system movement
Recently Published Documents


TOTAL DOCUMENTS

60
(FIVE YEARS 21)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Vol 3 ◽  
pp. 237-241
Author(s):  
Chuanjuan Zheng ◽  
Mengru Zhang ◽  
Debin Xiao

Mass entrepreneurship and innovation education in colleges and universities is a systematic project promoted as a whole, which pays attention to the cooperation between different participants and the coupling between top-level design and landing implementation, showing a horizontal and vertical intertwined ecological relationship. Constructing the collaborative ecosystem of innovation and entrepreneurship education in colleges and universities is an important topic to promote the comprehensive reform of colleges and universities, a key way to stimulate the innovation and entrepreneurship vitality of the whole society, and the only way to implement the strategy of "strengthening the country through innovation". The research shows that the collaborative ecosystem of innovation and entrepreneurship education in colleges and universities has the characteristics of the openness of the system boundary, the non-equilibrium of the system state, the nonlinearity of the system dynamics and the fluctuation of the system movement, and includes subject collaboration level, system collaboration level and environmental collaboration level. In terms of the construction path, the research further believes that the construction path of the collaborative ecosystem of innovation and entrepreneurship education in colleges and universities includes three aspects: establishing the system structure, releasing the system power and ensuring the development of the system. Among them, the establishment of the system structure is the premise and the release of the system power is fundamental.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Fabio Giuliano Caetano ◽  
Sylvio Barbon Junior ◽  
Ricardo da Silva Torres ◽  
Sergio Augusto Cunha ◽  
Paulo Régis Caron Ruffino ◽  
...  

AbstractDominant regions are defined as regions of the pitch where a player can reach before any other and are commonly determined without considering the free-spaces in the pitch. We presented an approach to football players’ dominant regions analysis, based on movement models created from players’ positions, displacement, velocity, and acceleration vectors. 109 Brazilian male professional football players were analysed during official matches, computing over 15 million positional data obtained by video-based tracking system. Movement models were created based on players’ instantaneous vectorial kinematics variables, then probabilities models and dominant regions were determined. Accuracy in determining dominant regions by the proposed model was tested for different time-lag windows. We calculated the areas of dominant, free-spaces, and Voronoi regions. Mean correct predictions of dominant region were 96.56%, 88.64%, and 72.31% for one, two, and three seconds, respectively. Dominant regions areas were lower than the ones computed by Voronoi, with median values of 73 and 171 m2, respectively. A median value of 5537 m2 was presented for free-space regions, representing a large part of the pitch. The proposed movement model proved to be more realistic, representing the match dynamics and can be a useful method to evaluate the players’ tactical behaviours during matches.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Hao Xu ◽  
Zhong Yang ◽  
Guoxing Zhou ◽  
Luwei Liao ◽  
Changliang Xu ◽  
...  

This paper proposes a novel aerial manipulator with front cutting effector (AMFCE) to address the aerial physical interaction (APhI) problem. First, the system uncertainty and external disturbance during the system movement and contact operation are estimated by modeling the entire robot and contact position. Next, based on the established model, the nonlinear disturbance observer (NDO) is used to estimate and compensate the unknown external disturbance of the system and the uncertainty of the model parameters in real time. Then, the nonsingular terminal synovial membrane control method is used to suppress the part that is difficult to estimate. Finally, a controller which is suitable for the movement and operation of the entire system is designed. The controller’s performance is verified through experiments, and the results show that the design, modeling, and control of the entire system can achieve the APhI.


Author(s):  
Mohammad Asif ◽  
Prof. E. M. Chirchi

Machine learning is embraced in an extensive variety of areas where it demonstrates its predominance over customary lead based calculations. These strategies are being coordinated in digital recognition frameworks with the objective of supporting or notwithstanding supplanting the principal level of security experts although the total mechanization of identification and examination is a luring objective, the adequacy of machine learning in digital security must be assessed with the due steadiness. With the improvement of the Internet, digital assaults are changing quickly and the digital security circumstance isn't hopeful. Since information are so critical in ML/DL strategies, we portray a portion of the normally utilized system datasets utilized in ML/DL, examine the difficulties of utilizing ML/DL for digital security and give recommendations to look into bearings. Malware has developed over the previous decades including novel engendering vectors, strong versatility methods and different and progressively propelled assault procedures. The most recent manifestation of malware is the infamous bot malware that furnish the aggressor with the capacity to remotely control traded off machines therefore making them a piece of systems of bargained machines otherwise called botnets. Bot malware depend on the Internet for proliferation, speaking with the remote assailant and executing assorted noxious exercises. As system movement, action is one of the principle characteristics of malware and botnet task, activity investigation is frequently observed as one of the key methods for recognizing traded off machines inside the system. We present an examination, routed to security experts, of machine learning methods connected to the recognition of interruption, malware, and spam.


Author(s):  
Gabriela SIWECKA ◽  
Ewa WODKA-NATKANIEC ◽  
Łukasz NIEDŹWIEDZKI ◽  
Anna ŚWITOŃ ◽  
Tadeusz NIEDŹWIEDZKI

2021 ◽  
pp. 69-80
Author(s):  
Yu. Romasevych ◽  
◽  
V. Loveikin ◽  
V. Krushelnitsky ◽  
V. Makarets ◽  
...  

In this work, experimental studies were conducted to evaluate the adequacy of the model of the „crane-load” system movement. For research, a laboratory installation (trolley with a load on a flexible suspension), a frequency converter, and encoders were used to measure the position of the trolley and the angle of deviation of the rope with the load from the vertical. Six experiments were performed by varying the duration of the increase and decrease of the frequency of the supply voltage of the trolley drive from 0.5 to 3 s. The increase and decrease of frequency voltage occurred according to a linear law. The data obtained during the experiments were compared with those that correspond to the mathematical model of the „crane-load” system. The mathematical model uses the Kloss equation, and also takes into account the change of frequency of the supply voltage of the drive from the condition of ensuring the overload capacity of the drive. Estimation of deviation of experimental data with results of numerical integration of mathematical model of the movement of the „crane-load” system was carried out based on the coefficient of variation (quantitative analysis) and graphic dependences (qualitative analysis). The obtained results showed the adequacy of the mathematical model of the motion of the „crane-load” system in the form of a system of nonlinear differential equations. Key words: mathematical model, dynamic system, frequency-controlled drive


2021 ◽  
Vol 5 (2) ◽  
pp. 30-37
Author(s):  
Ermayanti Astuti ◽  
Wahyu Rahmansyah

Abstrak- Sistem Informasi Movement Inventory adalah sebuah system yang digunakan untuk memasukan data-data persediaan barang ke dalam database, sehingga tidak terjadi kesalahan dalam input, output data, dan perubahan data. Didapatkan informasi bahwa system yang ada di bagian kebanyakan gudang produk beku masih secara manual. Sehingga cenderung terjadinya kesalahan jumlah data barang dengan jumlah fisik yang ada . Pada system movement inventory di lengkapi fitur input,output, pencarian data barang berdasarkan nama barang. Dengan adanya Sistem Movement Inventory ini di harapkan dapat bermanfaat bagi bagian gudang produk beku. Sistem ini juga diharapkan dapat lebih mempercepat proses input,output, dan perubahan data. Perencanaan bahan beku sangat penting dalam membuat keputusan, khususnya pada perusahaan makanan. Sebagai persediaan yang optimal diupayakan perencanaan dalam menentukan jumlah bahan beku yang diperlukan perusahaan untuk konsumen yang harus dibeli dan waktu bahan beku tersebut dibeli agar operasi bisnis yang dijalankan tidak terganggu karena kekurangan produk bahan beku. Pada setiap harinya jumlah pembelian produk beku di mart sering mengalami kekurangan, beberapa persediaan produk beku makanan khususnya daging yang dibeli menjadi minat konsumen dalam jumlah yang besar sehingga diperlukan Analisa pengendalian persediaan yang tepat. Dari hasil pengumpulan dan pengelolaan data diperoleh kesimpulan dalam menyediakan produk beku bisa dilakukan melalui web dan mengecek persediaan produk beku digudang yang kemudian dapat dilakukan dengan melihat database stok yang tersedia di gudang.  Berdasarkan permasalahan tersebut, penelitian ini bertujuan untuk merancang dan membangun Sistem Informasi yang dapat membantu dalam pengolahan data barang produk beku dan persediaan barang produk beku untuk bulan berikutnya. Implementasi Sistem informasi prediksi pengelolan dapat digunakan untuk melakukan prediksi persediaan per bulan dan dapat digunakan untuk melakukan pemesanan barang.    


2020 ◽  
Vol 146 (2) ◽  
pp. 269-276
Author(s):  
Michael N. Mirzabeigi ◽  
Ran Y. Stark ◽  
Catherine S. Chang ◽  
Jason M. Weissler ◽  
Martin J. Carney ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document