementia prevalence in Trinidad, 811 people aged 75–84 years were evaluated for dementia using the 10/66 short algorithm. Demographic data collected included information on age, gender, ethnicity, religion, education, occupation, living accommodation, smoking, alcohol consumption, self-reported medical conditions, impairments and ability to do instrumental activities of daily living (IADL). Data were analysed using multivariable logistic regression models. Results Of the 811 participants, nearly 55% were female. The mean age was 78.8 (SD = 2.8) years and dementia was present in 198 (24.4%). Having less than ten years of education, being an agricultural worker, skilled labourer or housewife and having more than four co-morbidities were significantly associated with dementia. The odds ratio for dementia for those having self-reported stroke was 4.93 (95% CI [2.64–9.23]) and for diabetes was 1.76 (95% CI [1.17–2.65]) adjusting for age, age2, gender, ethnicity, religion, education and occupation. Impairment in eyesight, hearing, climbing stairs, and walking were also more common in the group with dementia. Ability to perform IADLs was linked with dementia. Individuals with dementia were more likely to be unable to perform any of the eight IADLs. Those who did not exercise at all (OR 6.95, 95% CI [2.02–23.90]) and those who did low exercise (OR 1.83, 95% CI [1.07–3.13]) compared to those who did moderate to high exercise were also more likely to have dementia. Conclusion In the middle-old population in Trinidad having diabetes and stroke, low IADL score, and no exercise were more common in people with dementia.


Author(s):  
B. Nurwahyu Hairani ◽  
Andy Hidayat Jatmika ◽  
Fitri Bimantoro

Mobile Ad Hoc Network (MANET) is a stand-alone wireless network, consisting of several nodes that can move in all directions freely. The routing protocol used as the object of this study is Ad Hoc On-Demand Multipath Distance Vector (AOMDV). This research carries out an energy calculation process at a node that can be used as a new energy-based route by utilizing topology changes. Energy efficiency in the routing protocol can be done using the Energy-Aware SHORT (Self Healing and Optimizing Routing Techniques) method. The main purpose of the Energy-Aware SHORT (EA-SHORT) algorithm is to save energy on MANET, by extending the life of nodes and networks by routing packets through nodes that have enough remaining power and avoiding nodes that have low power. AOMDV performance will be compared with AOMDV which has been modified with EA-SHORT measured from the specified parameter values. Analysis results show that the application of the EA-SHORT algorithm in the efficiency of route search succeeded in improving performance. The results of throughput on EA-AOMDV increased by 13.904% for an area of ​​500x500 m2 and 13.905% at 1000x1000 m2. The packet delivery ratio increased by 0.91% and 2.273%. Average end-to-end delay decreased by 20.482% and 18.734%.


2021 ◽  
Vol 3 (1) ◽  
pp. 91-114
Author(s):  
Hiroshi Kenta ◽  
Yamato Shino ◽  
Dewi Immaniar ◽  
Eka Purnama Harahap ◽  
Alfian Dimas Ahsanul Rizki Ahmad

We have modelled mining resource and cryptocurrency-related relationships into a non-cooperative game. Then we took advantage of the traffic congestion results, set a native convention for the Nash equilibria, and created a short algorithm to find the equilibria. Next, we will make calculations for several system models whose variations follow the existing mining resources and have appropriately allocated according to the details of the mining complexity level that has defeated. In the included resources, the game's result is the allocation of resources as a feature of a normalized Nash equilibrium. In the model that has proposed, we provide a property structure of the type of equilibrium that exists, such as a condition where there are two or more mining infrastructures that will be active and another state that explains that no Miners get results in wanting a specific cryptocurrency, like bitcoin.


2019 ◽  
Vol 1 (1) ◽  
pp. 77-85
Author(s):  
Yunia Puspita Wulandari ◽  
Andy Hidayat Jatmika ◽  
Fitri Bimantoro

Mobile Ad-Hoc Network (MANET) is a development of the Ad-Hoc Network, where the nodes of this network have dynamic mobility. There are several types of routing protocols in MANET, one of which is AOMDV. Route discovery on the AOMDV routing protocol is done by calculating the distance based on the number of hops. If the number of hops increased, it may cause a considerable delay and a decrease in throughput. This study compares the performance of the AOMDV routing protocol with the Path Aware-AOMDV (PA-AOMDV) routing protocol. PA-AOMDV routing protocol is obtained through modifications to the performance of the AOMDV protocol with the Path Aware SHORT algorithm. The Path Aware SHORT algorithm is a method to reduce the number of hops. SHORT improves routing optimization by monitoring routes and optimizing these routes that have better paths. The performance of both protocols will be seen based on four parameters, namely throughput, average end-to-end delay, packet delivery ratio, and routing overhead. Result shows that the throughput increased for 50 nodes is 61,84% and for 100 nodes is 45,2%, average end-to-end delay decreased for 50 nodes is 0,066% and for 100 nodes 0,12%, packet delivery ratio increased for 50 nodes is 60,87% and for 100 nodes 82,02%, and routing overhead decreased for 50 nodes is 67,07% and 100 nodes 45,36%.


2017 ◽  
Vol 2 (4) ◽  
pp. 020477
Author(s):  
Vitaliy Bezsheiko ◽  
Inna Davydenko

This is a short algorithm for professional communication in specific clinical situations. Recommendations are developed on the basis of the guidelines on objective structured clinical examination. It is an educational material, intended for medical students and physicians, who have just started a clinical practice.


2015 ◽  
Vol 7 (1) ◽  
pp. 26-50 ◽  
Author(s):  
S. Manimurugan ◽  
C. Narmatha

Exchanging a medical image via network from one place to another place or storing a medical image in a particular place in a secure manner has become a challenge. To overwhelm this, secure medical image Lossless Compression (LC) schemes have been proposed. The original input grayscale medical images are encrypted by Tailored Visual Cryptography Encryption Process (TVCE) which is a proposed encryption system. To generate these encrypted images, four types of processes are adopted which play a vital role. These processes are Splitting Process, Converting Process, Pixel Process and Merging process. The encrypted medical image is compressed by proposed compression algorithms, i.e Pixel Block Short algorithm (PBSA) and one conventional Lossless Compression (LC) algorithm has been adopted (JPEG 2000LS). The above two compression methods are used to separate compression for encrypted medical images. And also, decompressions have been done in a separate manner. The encrypted output image which is generated from decompression of the proposed compression algorithm, JPEG 2000LS are decrypted by the Tailored Visual Cryptography Decryption Process (TVCD). To decrypt the encrypted grayscale medical images, four types of processes are involved. These processes are Segregation Process, Inverse Pixel Process, 8-Bit into Decimal Conversion Process and Amalgamate Process. However, this paper is focused on the proposed visual cryptography only. From these processes, two original images have been reconstructed which are given by two compression algorithms. Ultimately, two combinations are compared with each other based on the various parameters. These techniques can be implemented in the field for storing and transmitting medical images in a secure manner. The Confidentiality, Integrity and Availability (CIA property) of a medical image have also been proved by the experimental results. In this paper we have focused on only proposed visual cryptography scheme.


Sign in / Sign up

Export Citation Format

Share Document