The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper is concerned with analyzing and comparing two exact algorithms from the viewpoint of computational complexity. Both are for calculating fault-detection tests for digital circuits. The first one is the so-called composite justification, and the second is the D-algorithm. The analysis will be performed on combinational logic networks at the gate level. Here single and multiple stuck-at logic...
This paper suggests a new pattern of human knowledge. Its execution represents an important stage in the general framework of aiming the building of an artificial cognitive system. First the general presentation of the artificial cognitive system, its objective, main principles and implementation phases are highlighted. The known patterns, which have a cultural (philosophical, psychological and linguistic)...
In a clinical context, dementia refers to a syndrome of acquired cognitive deterioration that can be associated with various potential stages of the disease. The two most common variations of this disease are Alzheimer type dementia and Vascular type dementia, although there are other forms known as mixed dementia. All of these forms can be associated with different patterns of anatomical affectation,...
The designed architecture of intrusion detection system uses a two-layer hybrid model for detecting intrusions. The system processes network flows in real communication operation and provides processing of these data in real time. First layer consists of detection sensors which provide basic processing of input data based on statistical methods with a direct connection to countermeasure modules. Performance...
Intelligence in engineering systems is expected to gain much more attention during the next years than presently because making interdependent decisions along contextual chains by an engineer increasingly requires reproduction of earlier decisions by other engineers. While a single decision on an object parameter or parameter group in a product structure may be influenced by several humans, humans...
Nowadays in solving engineering problems the processing of the information always involves some kind of measurement and signal processing tasks, as well. This fact has pressed experts focus more deeply on modeling and signal processing techniques and to apply non-classical, artificial intelligence, and soft computing based methods to overcome problems arising from the increased complexity of the today's...
In this paper we present a computing system which based on computations on intervals over [0,1]. The interval-values are built up from points and atomic intervals. The Boolean operators are extended to these values in a natural way. Changing the bytes of the traditional computing to interval-values one gets the interval-valued computing device. We investigate the operators Rshift and Lshift as well...
The purpose of this paper is to show the effectiveness of the graphic-analytical methods used in electrical motor control, especially in vector control systems. The graphic-analytical methods used along with the other methods, like Strejc's method, logarithmic method, integration method, present very good results if the PI controllers are replaced with transfer-function-based ones. It is important...
NFC is one of the latest wireless communication technologies, making possible variety of business opportunities. At Budapest University of Technology and Economics (BME) a generalized approach for NFC application development has been elaborated, where the Mobile Network Operators (MNOs), as well as service providers can make their own application and run it in the proposed common environment. We have...
This paper presents a multiagent system that can process stereoscopic images and detect people with a stereo camera. In the first of two phases, the system creates a model of the environment using a disparity map. It can be constructed in real time, even if there are moving objects present in the area (such as people passing by). In the second phase, the system is able to detect people by combining...
Denial of Service (DoS) attacks are some of the biggest problems for computer security. Detection and early alert of these attacks would be helpful information which could be used to make appropriate decisions in order to minimize their negative impact. This paper proposes a new approach based on SOM-type unsupervised artificial neural networks for detection of this type of attacks at an early stage...
We give a new representation theorem of the negation based on the generator function of the strict operator. We study a certain class of strict monotone operators which build DeMorgan class with infinite negations. We show that the necessary and sufficient condition for this operator class is fc(x)fd(x) = 1; where fc(x) and fd(x) are the generator function of the conjunctive and disjunctive operators.
Working in virtual environments at leading industries in highly integrated and experience driven engineering systems demands new knowledge and skill from engineers. At the same time, engineering has been extended to the entire lifecycle of products. Finally, physical prototyping is being replaced by integrated simulations where this is possible. The above new trends require re-evaluation of teaching...
The Tensor Product (TP) model transformation is a recently proposed technique for transforming given Linear Parameter-Varying (LPV) state-space models into polytopic model form, namely, to parameter-varying convex combination of Linear Time Invariant (LTI) systems. The main advantage of the TP model transformation is that it is executable in a straightforward way and the Linear Matrix Inequality (LMI)...
In this paper we present a biometric approach, based on lip shape. We have performed an image preprocessing, in order to detect the face of a person image. After this, we have enhanced the lips image using a color transformation, and next we do its detection. The parameterization is based on lips contour points. Those points have been transformed by a Hidden Markov Model (HMM) kernel, using a minimization...
Presented paper deals with processing of electron-microscope images of Picea Abies stomas. A stoma character strongly depends on the level of air pollution in the area where the tree grows - as the stoma epidermis covers with epiticular waxes to protect itself against the negative environmental influences. According to the level of incrustation it is possible to distinguish five classes of stoma structure...
This paper presents the possibility of deformation of the object contours using Graph cut method. The user interactively defines the contour of the object based on own requirements for segmentation. The procedure proposed in this article seeks global optimal solution Graph cut segmentation for local parts of the input image versus finding a global optimal solution for the whole input image in classical...
This paper exemplarily points out how essential genetic information evolves during the runs of certain selected GA-variants. The discussed algorithmic enhancements to a standard genetic algorithm certify the survival of essential genetic information by supporting the survival of relevant alleles rather than the survival of above average chromosomes. This is achieved by defining the survival probability...
Traffic systems are man-made systems in which the human component as a complex factor plays a significant part. [1] The aim of the research was to offer a method which is applicable for setting the real traffic situations at a signalized intersection against the simulated ones, using a traffic model with similar statistical features. The simplest technical apparatus has been used to monitor the real...
In this paper we shall consider security aspects of Cognitive Radio (CR) and its applications. We shall cover design of a security simulation model for cognitive radio and discuss results of conducted experiments using Omnet++ simulation tool in the . Net environment. The aim of this paper is to provide an overview of various applications of CR as well as the security threats faced when applying this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.