40 research outputs found

    Robust online motion planning with reachable sets

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.Cataloged from PDF version of thesis.Includes bibliographical references (p. 51-55).In this thesis we consider the problem of generating motion plans for a nonlinear dynamical system that are guaranteed to succeed despite uncertainty in the environment, parametric model uncertainty, disturbances, and/or errors in state estimation. Furthermore, we consider the case where these plans must be generated online, because constraints such as obstacles in the environment may not be known until they are perceived (with a noisy sensor) at runtime. Previous work on feedback motion planning for nonlinear systems was limited to offline planning due to the computational cost of safety verification. Here we augment the traditional trajectory library approach by designing locally stabilizing controllers for each nominal trajectory in the library and providing guarantees on the resulting closed loop systems. We leverage sums-of-squares programming to design these locally stabilizing controllers by explicitly attempting to minimize the size of the worst case reachable set of the closed-loop system subjected to bounded disturbances and uncertainty. The reachable sets associated with each trajectory in the library can be thought of as "funnels" that the system is guaranteed to remain within. The resulting funnel library is then used to sequentially compose motion plans at runtime while ensuring the safety of the robot. A major advantage of the work presented here is that by explicitly taking into account the effect of uncertainty, the robot can evaluate motion plans based on how vulnerable they are to disturbances. We demonstrate our method on a simulation of a plane flying through a two dimensional forest of polygonal trees with parametric uncertainty and disturbances in the form of a bounded "cross-wind". We further validate our approach by carefully evaluating the guarantees on invariance provided by funnels on two challenging underactuated systems (the "Acrobot" and a small-sized airplane).by Anirudha Majumdar.S.M

    İlköğretim düzeyinde eğitim öğretim yapan bir kolejin web ihtiyaçlarının karşılanması

    Get PDF
    Yüksek Lisans Bitirme ProjesiTürkiye faaliyet gösteren birçok özel eğitim kurumu bulunmaktadır. Bu kurumların her birinin kendine has özel ihtiyaçları olmaktadır. Hizmet verdikleri eğitim kademesi, bulundukları coğrafya ve bulundukları iklim ihtiyaçların değişmesine neden olmaktadır. 7 coğrafi bölgede de eğitim öğretim faaliyetlerini sürdüren xxx koleji bir web projesi geliştirilmesine ihtiyaç duymaktadır. Yapılacak bu proje fazlar haline yapılması istenmektedir. Her faz tamamlandığında gerekli veri girişi yapılacak olup daha sonra bir diğer faza geçilecektir. Web projesinin tasarımında gözü yormayacak şekilde koyu renklerin kullanılması istenmektedir. Tasarımda modern çizgilerin kullanılması, HTML5 ve Jquery gibi en son teknolojilerin kullanılması istenmektedir. Veri tabanı oluşturulurken mümkün olan iyi performansın sergilemesine özen gösterilmesi istenmektedir

    Website Phishing Technique Classification Detection with HSSJAYA Based MLP Training

    Get PDF
    Website phishing technique is the process of stealing personal information (ID number, social media account information, credit card information etc.) of target users through fake websites that are similar to reality by users who do not have good intentions. There are multiple methods in detecting website phishing technique and one of them is multilayer perceptron (MLP), a type of artificial neural networks. The MLP occurs with at least three layers, the input, at least one hidden layer and the output. Data on the network must be trained by passing over neurons. There are multiple techniques in training the network, one of which is training with metaheuristic algorithms. Metaheuristic algorithms that aim to develop more effective hybrid algorithms by combining the good and successful aspects of more than one algorithm are algorithms inspired by nature. In this study, MLP was trained with Hybrid Salp Swarm Jaya (HSSJAYA) and used to determine whether websites are suspicious, phishing or legal. In order to compare the success of MLP trained with hybrid algorithm, Salp Swarm Algorithm (SSA) and Jaya (JAYA) were compared with MLPs trained with Cuckoo Algorithm (CS), Genetic Algorithm (GA) and Firefly Algorithm (FFA). As a result of the experimental and statistical analysis, it was determined that the MLP trained with HSSJAYA was successful in detecting the website phishing technique according to the results of other algorithms

    EKG Sinyallerini kullanarak Kalp Ritimlerinin Yapay Zekâ ile Sınıflandırılması

    Get PDF
    Günümüzde teknolojinin hızla ilerlemesi ile birlikte yapay zekâ yöntemleri de birçok alanda sıklıkla kullanılmaktadır. Yapay zekanın önemli kullanım alanlarından birisi de sağlık sektörüdür. Sağlık sektöründe erken teşhis, insan kaynaklı hataların minimuma indirilmesi gibi birçok durumda yapay zekâ yöntemleri kullanılmaktadır. Çalışmada açık kaynak erişimli internet sitesinden (kaggle.com) elde edilen 127710 adet EKG sinyallerine ait veri seti kullanılmıştır. Veri seti 100.710 adet eğitim, 1.500 adet veri de test ve kalan 25.000 adet veri ise doğrulama verisi olarak kullanılmıştır. Eğitim verileri için tasarlanan CNN modeli normal sinüs ritmi, supraventriküler erken atım, erken ventriküler kasılma, ventriküler ve normal atımın karışımı ve sınıflandırılamayan atım olmak üzere toplam beş sınıf için eğitilmiştir. Tasarlanan CNN modelinde hata oranı %5,3, duyarlık oranı %94,4, hassasiyet oranı %94,6, F-değeri ise %94,4 ve %94,7 doğruluk oranı olmak üzere beş farklı performans kriterine göre değerlendirilmiştir

    Investigation of Preschool Education Teachers, Preschool Children and Mothers' Opinions on Artificial Intelligence

    Get PDF
    Nowadays, artificial intelligence, which is used in different fields with the increase in the number of works and transactions carried out in digital environment, is also used in the field of education. The main purpose of this study is to examine the views about artificial intelligence of preschool children, their mothers and teachers. The research was planned with phenomenology research design, one of the qualitative research methods. The study group of the research was formed by selecting a total of 30 people in the convenience sampling method, including 5 preschool teachers teaching in public and private independent kindergartens, 1 student from each teacher's 5-year-old class and his/her mother. The data were collected through interviews and the interview questions were prepared by the researchers as open-ended questions. According to the results of the research, it was concluded that although the teachers defined artificial intelligence on the correct scientific basis, they did not have sufficient knowledge, did not use it in educational environments to increase the productivity of children and were worried. Considering the answers given by mothers and children to the questions about artificial intelligence, it can be interpreted that artificial intelligence is not defined correctly and there is a lack of knowledge, mothers have concerns that artificial intelligence may be harmful for their children, and children see artificial intelligence as a living being that they can talk to

    Detecting Poisoning Attacks on Hierarchical Malware Classification Systems

    Get PDF
    Anti-virus software based on unsupervised hierarchical clustering (HC) of malware samples has been shown to be vulnerable to poisoning attacks. In this kind of attack, a malicious player degrades anti-virus performance by submitting to the database samples specifically designed to collapse the classification hierarchy utilized by the anti-virus (and constructed through HC) or otherwise deform it in a way that would render it useless. Though each poisoning attack needs to be tailored to the particular HC scheme deployed, existing research seems to indicate that no particular HC method by itself is immune. We present results on applying a new notion of entropy for combinatorial dendrograms to the problem of controlling the influx of samples into the data base and deflecting poisoning attacks. In a nutshell, effective and tractable measures of change in hierarchy complexity are derived from the above, enabling on-the-fly flagging and rejection of potentially damaging samples. The information-theoretic underpinnings of these measures ensure their indifference to which particular poisoning algorithm is being used by the attacker, rendering them particularly attractive in this setting

    Modelado en 3D de una puerta de la ciudad de Rennes del siglo XV: Portes Mordelaises

    Get PDF
    [EN] The Portes Mordelaises, remnants of the medieval city walls of Rennes, France, has been the subject of several archaeological excavations until 2017. From these excavations, we created a three-dimensional (3D) model of the site reconstructed as it would have appeared during the 15th century, including the surrounding plus the interiors of its famed towers. Once our efforts and results were officially recognised as being of national interest by the French Ministry of Culture and Communication, Department of Heritage and the National Museum Service of France, we presented our virtual model reconstruction in an exhibition curated by the Museum of Bretagne, entitled "Rennes, les vies d'une ville" (Rennes, the Lives of a City). This approach to 3D reconstruction of the site served to further study Rennes’ origins, its construction, organisation, as well as its historic relationship to surrounding territories. The main objective of this work was to investigate, using of a significant and com[ES] Las Portes Mordelaises, restos de las murallas medievales de la ciudad de Rennes, Francia, han sido objeto de varias excavaciones arqueológicas hasta el año 2017. A partir de estas excavaciones, pudimos crear un modelo tridimensional (3D) del sitio reconstruido tal y como habría aparecido durante el siglo XV, incluyendo los terrenos circundantes así como los interiores de sus famosas torres. Una vez que nuestros esfuerzos y resultados fueron reconocidos oficialmente como de interés nacional por el Ministerio de Cultura y Comunicación de Francia, el Departamento de Patrimonio así como el Servicio Nacional de Museos de Francia, presentamos nuestra reconstrucción del modelo virtual en una exposición gestionada por el Museo de Bretaña titulada "Rennes, las vidas de una ciudad”. Este enfoque de la reconstrucción en 3D del sitio sirvió para profundizar en el estudio de los orígenes de Rennes, su construcción, su organización, así como su relación histórica con los territorios circundantes. EBarreau, J.; Esnault, E.; Foucher, J.; Six, M.; Le Faou, C. (2020). 3D modelling of a 15th century city gate of Rennes: Portes Mordelaises. Virtual Archaeology Review. 11(22):41-55. https://doi.org/10.4995/var.2020.12653OJS41551122Ahmad, T., Afzal, M., Hayat, F., Asif, H. S., Ahsan, S., & Saleem, Y. (2012). Need for software design methodology for remote sensing applications. Life Sci Journal, 9(3), 2152-2156.Al-Baghdadi, M. A. S. (2017). 3D printing and 3D scanning of our ancient history: Preservation and protection of our cultural heritage and identity. International Journal of Energy and Environment, 8(5), 441-456.Alix, C., Carron, D., Roux-Capron, E., & Josserand, L. (2016). La porte Bannier, entrée principale de la ville d'Orléans aux XIVe-XVe siècles. Archeologie medievale, (46), 91-122. https://doi.org/10.4000/archeomed.2781Athanasoulis, D., Georgiou, A., Simou, X., Sfika, A., Klotsa, V., Zirogianni, T., Theodoropoulos, C., & Deligianni, E.-O. (2015). Bridging monuments through digital repository and graphic reconstruction methodologies. The Digital Enhancement Project of Argolid, Arcadia and Corinthia castles, Greece. In 2015 Digital Heritage, Vol. 1, (pp. 107- 110). Granada, Spain. https://doi.org/10.1109/digitalheritage.2015.7413846Auer, C. (2017). L'archéologie high tech - xenius arte. Retrieved February 16, 2017, from www.cnrs.fr/CNRSHebdo/bretagne-paysdeloire/actus.php?numero=11666Banfi, F., Brumana, R., & Stanga, C. (2019). Extended reality and informative models for the architectural heritage: from scan-to-BIM process to virtual and augmented reality. Virtual Archaeology Review, 10(21), 14-30. https://doi.org/10.4995/var.2019.11923Barreau, J. B. (2017). Techniques de production, d'exploration et d'analyse d'environnements archéologiques virtuels.(Production, exploration and analysis techniques of virtual archaeological environments) (Doctoral dissertation, INSA de Rennes, France). Retrieved from https://tel.archives-ouvertes.fr/tel-01633811/documentBarreau, J.-B., Bernard, Y., Petit, Q., Beuchet, L., Petit, E., Platen, V., Gaugne, R., Le Rumeur, J., & Gouranton, V. (2014). Combination of 3D scanning, modeling and analyzing methods around the castle of Coatfrec reconstitution. In Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection. EuroMed 2014 (pp. 418-426). Limassol, Cyprus. https://doi.org/10.1007/978-3-319-13695-0_40Barreau, J.-B., Gaugne, R., Bernard, Y., Le Cloirec, G., & Gouranton, V. (2013). The West Digital Conservatory of Archaelogical Heritage project. In 2013 Digital Heritage (pp. 1-8). Marseille, France. https://doi.org/10.1109/digitalheritage.2013.6743795Barreau, J.-B., Lanoe, E., & Gaugne, R. (2020). 3D sketching of the fortified entrance of the citadel of Aleppo from a few sightseeing photos. In Kremers H. (Ed.), Digital Cultural Heritage (pp. 359-371). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-15200-0_24Barrera-Vera, J. A. (2005). Generation of virtual models of historical tapial walls in Seville (Spain). In VSMM 2005: proceedings of the eleventh International Conference on Virtual Systems and Multimedia: Virtual reality at work in the 21st century: impact on society. Ghent, Belgium.Bayraktar, C. (2016). V-RAY 3.3. Istanbul: Kodlab Yayin Dağitim Yazilim Ltd.şti.Boochs, F., Hoffmann, A., Huxhagen, U., & Welter, D. (2006). Digital reconstruction of archeological objects using hybrid sensing techniques-The example Porta Nigra at Trier. Bar International Series, 1568, 395-400.Bosser, A. G. (2004). Massively multi-player games: Matching game design with technical design. In Proceedings of the 2004 ACM SIGCHI International Conference on Advances in computer entertainment technology (pp. 263-268). Singapore. https://doi.org/10.1145/1067343.1067378Brioso, X., Calderón, C., Aguilar, R., & Pando, M. A. (2019). Preliminary methodology for the integration of lean construction, bim and virtual reality in the planning phase of structural intervention in heritage structures. In Structural Analysis of Historical Constructions (pp. 484-492). Cusco, Peru. https://doi.org/10.1007/978-3-319-99441-3_52Canciani, M., Conigliaro, E., Grasso, M. D., Papalini, P., & Saccone, M. (2016). 3D survey and augmented reality for cultural heritage. The case study of Aurelian wall at Castra Praetoria in Rome. International Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences, XLI-B5, 931-937. https://doi.org/10.5194/isprsarchives-xli-b5-931-2016Carrión-Ruiz, B., Blanco-Pons, S., Weigert, A., Fai, S., & Lerma, J. L. (2019). Merging photogrammetry and augmented reality: The Canadian Library of Parliament. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 42(2/W11), 367-371. https://doi.org/10.5194/isprs-archives-xlii-2-w11-367-2019Châtellier, L. (2011). Modélisation 3d: la porte Cailhau. Retrieved May 20, 2011, from https://www.kiwimage.com/2011/3d/modelisation-3d-la-porte-cailhau/Contenson, L. D. (1907). Les remparts de Rennes. Bulletin Monumental, 71(1), 431-441. https://doi.org/10.3406/bulmo.1907.11425Debacker, P. (2019). Grâce aux nouvelles technologies, les archeologues sont plus efficaces. Retrieved June 14, 2019, from https://www.1jour1actu.com/science/grace-aux-nouvelles-technologies-les-archeologues-sont-plus-efficacesDelone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of Information Systems success: a ten-year update. Journal of Management Information Systems, 19(4), 9-30. https://doi.org/10.1080/07421222.2003.11045748Du Crest de Villeneuve, E.-R., & Lorette, H. (1841). Album Breton: souvenirs de Rennes. Rennes: Ambroise Jausions.Esnault, E. (2012). RENNES (35). Les Portes Mordelaises. Rapport intermédiaire de fp. Fouille programmée, RAP02792, Service Régional de l'Archéologie de Bretagne. Retrieved from http://bibliotheque.numerique.srabretagne.fr/files/original/d5dcfe1a4491a228ffac3aa84cca0226.pdfEsnault, E. (2013). Rennes (Ille-et-Vilaine). Les portes Mordelaises. Archéologie Médiévale, 43, 273-274.Esnault, E. (2014a). RENNES (35). Les Portes Mordelaises. Rapport intermédiaire de fp 2012-2014. Fouille programmée, RAP02919, Service Régional de l'Archéologie de Bretagne. Retrieved from http://bibliotheque.numerique.sra-bretagne.fr/files/original/f3e868678cdd1dd64a9cd2fd12efde4b.pdfEsnault, E. (2014b). Rennes (Ille-et-Vilaine). Les portes Mordelaises. Archéologie Médiévale, 44, 279.Esnault, E. (2015a). RENNES (35). Les Portes Mordelaises. Rapport intermédiaire de fp. Fouille programmée, RAP03063, Service Régional de l'Archéologie de Bretagne. Retrieved from http://bibliotheque.numerique.srabretagne.fr/files/original/912019e9c7133236f6611868b3b0fa86.pdfEsnault, E. (2015b). Rennes (Ille-et-Vilaine). Les portes Mordelaises. Archéologie Médiévale, 45, 250-251.Esnault, E. (2016a). RENNES (35). Les Portes Mordelaises. Rapport intermediaire 2015 de FP. Fouille programmée, RAP03203, Service Régional de l'Archéologie de Bretagne. Retrieved from http://bibliotheque.numerique.srabretagne.fr/files/original/034c4915717c242d2af1df753ce91089.pdfEsnault, E. (2016b). Rennes (Ille-et-Vilaine). Les portes Mordelaises. Archéologie Médiévale, 46, 266-267.Esnault, E. (2017a). RENNES (35). Les Portes Mordelaises. Rapport intermediaire 2016 de FP. Fouille programmée, RAP03386, Service Régional de l'Archéologie de Bretagne. Retrieved from http://bibliotheque.numerique.srabretagne.fr/files/original/bcc431b25e3267e4b6995701b6af4594.pdfEsnault, E. (2017b). Rennes (Ille-et-Vilaine). Les portes Mordelaises. Archéologie Médiévale, 47, 246-247.Esnault, E. (2018a). Les fortifications médiévales et les Portes Mordelaises. Retrieved January 5, 2020 from https://multimedia.inrap.fr/atlas/Rennes/syntheses/par-themes/Les-fortifications-medievales-et-les-PortesMordelaises#.XhzRNiNCeUkEsnault, E. (2018b). Les nouvelles techniques de relevés appliquées à l'archéologie du bâti et à l'archéologie urbaine. In S. Eusèbe, T. Nicolas, V. Gouranton, & R. Gaugne (Dir.) - Archéologie: imagerie numérique et 3D: Actes du 3e Séminaire Scientifique et Technique de l'Inrap, 26-27 juin 2018. Rennes, France. Retrieved from https://sstinrap.hypotheses.org/501Esnault, E. (2018c). RENNES (35). Les Portes Mordelaises. Rapport intermediaire 2017 de FP. Fouille programmée, RAP03512, Service Régional de l'Archéologie de Bretagne. Retrieved from http://bibliotheque.numerique.srabretagne.fr/files/original/d517bc059b5dd79cc80d0997777a3f0b.pdfFerko, A., Martinka, J., Sormann, M., Karner, K., Zara, J., & Krivograd, S. (2004). Virtual Heart of Central Europe. In Proceedings of 9th symposion on Info & Communication Technology in Urban and Spatial planning and Impacts of ICT on Physical Space (pp. 193-200). Wien, Austria.Fisher, M., & Hanrahan, P. (2010). Context-based search for 3D models. ACM transactions on Graphics (TOG), 29(6), 182. https://doi.org/10.1145/1882261.1866204Freudenberg, B., Masuch, M., Rober, N., & Strothotte, T. (2001). The Computer-Visualistik-Raum: veritable and inexpensive presentation of a virtual reconstruction. In Proceedings of the 2001 conference on Virtual Reality, Archeology, and Cultural Heritage (pp. 97-102) Glyfada, Greece. https://doi.org/10.1145/585009.585010Gaugne, R., Gouranton, V., Dumont, G., Chauffaut, A., & Arnaldi, B. (2014). Immersia, an open immersive infrastructure: doing archaeology in virtual reality. Archeologia e Calcolatori, suppl. 5, 1-10.Guillas, N. (2013). Des drones qui fouillent le sol. Sciences Ouest, 312.Haller, M. (2004). Photorealism or/and non-photorealism in augmented reality. In Proceedings of the 2004 ACM SIGGRAPH International Conference on Virtual Reality Continuum and its Applications in Industry (pp. 189-196). Singapore. https://doi.org/10.1145/1044588.1044627Hoda, R., Salleh, N., & Grundy, J. (2018). The rise and evolution of agile software development. IEEE Software, 35(5), 58-63. https://doi.org/10.1109/ms.2018.290111318Inrap (2018). Archéologie de la ville de Rennes, carte des sites de fouilles. Retrieved January 3, 2020, from https://multimedia.inrap.fr/atlas/Rennes/archeo-RennesInrap (2019). Rennes. Retrieved January 8, 2020, from https://www.inrap.fr/communes/rennesJahn, I., Kersten, T., & Kinzel, R. (2004). Erfahrungen mit einem 3d-laserscanning-system bei der erfassung einer industrieanlage und des lubecker holstentores. Photogrammetrie-Laserscanning-Optische 3D-Messtechnik (pp. 222- 229).Koutonen, J., & Leppänen, M. (2013). How are agile methods and practices deployed in video game development? A survey into Finnish game studios. In International Conference on Agile Software Development (pp. 135-149). Berlin, Germany. https://doi.org/10.1007/978-3-642-38314-4_10Le Cloirec, G. (2019). Du crayon au SIG: 30 ans d'archeologie urbaine à Rennes. Retrieved August 5, 2019, from https://musee-devoile.blog/2019/08/05/du-crayon-au-sig-30-ans-darcheologie-urbaine-a-rennesLópez, L., Arroyo, G., & Martín, D. (2012). Computer tool for automatically generated 3D illustration in real time from archeological scanned pieces. Virtual Archaeology Review, 3(6), 73-77. https://doi.org/10.4995/var.2012.4447Marek, M., & Hipp, K. (2011). Cracovia 3D: rekonstrukcje cyfrowe historycznej zabudowy Krakowa. Kraków: Kolegium Wydawnicze Muzeum Historycznego Miasta Krakowa.Ouest-France (2013). L'histoire des Portes mordelaises se visite. Retrieved April 25, 2013 from https://www.ouestfrance.fr/bretagne/rennes-35000/lhistoire-des-portes-mordelaises-se-visite-1078116Mora, P., & Vivier, A. (2007). Le levé tachéométrique et son utilisation dans la numérisation de sites archéologiques. In Virtual Retrospect, 3 (pp. 203-206). Pessac, France.Mortara, M., & Catalano, C. (2018). 3D Virtual environments as effective learning contexts for cultural heritage. Italian Journal of Educational Technology, 26(2), 5-21. https://doi.org/10.17471/2499-4324/1026Ouest-France (2019). "Rennes, les vies d'une ville", une exposition qui vous fait voyager dans le temps. Retrieved January 26, 2019 from https://www.ouest-france.fr/bretagne/rennes-35000/rennes-les-vies-d-une-ville-uneexposition-qui-vous-fait-voyager-dans-le-temps-6197410Ozimek, P. (2007). Rekonstrukcja wirtualna obiektow architektonicznych. Roczniki Geomatyki-Annals of Geomatics, 5(8), 173-185.Pybus, C., Graham, K., Doherty, J., Arellano, N., & Fai, S. (2019). New realities for Canada's Parliament: a workflow for preparing heritage bim for game engines and virtual reality. International Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences, XLII-2/W15, 945-952. https://doi.org/10.5194/isprs-archives-XLII-2-W15945-2019Regnard, A.-L. (2015). Construction de la maquette 3D de Rennes Métropole: mise en place, analyse et optimisation des processus (Master's thesis, CNAM - École Supérieure des Géomètres et Topographes, Le Mans, France).Remondino, F. (2003). From point cloud to surface: the modeling and visualization problem. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, XXXIV-5/W10.Resco, P. A., & Figueidero, C. (2014). Escala de evidencia histórica | Scale of historical evidence. Retrieved January 10, 2015, from https://parpatrimonioytecnologia.wordpress.com/2014/07/21/escala-de-evidencia-historica-scale-ofhistorical-evidenceSix, M. (2018). Rennes, les vies d'une ville. Rennes: Presses Universitaires de Rennes.Tucci, G., Conti, A., Fiorini, L., Corongiu, M., Valdambrini, N., & Matta, C. (2019). M-BIM: a new tool for the Galleria dell'Accademia di Firenze. Virtual Archaeology Review, 10(21), 40-55. https://doi.org/10.4995/var.2019.11943Veillard, K. (2015). Plongeon dans le passé ce week-end avec les journées de l'Archéologie. Retrieved June 18, 2015, from https://france3-regions.francetvinfo.fr/bretagne/2015/06/18/plongeon-dans-le-passe-ce-week-end-avec-lesjournees-de-l-archeologie-749959.htmlZhangyu, D. (2014). Capital gatekeeper. Retrieved November 19, 2014, from http://www.chinadaily.com.cn/beijing/201411/19/content_18939388.ht

    Estructura de control en ROS y modos de marcha basados en máquinas de estados de un robot hexápodo

    Get PDF
    [Resumen] Los sistemas de control en ROS basados en el paquete ros control requieren la coordinación y publicación de cantidades ingentes de información. En los siguientes apartados se describe la estructura y herramientas que simplifican el control al uso de funciones simples en C++. Estas se recogen como métodos de una clase que simboliza el actuador de un robot hexápodo de exploración. Los modos de marcha de este robot, se planifican mediante máquinas de estados que simplifican su planteamiento y aumentan la capacidad de respuesta ante un fallo.Comunidad de Madrid; S2013/MIT-2748Ministerio de Economía y Competitividad; DPI2014-56985-

    Yiyecek İçecek İşletmelerinde Yapay Zekâ Tabanlı Pazarlama

    Get PDF
    Teknolojide yaşanan gelişmeler pazarlama faaliyetlerini derinden etkilemektedir. Özellikle devrim niteliğindeki yapay zekâ teknolojisi pazarlama faaliyetlerinde büyük değişimler ve dönüşümler meydana getirmektedir. Yiyecek içecek işletmeleri de bu gelişmelerden etkilenmektedir. Bu çalışmanın amacı yiyecek içecek işletmelerinin pazarlama faaliyetlerinde yapay zekâ kullanımının mevcut durumunu ortaya koymak ve literatür temelinde gelecek perspektifleri sunmaktır. Bu kapsamda pazarlama karmasının dört temel unsuru olan ürün (Product), fiyat (Price), dağıtım (Place) ve tutundurma (Promotion) açısından yiyecek içecek işletmelerinde yapay zekâ kullanım durumu incelenmiştir. Çalışma sonuçları; yiyecek içecek işletmelerindeki yapay zekâ tabanlı pazarlama faaliyetleri ile ürün ve hizmetlerde kişiselleştirme yapılabileceğini, dinamik fiyatlandırma uygulanabileceğini, en uygun dağıtım zamanının ve yönteminin belirlenebileceğini, kişiye özgü tutundurma faaliyetleri yürütülebileceğini göstermektedir. Bu araştırmanın yiyecek içecek işletmelerindeki pazarlama faaliyetlerinin yapay zekâ temelinde ele alması açısından literatüre katkı sağlayacağı ve gelecekte bu alanda yapılacak çalışmalara rehberlik edeceği düşünülmektedir

    Comparison of the cloud computing and the traditional alternatives: advantages, risks and advices for migration

    Get PDF
    Web tabanlı bir yazılım uygulamasını barındırmak için uzun bir zaman boyunca kullanılan yegâne araç, sunucu edinme veya kiralama yoluyla web uygulamalarını kullanıcıların hizmetine sunmaktı. Bulut teknolojisinin ortaya çıkışı ile bu yönteme önemli bir alternatif ortaya çıkmıştır. Bulut sayesinde başta yazılım uygulamalarını barındırma hizmetleri olmak üzere, dosya depolama, veri işleme, veri tabanı barındırma gibi birçok hizmet Google ve Amazon gibi büyük şirketlerin yanında irili ufaklı birçok başka şirket tarafından da sunulmaya başlanmıştır. Sunulan hizmetler bulut başlığı altında tek bir hizmetten birden fazla hizmete kadar değişmektedir. Bulut kavramı sunulan servislerin dışsallığına gönderme yapmakla beraber yeterli olanağa sahip şirketlerin kendi bünyelerinde de oluşturabilecekleri bir altyapıyı da ifade etmektedir. Türkçe yazında bulut teknolojilerine yönelik ilgi mevcut olmakla birlikte bu çalışmalar bulut çözümlerinin kavramsal boyutlarını ele almakta ancak işletmeler açısından pratik yararları değerlendirmemektedir. Bu çalışmada, bu boşluğu doldurmak amacıyla yönetim bilişim sistemleri perspektifinde bulut platformunun olumlu ve olumsuz özellikleriyle ilişkili yazını incelenmiş; daha sonra yazında geçen ve risk veya olumsuzluk olarak ele alınan konuların yeni girişimler için geçerli olmayabileceği ortaya konmuştur. Ayrıca işletmelerin özellikle yeni girişimlerin bulut platformunu kullanmalarının yaratacağı faydalar ve geleneksel alternatifleri ile mukayesesi ele alınmıştır.Up to emerging cloud technologies, the only way to host a web application was by purchasing or renting a server or using hosting services. The cloud technology emerged as a new alternative in the market. With cloud technology, many services, such as file hosting, data warehousing, and web hosting have begun to be offered by small and large companies such as Google and Amazon. Services which offered by these companies vary from a single service to multiple services under the cloud technology title. The 'cloud' concept refers to the externalities of the services offered and also refers to the infrastructure that companies with sufficient capabilities can create in their own structures. While there is interest in cloud technologies in Turkish literature, these studies deal with the conceptual dimensions of cloud solutions but do not assess their practical benefits in terms of enterprises. This study examines the positive and negative aspects of the cloud platform in terms of management information systems in order to fill this gap and it is revealed that the topics which considered as risk or negativity may not be valid for new ventures. In addition, the benefits of usage of the cloud technologies and its alternatives for enterprises especially for new ventures have been evaluated
    corecore