The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are trade-offs between cost and effect for WIP and throughput. Management may need to stimulate environments to find the existing trade-off points and determine the actions needed to minimize their effect on WIP and throughput. Thus, the ANNF system is integrated with Artificial Neural Network and AutoMod Software. The combination of the ANNF system and mathematical theory resulted in a new...
In all human-robot interaction, trust is an important element to consider because the presence or absence of trust certainly impacts the ultimate outcome of that interaction. Limited research exists that delineates the development and maintenance of this trust in various operational contexts. Our own prior research has investigated theoretical and empirically supported antecedents of human-robot trust...
Robotic systems are being introduced into military echelons to extend warfighter capabilities in complex, dynamic environments. While these systems are designed to complement human capabilities (e.g., aiding in battlefield situation awareness and decision making, etc), they are often misused or disused because the user does not have an appropriate level of trust in his or her robotic counterpart(s)...
This paper develops a volume-based technique, called Volume Sphering Analysis (VSA) which can process all acquired Magnetic Resonance (MR) image slices formed image cube using only one set of training samples obtained from an image slice. So, several significant advantages and benefits can be gained from our proposed VSA. In the past, when MR image classification is performed, each image slice requires...
The cancer classification through gene expression patterns becomes one of the most promising applications of the microarray technology. It is also a significant procedure in bioinformatics. In this study a grid computing based evolutionary mining approach is proposed as discriminant function for gene selection and tumor classification. The proposed approach is based on the grid computing infrastructure...
In this investigation, the CoMFA and CoMSIA in the three-dimensional quantitative structure-activity relationship (3D-QSAR) studies were implemented to search for the pharmacophore features in each target receptor. QSAR pharmacophores hypothesis models were made from a series of ligands by their activity values. Besides, we made use of the docking strategy between the structures of each PPARs subtype...
The purpose of this study is to present a new method, independent vector analysis (IVA), by extending independent component analysis (ICA) of univariate source signals to multivariate source signals on Magnetic Resonance Imaging (MRI). IVA is utilized to relief the limitation of the conventional ICA approach. The proposed method can resolve the permutation problem during individual ICA runs for group...
Microsomal prostablandin E synthase-1 (mPGES-1) has been recently investigated to be a novel and promising target for inflammation-related diseases. The quantitative structure-activity relationship (QSAR) study was used to explore the critical pharmacophore features of mPGES-1 by using a set of 35 azaphenanthrenone derivatives. Twenty four selected pharmacophore models derived from 240 hypotheses...
Extracting binary strings from real-valued templates has been a fundamental issue in many biometric template protection systems. In this paper, we present an optimal bit allocation method (OBA). By means of it, a binary string at a pre-defined length with maximized overall detection rate is generated. Experiments with the binary strings and a Hamming distance classifier on FRGC and FERET databases...
We consider a training based acoustic channel estimation technique for the purpose of audio dereverberation. A transmitting device that generates a low power (for minimal disturbance) controlled periodic pseudo-random binary probing signal is placed near the sound source, and the convolved probing and desired signals are collected. By a coherent integration of multiple periods of the received signal,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.