The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a parallel algorithm for computing one dimensional unstable manifold of a hyperbolic fixed point of discrete dynamical system. It is pointed out that parallel computing can be realized by subdividing the unstable manifold into mutually independent subsections. In each subsection, the one dimensional unstable manifold is grown by forward iteration. Curvature constraint and distance...
This paper addresses a new uncertainty set - interval random uncertainty set for robust Value-at-Risk optimization. The form of interval random uncertainty set makes it suitable for capturing the downside and upside deviations of real-world data. These deviation measures capture distributional asymmetry and lead to better optimization results. We also apply our interval random chance-constrained programming...
In this paper we introduce an ant-based algorithm on continuous domains used to create procedural animations. We focus our approach on finding movement sequences that satisfy both the physical constraints as well as animator requirements. The proposed method is very flexible and can be easily adapted to different situations and characters' morphologies. Our simulations show that the proposed technique...
Ensemble pruning is concerned with the reduction of the size of an ensemble prior to its combination. Its purpose is to reduce the space and time complexity of the ensemble and/or to increase the ensemble's accuracy. This paper focuses on instance-based approaches to ensemble pruning, where a different subset of the ensemble may be used for each different unclassified instance. We propose modeling...
This work presents the concept of Continuous Search (CS), which objective is to allow any user to eventually get their constraint solver achieving a top performance on their problems. Continuous Search comes in two modes: the functioning mode solves the user's problem instances using the current heuristics model; the exploration mode reuses these instances to train and improve the heuristics model...
The ion chromatography instrument is one kind of complex chemical analysis instruments. And the key part that affects analysis results in it is ion chromatographic column. On developing online IC instrument, it is difficult to predict the efficiency of IC column. All the instruments can be referred now are only used in laboratory, and the column efficiency is judged artificially. So it is necessary...
A long-running transaction is an interaction of components from different systems. It must be executed as a single atomic action. The typical atomic technologies are not suitable for long-running transaction. Because long-running transaction could not use ACID semantic, this paper uses the set consistency notion and CSP to define the consistency of the long-running transaction. We give an algorithm...
Children like cartoon games, a cartoon game for children should support more knowledge. Leaning nonverbal emotion interaction is a very important social skill for a child, how to animate nonverbal emotion interaction in a cartoon game is an interesting subject. Emotion cognitive structure of a virtual character is presented, emotion expression method is also proposed, a virtual character can express...
Requirement analysis is the preliminary step in software development process. The requirements stated by the clients are analyzed and an abstraction of it is created which is termed as requirements model. Unified Modeling Language (UML) models are helpful for understanding the problems, communicating with application experts and preparing documentation. The static design view of the system can be...
In recent years, there has been a major effort to design cryptographic schemes that remain secure even when arbitrary information about the secret key is leaked (e.g., via side-channel attacks). We explore the possibility of achieving security under \emph{continual} leakage from the \emph{entire} secret key by designing schemes in which the secret key is updated over time. In this model, we construct...
Voice is the natural communication system used by all beings, human beings in particular. Understanding and recognizing human uttered voice for various applications is the core technology of "information" age. Automatic speech recognition has wide spread applications in real life situations. Here speech recognition of Malayalam isolated digit is created by using Mel Frequency Cepstral Coefficients...
The purpose of this work is to optimize the design of an MSK modulator able to operate at a high data modulation. The optimization approach applies an experimental design methodology having in view to minimize the modulator response time. This methodology is traditionally applied by agronomists and chemists. We show how it can be perfectly suited to optimize electronic designs.
In this paper, we propose an improved active contour model to detect pedestrian in video sequences. Our method can detect pedestrian whose profiles are constantly changing when they are walking. First, we improve the internal energy computation by using the squares of the distance between average distance of all adjacent points in the contour curve and the control points, and construct local energy...
Ultrasound images are very noisy. Along with system noise, a significant noise source is the speckle phenomenon caused by interference in the viewed object. The noise of ultrasound image was always deemed as multiplicative noise, but the present multiplicative noise models are not fitting for it very well, because the noise is more complex than the simple multiplicative one. So we should consider...
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
The paper presents a neural network based predictive control (NPC) strategy to control nonlinear chemical process or system. Multilayer perceptron neural network (MLP) is chosen to represent a Nonlinear autoregressive with exogenous signal (NARX) model of a nonlinear process. Based on the identified neural model, a generalized predictive control (GPC) algorithm is implemented to control the composition...
The simulation of large-scale analog circuits is very expensive. Instead of the circuit complex model, reduction of the computing effort implies using a macromodel capable to capture the behaviors of the original circuit while preserving its essential properties. Building such a model is based on a simplified and unitary description of the circuit, by establishing a simple relationship between the...
Designing a real world complex system requires to use decentralized artificial intelligence. Such a system involves self-organization techniques, advanced interaction models, real-time architectures... To simplify the design step, it can be necessary to reproduce the behavior of the whole designed system in a virtual environment before to deploy the designed application on the real world devices....
Role based access control (RBAC) has difficulty in covering open and decentralized multi-centric systems, since it has focused on controlling access to digital resources within closed system environments and it only deals with previously known user's access which is not adequate in today's Internet world. In order to overcome the limitations in RBAC and meet the access requirements in multi-domain...
For the vague nature of trust and reputation, the traditional reputation modelings used the classic probability or fuzzy sets to describe and measure the degree of trust. The theoretic foundation of these models is subject logic or fuzzy logic. But in some practical applications, the usage of simple probability model led trust's subjectivity and uncertainty to randomness. For the fuzzy logic, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.