The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper proposes a technical procedure for modeling the parameters variation of a fluid flowing through a transport structure. The determined models are used to identify more accurately the leakage points / faults occurring in this infrastructure. The procedure considers faults / leaks that are variable, with minimum and maximum limits being defined. The validation of the procedure is done by implementation...
With the development of technology and industrialization, problems that haven't been solved in the past have become more easily solvable. The artificial intelligence (AI) field has emerged by starting to apply the working mechanism of the human brain in various ways in computers. With the use and widespread use of AI techniques, solutions to problems in every area of the scientific world are presented...
Control theory can establish properties of systems which hold with all signals within the system and hence cannot be proven by simulation. The most basic of such property is the stability of a control subsystem or the overall system. Other examples are statements on robust control performance in the face of dynamical uncertainties and disturbances in sensing and actuation. Until now these theories...
This paper presents one step toward creating the building blocks for machine intelligence that is inspired by its biological equivalent. The authors' quantum learning methods (deep quantum learning) are applied to quantum devices whose quantum bit (q-bit) activity is deliberately chosen to mimic the spiking behavior of biological neurons. Because of the "quantum" scale of these computers,...
Simulation represents the major research method in all knowledge domains and a scientifically valid method of estimating the characteristics of complex systems used for decision making in different areas of engineering. The existing and projected systems can be explored effectively using mathematical models (analytical and simulation) implemented on high-performance computers, which act in this case...
A quadrotor Micro Aerial Vehicle (MAV) is designed to navigate a track using neural network approach to identify the direction of the path from a stream of monocular images received from a downward-facing camera mounted on the vehicle. Current autonomous MAVs mainly employ computer vision techniques based on image processing and feature tracking for vision-based navigation tasks. It requires expensive...
In this paper, a variant of the recently introduced whale optimization algorithm (WOA) was proposed based on adaptive switching of random walk per individual search agent. WOA is recently proposed bio-inspired optimizers that employ two different random walks. The original optimizer stochastically switches between the two random walk at each iteration regardless of the search agents performance and...
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
A remarkable characteristic of human beings is their tendency to form societies. That put themselves in a social position, where they interact with the environment and try to convince others of their own convictions. This study proposes a model for interactions among individuals of a society, accompanying the evolution of their opinions over time. We consider a situation where the individuals are...
A novel and effective framework for the enhancement of low lighting images is proposed in this paper. The novel framework presents an optimized de-haze algorithm on inverted images to enhance the low-dynamic-range images which optimizes the complicated process of computing the parameters A and t(x). The improved gamma correction is used to enhance the image contrast for providing better visual performance...
In this paper, a transfer function that models Molecular Communication via Diffusion (MCvD) between a point transmitter and a fully absorbing circular receiver in an unbounded 2-D environment is analytically derived. The analytical derivation of the transfer function of the 2-D channel in MCvD is proposed for the first time in the literature. The transfer function is obtained by solving the molecule...
We present a development environment that proactively and interactively assists the software engineer in modeling complex reactive systems. Our framework repeatedly analyzes models of the system under development at various levels of abstraction, and then reasons about these models in order to detect possible errors and to derive emergent properties of interest. Upon request, the environment can then...
We have proposed a distributed storage system which dynamically makes storage tiers and optimizes location of data blocks autonomously. This aims to enhance the I/O performance of the storage system without remarkable network overhead. Our system dynamically organizes storage tiers considering device characteristics. And the data blocks will be placed in a suitable storage tier according to their...
Constructions in the form of rectangular planar plates and shallow shells reinforced by a cross system of ribs of great rigidity and loaded with an arbitrary lateral load are considered. The stress-strain state of such structures is described by technical theories of plates and shallow shells. The effect of the stiffeners is taken into account in the equations as additional terms containing factors...
The paper describes the author's experience in identification of computer arithmetic's implementation principles that allow extending mathematical properties of a number on its computer representation. The range of the representable numbers, bitwise identity of the result on the different computer architectures and in parallel computation are very important in the current cloud and parallel computing...
The paper present new method for determination complexity of using in new hyper-hybrid AD HOC cloud computing. A large body of research has been devoted to identifying the complexity of structures in networks. The study of complex networks is a young and active area of scientific research inspired largely by the empirical study of real-world networks such as computer networks and social networks....
In the article an approach to accounting uncertainty of the initial information in the system research. It consists in the inclusion of uncertainty as one of the parameters in the studied model systems. The authors propose classification according to the degree of uncertainty, which allows you to identify the following types of uncertainty: complete certainty, stochastic and fuzzy uncertainty. Described...
Currently, conveyor-type tunnel furnaces with electric heater consume large amount of energy that in turn affects the cost of the product, subjected to thermal treatment. Reduction in energy costs when maintaining the temperature will reduce the cost of the final product. This study deals with design of the temperature field control system in furnace by replacing conventional heating elements for...
The models of functioning of distributed computer systems with group and full restorations of failed machines are considered. The models are formalized in the form of a system of differential equations, in which are unknown probabilities of the states. To assess the effectiveness of CS functioning in we used the expectation and variance of the number of working and fault machines in the models. Analytical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.