The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we show that the singularities of C-Bézier curves can be controlled, and we prove that if a nth degree C-Bézier curve has a singular point, then it can be explicitly computed. It is useful when using C-Bézier curves for curve and surface modeling.
Catheterization is the treatment insert tube which name is catheter from thigh's or wrist's artery and discharge fluid, give medicine to affected area directly etc. Recently this treatment is commonly performed because make only a small hole to the patient body thus patient bears little risks. At the catheterization, expert surgeon's experience and knowledge are needed for making optimal shape of...
In medical imaging research fields, three-dimensional (3D) shape modeling and analysis of anatomic structures with fewer parameters is one of important issues, which can be used for computer assisted diagnosis, surgery simulation, visualization and many medical applications. The 3-D object shape or surface can be expressed by spherical harmonics. In this paper, we present a spherical harmonics based...
Representation and evaluation methods for statistically predicting organ shapes from neighboring organ shapes are described. In order to fully utilize the constraints on interrelations of multiple organ shapes, various extents of sub-shapes of organs are considered based on their proximity instead of just using the whole organ shapes. The prediction power are evaluated for various extents of sub-shapes...
In computational anatomy, statistical shape model is used for quantitative evaluation of the variations of an organ shape. This paper is focused on construction of Statistical Shape Model of the liver and its application to computer assisted diagnosis. We prove the potential application of statistical shape models in classification of normal and cirrhosis livers. First, statistical shape model of...
Functionality Testing is one of the most popular used technologies of black-box testing strategy. Programs to be test were taken as implicit functions mapping inputs into outs. In the view of functionality testing, if the functional behaviors of the program can be predicated correctly, it could be applied as test oracles for newer test cases generation. The main problems of this issue are discussed...
This paper proposes a suboptimal nonlinear model predictive control (NMPC) algorithm based on Genetic Algorithm (GA). A nonlinear programming problem is solved online in NMPC. GA has been successfully applied to nonlinear programming problems where other decent-based methods have often failed. In this paper GA is used to optimize the control sequence per sampling time. In order to reduce the computational...
The rapid advancement of information and communication technologies (ICTs) has being shaping up a new value chain for tourism. Some travel organizers are getting less profit from the standard package tours because of the shift in the structure of tourism. If we take the mass customization into consideration with module package tours, the increasing number of independent travelers including backpackers...
Based on the assumption of a single wiring open in a signal net, it is known that the non-tree topology for a signal net has no adjacent loop. In this paper, based on RC non-tree transformation in Elmore delay model, an optimal algorithm for timing analysis is firstly proposed to compute the timing delays of all the reference nodes in a non-tree topology. Compared with the SPICE tool, the experimental...
Statistical shape model (SSM) is to model the shape variation of an object. The statistical shape models are constructed by analysis of the positions of a set of landmark points based and use the surface information. In this paper, we propose a new PCA based statistical shape modeling technique and its application to medical applications. In the proposed method, boundary points of each slice are used...
Uncertainty over exit time is an important practical issue faced by most investors. In this paper, we introduce the notations of the possibilistic mean, variance and covariance of fuzzy numbers to generalize Markowitz analysis. In the first time, we consider the uncertain investment period from the point of view of possibilistic analysis, and build the possibilistic models of portfolio selection under...
This paper addresses the portfolio selection problem in a robust manner. In practice, it is difficult to collect all information to determine the precise bounds of the box uncertainty set used in robust portfolio optimization. To solve this problem, we introduce a novel uncertainty set: interval random uncertainty. We apply our interval random chance-constrained programming to robust semi-absolute...
When employing fuzzy random variable in some real programming problems, it is not easy to specify the fuzzy values of random variables. But it is relatively easy to obtain the boundaries of the values of random variables. Hence, it is a good idea for people to determine the values of random variables as intervals. In this paper, we introduce the framework of interval random variable and interval random...
Due to the existence of hubs in P2P networks, the network becomes more and more vulnerable because of great reducing in defending against coordinated attacks. This paper propose a model based on trust value of nodes against vulnerability, which not only takes into account the node's connections, but also gives full consideration about the node's trust value, and the calculation of trust value is broken...
In this paper, we propose an evolutionary perturbation algorithm of Simulated Annealing in optimization of kinoform. At the optimization of the kinoform, the perturbation of the Simulated Annealing is determined by result of the previous perturbation. The evolutionary perturbation can improve the convergence of cost function of the optimization. Computer simulation demonstrated that the proposed method...
In this paper, we give a new and improved Bounded Model Checking encoding method for the universal fragment of CTL (ACTL). More specifically, the new encoding method works for verification of ACTL properties, instead of error-hunting. Combine our verification encoding and bug-hunting encoding proposed before, we get a Bounded Model Checking procedure that works for both valid and invalid ACTL properties...
The prominent virtues of grey prediction are small information, few data and a little of computation. The conventional PID controller has strong robustness, sophisticated technology and simple structure, so it has been used widely in the process control. With the adjustable role of feedback response of biological immune systems, the capability of simulating non-linear functions with fuzzy rationalizing...
In this paper, we propose a multimedia information retrieval frame-work in distributed networks, which is suitable for both cooperative and non-cooperative environments and resistant to biased content summaries. The relations of peers are established and evolved according to their historical interactions, which are computed with a peer reputation model. Peers sharing the same topic tend to group themselves...
This paper deals with steering control problem of a computer simulated model car with fuzzy control approach. For simulating the real environment, the stochastic behavior of system is considered as multiplicative noise term. In addition, the external disturbance effect on system is also discussed for achieving attenuation performance by applying passivity theory. Through using the Takagi-Sugeno (T-S)...
Designs with non-tree consideration have been proven to improve the yield and reliability in modern chips. In this paper, an efficient three-phase approach for transformation-based timing analysis is proposed to transform a cyclic graph into an acyclic graph by using the node-splitting operation and compute the delay of the transformed tree-based circuit in an Elmore delay model. Compared with the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.