The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with :intelligent system; soft computing; signal processing; biomedical application; image processing; fuzzy theory; fuzzy logic; control and modelling; and evolutionary computing.
In this expository paper we discuss some applications of paraconsistent annotated logics. They have the capability of manipulating concepts like fuzziness, inconsistency, and paracompleteness in a non-trivial manner. Such systems are new and they were discovered recently at the end of last century.
Intelligent environments employ electronics unobtrusively integrated with the ambient to predict and to respond to the needs of people, enhancing many aspects of the everyday life. Wireless sensor network (WSN) are at the center of ambient intelligence applications. They consists of thousands of distributed sensing devices, that continually collect and transmit information about the surrounding environment...
Summary form only given. Much of the commercial success of fuzzy logic as used in fuzzy logic systems (FLSs) is due to extrinsic properties of the fuzzy logic, namely to the systems with defuzzification. Since the first engineering application pioneered by Mamdani, until now, FLS control systems are mere function approximators and interpolators conveniently and intuitively built using FLSs. The same...
The paper illustrates a way of using analytical methods in order to analyze the dependability of several replicated PLC architectures characterized by imperfect coverage. Firstly, we establish the general modeling frame of the dependability and we state the assumptions taken into account for modeling the reliability and safety of PLC systems. Then, the considered architectures are described by the...
The paper evaluates the dependability of PLC systems based on assuming the failure modes of the system components. It is introduced a model of the service provided by a system to a single user as a sequence of pairs value-time which has to be recognized by the user. The service model is then improved in order to be applied for the case of a single service provided to multiple users. The formalism...
Hash maps are data structures widely used in modern programming languages like Java for their simplicity and efficiency. When fuzzy string search is needed (like in natural language processing) finding an approximate key match in a regular Java HashMap is a trivial task. It usually requires the brute force method of iterating trough the set of keys and use of string metrics methods. Although this...
Experts often turn to fault trees when trying to quantify the risk of electrostatic discharges. The fuzzy fault tree yields not only an estimation for the risk, but through examining the membership function of the top event, information on the accuracy of the result can be gained. Usually triangle-shaped membership functions are used, and the calculation is only performed for the three characteristic...
The emerging computational grid infrastructure consists of heterogeneous resources in widely distributed autonomous domains, which makes job scheduling very challenging. Although there is much work on static scheduling approaches for workflow applications in parallel environments, little work has been done on a real-world Grid environment for industrial systems. Utility Management Systems (UMS) are...
The design of machine tools activity is an area with hundreds of years old. With the development of CAD/CAE systems, the engineers' work was greatly simplified. However, CAD/CAE systems are unable to overcome a critical threshold, thereby leaving the designer with many problems to be solved. Artificial intelligence field is also very exciting to develop this area. This paper presents a first attempt...
This paper presents the hardware and software implementation of a digital system for regulating the speed of an AC motor. It provides detailed considerations which laid the basis of the choice of adjustment method implemented, as well as the benefits resulting from the use of the method chosen.
The paper describes the way in which we can model and simulate a part of a complete automated manufacturing technological flow, namely the palletization part, meaning pieces arrangement in a certain order requested by the user. The purpose of the modelling is the determination of an adequate operation algorithm that can be further implemented in a real situation. In this case, we suppose that pieces...
Grid is a hardware and software infrastructure which allows the sharing of flexible, secure and coordinated resources among dynamic collections of individuals, organizations and resources. The resources that are utilized in a Grid network are complex. There could be computing resources (PDA, PCs, workstations, servers, and clusters), storage resources (hard-disks, memory), Input-Output resources (sensors,...
In fact the mission for a danger control system consists of several phases. The system configuration, operational requirements for individual components, success criteria and stress on the components, can change from phase to phase. Furthermore, the duration of any phase can use deterministic or random models. All these changes and possibilities affect the system reliability. Thus, in this paper,...
To dramatically improve the efficiency, resources and applications availability within the institution, now, the step that must be made it seems very small and achievable through virtualization. The reduction of the capital and operational costs it will be made by virtualizing the IT infrastructure in a “virtual” infrastructure, obtaining in the same time an increase of the efficiency, utilization...
The resources of actual tracing tools for Control-Plane and User-Plan traffic are limited and most of them are crashing under the task of tracing 100% User-Plan traffic. This paper proposes a new tracing system for UP&CP traffic of Packet Core networks, like GPRS-UMTS networks, in order to verify their functionality.
Though the motivation for the initial researches on the topic had been military applications, target tracking problem has many practices in real life. In this paper, target tracking is used in the meaning of estimating the range, course and speed of the target moving on the constant route with constant speed. The inputs for the algorithm are the passive sonar measurements, that are bearings (line...
A new on-line predictive monitoring methodology is introduced, based on a combined adaptive principal component analysis (PCA) and an adaptive predictor filter in an autoregressive (AR) formulation. An adaptive PCA-based monitoring scheme is developed utilizing the process historical data to recursively track the dynamic behavior of the industrial process plant based on statistical Hotelling and squared...
In the future, in e-commerce, the main actors will be the intelligent agents, who will dramatically reduce online shopping by human factors because of their reactive, proactive and social characteristics. Internet technology nowadays determines us to be less prepared to control and sanction the increasing number of users and of those service providers who have a doubtful behavior. The model developed...
Currently, there are some paradigm shifts in medicine, from the search for a single ideal biomarker, to the search for panels of molecules, and from a reductionistic to a systemic view, placing these molecules on functional networks. There is also a general trend to favor non-invasive biomarkers. Identifying non-invasive biomarkers in high-throughput data, having thousands of features and only tens...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.