The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a method to estimate the system-state, especially the full position, of an autonomous vehicle using sensor data fusion of redundant position signals based on an extended Kalman-filter. The position is detected with the help of magnet sensors attached at the vehicle and a global camera signal with low resolution, similar to GPS. A lane marked with permanent magnets and an infrared...
Probe is a major component of coordinate measuring machines. They contribute to large extend to measurement uncertainty of the CMM. In this paper new designs considered, their static and dynamic behaviours are discussed. The theoretical results are experimentally verified.
Network emulation has important role in engineering education and computer network courses. Creation of emulated network environments is possible using the virtualization technology. Nowadays, there are a number of various examples of using virtualization technology for creating virtual network environments used for engineering education at universities. This paper introduces the novel approach in...
Co-evolutionary genetic algorithms are being used to solve the problems which are naturally distributed and need the composition of couple of elements or partial solutions to be solved. In these algorithms, the problem decomposes into several elements and for each element, a sub-population is regarded. These sub-populations evolve separately by considering the way of interactions among them. The general...
This paper presents a new structure of foot force sensors for bipedal robots. The sensor has a property of passive compliance. Passive compliance is achieved with two kinds of elastic elements. The first is a metal plate and the second is a rubber elastic element. Sensing elements are reflex couplers. They measure the deformation of the rubber elastic element caused by forces acting on the foot. The...
A picture is worth a thousand words. Yes, but which ones? Content-based image retrieval (CBIR) is the application of computer vision to the image retrieval problem. The image retrieval problem is the problem of searching for digital images in large databases. ldquoContent-basedrdquo means that the search will analyze the actual content of the image. The term dasiacontentpsila in this context might...
In this paper a further step towards a novel approach to adaptive nonlinear control developed at Budapest Tech in the past few years is reported. Its main advantage in comparison with the complicated Lyapunov function based techniques is that it is based on simple geometric considerations on the basis of which the control task can be formulated as a fixed point problem for the solution of which a...
Development of engineering has resulted product development in model space. Product, analysis, production, and other engineering objects are defined, placed in product structure and related by arbitrary relationships. This model is well-proved and serves Internet based every day work of engineer groups in leading industries. The next step is establishment of a more efficient, knowledge and intelligent...
By using the g-calculus, we introduce new partial differential equations, which are generated by a function g. Moreover, if the generator g is a linear function, we come back to the classical elementary equations of the kind parabolic, hyperbolic and elliptic . For this reason, we call these equations basicgeneratedequations of the kind parabolic, hyperbolic and elliptic. We study a class of solutions...
There are many different instruction scheduling techniques that are used in compilers today. The most frequently used one is the list scheduling. It is easy to implement and gives good results in most cases. It works on the basic block level. According to Fisher and Rau instruction level parallelism that can be achieved using this technique cannot be greater then 2. Architectures with deep pipeline...
Small turbojet engines represent a special class of turbine driven engines. They are suitable for scientific purposes and research of certain thermodynamic processes ongoing in turbojet engines. Moreover such engines can be used for research in the area of alternative fuels and new methods of digital control and measurement. Our research, which is also presented in this article, is headed toward these...
Risk is omnipresent in all the interactions that we carry out. Quantifying and making risk-based assessments and decisions is very important especially in the case of business interactions. However in the existing literature there is no ontological manifestation of risk and its related concepts. In this paper, we propose an ontological manifestation of risk. Subsequently it is extended to derive an...
Multi-agent Markov decision processes (MMDPs) are widely used for modeling many types of multi-agent systems. In this paper, two new algorithms based on learning automata are proposed for solving MMDPs and finding optimal policies. In the proposed algorithms, Markov problem is described as a directed graph. The nodes of this graph are the states of the problem, and the directed edges represent the...
Informational imperfections and uncertainty have been in the focus of recent literature as they are the source of much of the difference between first- and second-best scenarios. This is an application of these concepts to agricultural development as risks ranging from price fluctuations to environmental conditions and inequalities of access to information manifest itself at both the micro and the...
Recent investigations in the field of complex networks include the analysis of distributions of connections in particular networks and the clustering properties of networks. In the first part of my presentation I analyse a network: the dependency graph of the software packages of the Ubuntu distribution of GNU/Linux. It is a directed acyclic graph, and I analyse the degree distribution of the graph...
Three slip controllers are designed and implemented on an anti-lock braking system (ABS), a PI controller, one SISO fuzzy controller without dynamics and a PI-fuzzy one. The system is highly nonlinear. The design approaches are based on system modeling and identification and knowledge from experiments. The controllers are based on the local linearization of the controlled plant and the use of fuzzy...
Previously, we introduced the notion of a TL- (SL-) evaluator [1]. In this paper we study the Choquet, Sugeno and Shilkret integrals and their level-dependent modifications as TL- (SL-) evaluators. We investigate under which conditions these integral-based evaluators are self-dual. Our work is a continuation of [1, 2, 6, 7].
Paper shows different aspects of mobility measures with special attention to mobility as movement. Examples of mobility measures which induce order in the semiring of transition matrices are given and Shorrocks axioms are consistent on that domain. There are no mobility measure in the semiring of all transition bistochastic matrices which satisfies all requared conditions and induces order. It has...
The user authentication is widely used in the ATM (automatic teller machine) or many Internet services. Recently, the crime to steal the ATM password using a small CCD camera has increased. Also, in the mobile environment, there is a high risk of the observing attacks which is the way to steal a password, because many people have a camera-equipped mobile phone and a miniature camera. This paper proposes...
Intrusion detection is an area of computer security that involves the detection of unwanted manipulations to computers and computer networks. An intrusion detection system is required to detect all types of malicious network traffic and computer usage that can not be detected by a conventional firewall. This security method is needed in todaypsilas computing environment because it is impossible to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.