The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Color is one of the attributes that play a role in identifying specific objects, color processing including the extraction of information about the spectral properties of the object's surface and look for the best similarity of a set of descriptions which have been known to do an introduction. Therefore, the classification is needed right fuji apples to obtain good quality fruit. Fuzzy model is one...
We presented a generalization of the delay-and-sum beamforming based on the Dirac-Delta functions but with nonlinear argument. For this end, a closed-form expression of the beampattern $\mathcal{B}(r)=\sum\nolimits_{k,q}w(k,q,r)x(k,q,r)$ with r = r(θ), was derived. This expression is computationally simulated through an algorithm that includes integer-order Bessel input functions and random noise...
This paper was performed to find a practical error calibration method for MIMU to overcome the shortcoming of the traditional way. To study it, first, we simplified the error model of the MIMU. The model contains zero bias, scale factors and installation errors of MEMS accelerometer and MEMS gyro. Then, based on the model, we calibrated the accelerometer in use of a practical six-position testing...
Several problems are rised in order to enhance the effectiveness of communication in online discussion. The similarity and repetition of comments in terms of questions in the sentences or text meanings as well as triggers the emerging of miscommunication amongst participants in a forum discussion are investigated. Moreover, some comments seems are ignored or not been touched by other participants...
Accelerated degradation testing (ADT) Bayesian optimization design can determine prior distribution of model parameters by prior information, which avoiding the uncertainty to the result of design brought by assuming parameter selection arbitrarily. However, different people may have different tendencies when choosing prior distributions through the same prior information. It may result in different...
The problems arising in loop electrical network system is a relay setting that follows changes in the system such as power source operation, regular maintenance and damage to powers source. To obtain an adaptive relay which is capable of following the changes in the network system, this paper is proposes the modeling of the coordination of the power system network with the cascade forward neural network...
This paper presents a preliminary study for a virtual reality simulation for testing the behavior of electric propulsion systems in electrical traction applications. The car model is realized and connected to the propulsion model in MATLAB Simulink whereas the inputs for the model are coming from the Virtual Reality Environment (VRE).
This article describes development of OpenMP parallelization in True Irregular Method (TIM) code designed for solving multidimensional non-stationary problems of continuum mechanics using non-structured Lagrangian meshes of random form.
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as...
High quality requirements are set for automated production systems (aPS) as malfunctions can harm humans or cause severe financial loss. These malfunctions can be caused by faults in the control software of the aPS or its inability to correctly identify and handle unintended situations and errors in the technical process or hardware behavior. To achieve more dependable control software, software testing...
Image matting is a fundamental computer vision problem and has many applications. Previous algorithms have poor performance when an image has similar foreground and background colors or complicated textures. The main reasons are prior methods 1) only use low-level features and 2) lack high-level context. In this paper, we propose a novel deep learning based algorithm that can tackle both these problems...
Log files are used in many big data applications. If the log is meant for a different purpose, the analysis and finding the best log analyzer can be very complex. Our solution is to create a generic test case framework to model and create representative log data. Related work model the behavior as state machines, but our model uses a composition of elementary acyclic graphs, thus addressing the log...
Customers need to know how reliable a new release is, and whether or not the new release has substantially different, either better or worse, reliability than the one currently in production. Customers are demanding quantitative evidence, based on pre-release metrics, to help them decide whether or not to upgrade (and thereby offer new features and capabilities to their customers). Finding ways to...
This paper presents the design, fabrication and testing of a micro-injector for precision injection of biological cells. Based on the specifications on travel range and injection speed, a single-axis translational motion mechanism is designed by using flexure mechanisms for precision motion guiding of the micro-injector. The mechanism parameters are designed and optimized to cater for the requirements...
This paper proposes the interval max-plus linear system and introduces the reachability to such systems. A state of an interval max-plus linear system is said to be reachable if it can always be attainable from the initial state, no mater how the state and input matrices vary in a certain range. It is pointed out that an interval max-plus linear system is reachable if and only if the interval reachability...
A fault detection, identification, estimation and state estimation (FDIESE) problem involves joint decision and estimation (JDE). Decision contains detection and identification, while estimation is for fault severeness and system state. Both detection and identification are highly coupled with estimation and a fault is identified after detection. To solve this problem, an approach named nested joint...
fault injection is an effective technique in software testing. By introducing faults to software under test, fault injection can improve the coverage of a test, as the same time, the fault injected in software contributes significantly to find true fault related to fault injected. In this paper we propose a software testing method based on fault injection. In this method, we first use neural network...
This paper introduces an OSA detection method based on Recurrent Neural network. At the first step, RR interval (time interval from one R wave to the next R wave) is employed to extract the signals from Apnea- Electrocardiogram (ECG) where all extracted features are then used as an input for the designed deep model. Then an architecture having four recurrent layers and batch normalization layers are...
The long-term performance of myoelectric prostheses is related not only to the short-term performance of the controller, but also to the user's ability to learn and adapt to the system. Different control architectures may have inherent tradeoffs between their short-term performance and the amount of relevant feedback that informs this adaptation. In this study we focused on the ability of two common...
Employing the Theory of Planned Behavior (TPB), this study aims to find determinant factors that have influence over individuals' intention to cyberbully others. Using a scenario-based questionnaire, the data were collected from 96 students in Universiti Teknologi Malaysia. According to the results, only subjective norms reflected to be significant over cyberbullying intention, while the rest of variables...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.