determine system
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 10)

H-INDEX

7
(FIVE YEARS 1)

2021 ◽  
Vol 24 ◽  
pp. 15-25
Author(s):  
Liva Deksne ◽  
Arturs Kempelis ◽  
Toms Sniedzins ◽  
Armands Kozlovskis

The study proposes a smart restaurant system and analyses its benefits to be able to determine system potential advantages in restaurants. Service time is one of the main criteria that can be improved to enhance the speed of the customer service as well as to increase the number of restaurant visitors. To develop the system, solutions found in scientific literature, software and their different architectures are analysed. It has been found out that it is possible to decrease the average restaurant service load time by 52.76 %. Two hypotheses have been proposed for further research in order to determine how a smart restaurant service system can increase chef’s efficiency and how the use of different algorithms can decrease chef’s workload during peak hours.


Mathematics ◽  
2021 ◽  
Vol 9 (18) ◽  
pp. 2227
Author(s):  
Gonzalo A. Aranda-Corral ◽  
Miguel A. Rodríguez ◽  
Iñaki Fernández de Viana ◽  
María Isabel G. Arenas

In recent years there has been a growing interest in resource sharing systems as one of the possible ways to support sustainability. The use of resource pools, where people can drop a resource to be used by others in a local context, is highly dependent on the distribution of those resources on a map or graph. The optimization of these systems is an NP-Hard problem given its combinatorial nature and the inherent computational load required to simulate the use of a system. Furthermore, it is difficult to determine system overhead or unused resources without building the real system and test it in real conditions. Nevertheless, algorithms based on a candidate solution allow measuring hypothetical situations without the inconvenience of a physical implementation. In particular, this work focuses on obtaining the past usage of bike loan network infrastructures to optimize the station’s capacity distribution. Bike sharing systems are a good model for resource sharing systems since they contain common characteristics, such as capacity, distance, and temporary restrictions, which are present in most geographically distributed resources systems. To achieve this target, we propose a new approach based on evolutionary algorithms whose evaluation function will consider the cost of non-used bike places as well as the additional kilometers users would have to travel in the new distribution. To estimate its value, we will consider the geographical proximity and the trend in the areas to infer the behavior of users. This approach, which improves user satisfaction considering the past usage of the former infrastructure, as far as we know, has not been applied to this type of problem and can be generalized to other resource sharing problems with usage data.


2021 ◽  
Vol 8 (2) ◽  
pp. 167-179
Author(s):  
Listya Sugiyarti ◽  
Desiana ◽  
Sri Nitta Crissiana Wirya Atmaja

The research aims to determine system justice, distrust to fiscus and love of money towards tax evasion. The sample in the study are individual taxpayers in the area of the Ciawi Pratama Tax Office who are conducting taxation activities. The type of data is quantitative data. The data collection method used is the questionnaire method. The sampling technique of 100 individual taxpayers use purposive sampling. For Data processing usage is Statistical Package for Social Science. The results of the study indicate that system justice has a negative effect on tax evasion, distrust to fiscus influences on tax evasion, while the love of money infuences tax evasion. Keywords: System Justice, Distrust to Fiscus, Love of Money, Tax Evasion.


2021 ◽  
Vol 10 (2) ◽  
pp. 658-667
Author(s):  
Kessal Farida ◽  
Hariche Kamel ◽  
Bentarzi Hamid ◽  
Boushaki Razika

In this research work, a new method is proposed for linearizing a class of nonlinear multivariable system; where the number of inputs divides exactly the number of states. The idea of proposed method consists in representing the original nonlinear system into a state-dependent coefficient form and applying block similarity transformations that allow getting the linearized system in block companion form. Because the linearized system’s eigenstructure can determine system performance and robustness far more directly and explicitly than other indicators, the given class multivariable system is chosen. Examples are used to illustrate the application and show the effectiveness of the given approach.


Author(s):  
Kun Hu ◽  
Guohua Chen ◽  
Rouzbeh Abbassi ◽  
Kongxing Huang ◽  
Zhihang Zhou ◽  
...  

2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Fiona Muttalib ◽  
Ellis Ballard ◽  
Josephine Langton ◽  
Sara Malone ◽  
Yudy Fonseca ◽  
...  

Abstract Background Group model building (GMB) is a method to facilitate shared understanding of structures and relationships that determine system behaviors. This project aimed to determine the feasibility of GMB in a resource-limited setting and to use GMB to describe key barriers and facilitators to effective acute care delivery at a tertiary care hospital in Malawi. Methods Over 1 week, trained facilitators led three GMB sessions with two groups of healthcare providers to facilitate shared understanding of structures and relationships that determine system behaviors. One group aimed to identify factors that impact patient flow in the paediatric special care ward. The other aimed to identify factors impacting delivery of high-quality care in the paediatric accident and emergency room. Synthesized causal maps of factors influencing patient care were generated, revised, and qualitatively analyzed. Results Causal maps identified patient condition as the central modifier of acute care delivery. Severe illness and high volume of patients were identified as creating system strain in several domains: (1) physical space, (2) resource needs and utilization, (3) staff capabilities and (4) quality improvement. Stress in these domains results in worsening patient condition and perpetuating negative reinforcing feedback loops. Balancing factors inherent to the current system included (1) parental engagement, (2) provider resilience, (3) ease of communication and (4) patient death. Perceived strengths of the GMB process were representation of diverse stakeholder viewpoints and complex system synthesis in a visual causal pathway, the process inclusivity, development of shared understanding, new idea generation and momentum building. Challenges identified included time required for completion and potential for participant selection bias. Conclusions GMB facilitated creation of a shared mental model, as a first step in optimizing acute care delivery in a paediatric facility in this resource-limited setting.


2020 ◽  
Vol 4 (2) ◽  
pp. 413
Author(s):  
Barany Fachri ◽  
Fadli Hamdi Harahap

In the current era of information technology, computer network security is part of a system that is very important to maintain the validity and integrity of data and to ensure the availability of users' morning services from anywhere and anytime. And on one hand humans are very dependent on information systems. That causes the statistics of network security incidents to increase sharply from year to year. So we need a solution to overcome this, one of which is by simulation. Simulations are carried out to simulate existing real network security systems with properties that are easier to observe than the original system, to determine system performance. In this research, a system that is able to cope with threats that may occur optimally in a fast time is needed, this will speed up the process of handling disruptions and system or service recovery. One way that can be used to overcome or overcome this is to use the Intrusion Detection System (IDS). One application that supports intrusion detection system (IDS) is Snort. Snort is able to do an analysis of the forms of intruder attacks that misuse network protocols


Author(s):  
MS Araghizadeh ◽  
MH Djavareshkian ◽  
J Rezaeepazhand

The present study presents a new nonlinear unsteady aerodynamic model to investigate the aeroelastic behavior of a self-sustained oscillating rigid airfoil. Here the unsteady Euler equations are considered simulating inviscid compressible transonic flow over an oscillating airfoil. In regard to providing boundedness criteria, a high-order technique based on a normalized variable diagram scheme has been presented. Since using dynamic mesh for simulating flow over a dynamic airfoil is too complex and requires many computational efforts, the current paper proposes a nonorthogonal and static mesh with oscillation of flow boundary. The results are compared with both well-validated numerical methods and experimental data. A time-marching method is employed to determine system responses. The predicted flutter boundary for NACA0012 airfoil at different free-stream Mach numbers is in fair agreement with direct flutter tools of the Hopf bifurcation points. Finally, the influences of the center of mass and elastic axis position on the system aeroelastic behavior are examined.


2019 ◽  
Vol 9 (15) ◽  
pp. 3021 ◽  
Author(s):  
Buriboev ◽  
Kang ◽  
Ko ◽  
Oh ◽  
Abduvaitov ◽  
...  

The monitoring utilization and workloads of computer hardware components, such as CPU, RAM, bus, and storage, are an ideal way to evaluate the effectiveness of these components. In this paper, we surveyed the basic concepts, characteristics, and parameters of computer systems that determine system performance, and the types of models that provide adequate modeling of these systems. We investigated and developed the applied aspects of the theory of fuzzy sets’ principles and the Matlab environment tools for monitoring and evaluating the state of computing systems. The idea of the paper is to identify the state of the computer infrastructure by using the models of Mamdani and Sugeno FIS (fuzzy inference system) to evaluate the impact of RAM and storage on CPU performance. With this approach, we observed the behavior of computer infrastructure. The results are useful for understanding performance issues with regard to specific bottlenecks and determining the correlation of performance counters. Moreover, the model presents linguistic results. Hereafter, performance counter correlations will support the development of algorithms that can detect whether the performance of a given computer will be affected by a reasonable priority. The performance assertions derived from these approaches allow resource management policies to prevent performance degradation, and as a result, the infrastructure will be able to serve safely as expected. These methods can be applied across the entire spectrum of computer systems, from personal computers to large mainframes and supercomputers, including both centralized and distributed systems. We look forward to their continued use, as well as their improvement when it is necessary to evaluate future systems.


2019 ◽  
Vol 294 (13) ◽  
pp. 4806-4814 ◽  
Author(s):  
Vincent J. C. van Winden ◽  
Merel P. M. Damen ◽  
Roy Ummels ◽  
Wilbert Bitter ◽  
Edith N. G. Houben

Sign in / Sign up

Export Citation Format

Share Document