Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We consider argumentation systems taking into account several attack relations of different strength. We focus on the impact of various strength attacks on the semantics of such systems, and particularly on the decision problem of credulous acceptance: namely, focussing on one particular argument, a classical issue is to compute a proof, under the form of an admissible set containing this argument...
We give new pseudorandom generators for regular read-once branching programs of small width. A branching program is regular if the in-degree of every vertex in it is either 0 or 2. For every width d and length n, our pseudorandom generator uses a seed of length O((log d + log log n + log(1/ϵ)) log n) to produce n bits that cannot be distinguished from a uniformly random string by any regular width...
The Coin Problem is the following problem: a coin is given, which lands on head with probability either 1/2 + β or 1/2 - β. We are given the outcome of n independent tosses of this coin, and the goal is to guess which way the coin is biased, and to answer correctly with probability ≥ 2/3. When our computational model is unrestricted, the majority function is optimal, and succeeds when β ≥ c/√n for...
The objective of the present study is to examine whether a simple affine-linear model of autonomous nervous activities would be able to reproduce the characteristic features of MAP regulation observed over long periods of time. In this study, we approach the problem first by constructing a modified nonlinear model for the human ABP regulation system. By simulating with various gain combination values,...
This paper presents a parallel algorithm for computing one dimensional unstable manifold of a hyperbolic fixed point of discrete dynamical system. It is pointed out that parallel computing can be realized by subdividing the unstable manifold into mutually independent subsections. In each subsection, the one dimensional unstable manifold is grown by forward iteration. Curvature constraint and distance...
This paper addresses a new uncertainty set - interval random uncertainty set for robust Value-at-Risk optimization. The form of interval random uncertainty set makes it suitable for capturing the downside and upside deviations of real-world data. These deviation measures capture distributional asymmetry and lead to better optimization results. We also apply our interval random chance-constrained programming...
In this paper we introduce an ant-based algorithm on continuous domains used to create procedural animations. We focus our approach on finding movement sequences that satisfy both the physical constraints as well as animator requirements. The proposed method is very flexible and can be easily adapted to different situations and characters' morphologies. Our simulations show that the proposed technique...
Ensemble pruning is concerned with the reduction of the size of an ensemble prior to its combination. Its purpose is to reduce the space and time complexity of the ensemble and/or to increase the ensemble's accuracy. This paper focuses on instance-based approaches to ensemble pruning, where a different subset of the ensemble may be used for each different unclassified instance. We propose modeling...
This work presents the concept of Continuous Search (CS), which objective is to allow any user to eventually get their constraint solver achieving a top performance on their problems. Continuous Search comes in two modes: the functioning mode solves the user's problem instances using the current heuristics model; the exploration mode reuses these instances to train and improve the heuristics model...
The ion chromatography instrument is one kind of complex chemical analysis instruments. And the key part that affects analysis results in it is ion chromatographic column. On developing online IC instrument, it is difficult to predict the efficiency of IC column. All the instruments can be referred now are only used in laboratory, and the column efficiency is judged artificially. So it is necessary...
A long-running transaction is an interaction of components from different systems. It must be executed as a single atomic action. The typical atomic technologies are not suitable for long-running transaction. Because long-running transaction could not use ACID semantic, this paper uses the set consistency notion and CSP to define the consistency of the long-running transaction. We give an algorithm...
Children like cartoon games, a cartoon game for children should support more knowledge. Leaning nonverbal emotion interaction is a very important social skill for a child, how to animate nonverbal emotion interaction in a cartoon game is an interesting subject. Emotion cognitive structure of a virtual character is presented, emotion expression method is also proposed, a virtual character can express...
Requirement analysis is the preliminary step in software development process. The requirements stated by the clients are analyzed and an abstraction of it is created which is termed as requirements model. Unified Modeling Language (UML) models are helpful for understanding the problems, communicating with application experts and preparing documentation. The static design view of the system can be...
In recent years, there has been a major effort to design cryptographic schemes that remain secure even when arbitrary information about the secret key is leaked (e.g., via side-channel attacks). We explore the possibility of achieving security under \emph{continual} leakage from the \emph{entire} secret key by designing schemes in which the secret key is updated over time. In this model, we construct...
Voice is the natural communication system used by all beings, human beings in particular. Understanding and recognizing human uttered voice for various applications is the core technology of "information" age. Automatic speech recognition has wide spread applications in real life situations. Here speech recognition of Malayalam isolated digit is created by using Mel Frequency Cepstral Coefficients...
The purpose of this work is to optimize the design of an MSK modulator able to operate at a high data modulation. The optimization approach applies an experimental design methodology having in view to minimize the modulator response time. This methodology is traditionally applied by agronomists and chemists. We show how it can be perfectly suited to optimize electronic designs.
In this paper, we propose an improved active contour model to detect pedestrian in video sequences. Our method can detect pedestrian whose profiles are constantly changing when they are walking. First, we improve the internal energy computation by using the squares of the distance between average distance of all adjacent points in the contour curve and the control points, and construct local energy...
Ultrasound images are very noisy. Along with system noise, a significant noise source is the speckle phenomenon caused by interference in the viewed object. The noise of ultrasound image was always deemed as multiplicative noise, but the present multiplicative noise models are not fitting for it very well, because the noise is more complex than the simple multiplicative one. So we should consider...
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
The paper presents a neural network based predictive control (NPC) strategy to control nonlinear chemical process or system. Multilayer perceptron neural network (MLP) is chosen to represent a Nonlinear autoregressive with exogenous signal (NARX) model of a nonlinear process. Based on the identified neural model, a generalized predictive control (GPC) algorithm is implemented to control the composition...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.