The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the describing function method is used to analyze the behavior of the two methods, the conventional and the super twisting sliding mode control regarding chattering phenomena. The cases are demonstrated where the first order sliding mode control is more efficient then second order one. This cases are shown based on analysis and simulation.
Collaborative and inquiry learning in the Virtual Learning Community is a new kind of online learning. The learners construct their own knowledge by interactive learning in the community. Some log records and related learners' learning behavior information is generated in the experimental platform of the virtual learning community. Statistical tools of SPSS and Excel are used to explore the learning...
Accessibility is an important aspect of websites generally and public websites particularly. Many ways could be proposed to enhance accessibility, however the impact of selected actions is hard to predict due to diversification and contradiction, in addition to the existence of the time factor. A System Dynamics simulation model including factors affecting the accessibility of Norwegian municipal...
In recent years, the web has become one of the main carrier of social public opinion, so the network public opinion needed a new natural language processing technology to identify the information efficiently and accurately, analysis and classify the public opinions effectively. In this paper, the text semantic orientation analysis method is proposed based on Hidden Markov Model to improve the accuracy...
This article takes advantage of the data collected from the first National New SAT Mock Test Competition organized by China SAT Academic Alliance. Thousands of essays were collected and then rated manually. The results were compared to those from classic algorithm and weights in computerized English text rating. Through quantifiable index analysis, statistical language model analysis, automatic keywords...
Multilevel inverters acts as a promising solution for medium voltage, high power applications due to their modularity and reduced voltage stress across the switches. Cascaded H Bridge Multilevel Inverters (CHB-MLI) are being considered as the best choice for grid connected Photovoltaic (PV) systems since they require several sources on the DC side. By means of MLI's, high quality output with less...
Interior design is the refinement and extension in space for the architectural design, which is a cross-disciplinary that is an aspect of the collection of space, style, color, lighting, material. Due to the development of the virtual reality technology and programming software, making indoor designer has conditions to create a more realistic and humanized interactive virtual display platform, which...
Operations of critical care departments in health systems are increasingly reliant on the availability of interoperable medical devices. Many large health care systems have fully transitioned in recent years to uniform electronic health record platforms, introducing the need for a computing infrastructure at each point of care. As demand on national health infrastructures increases, the management...
We take a visual analytics approach towards an operational model of the human-computer system. In particular, the approach combines ideas from (human-centered) interactive visualization and cognitive science. The model we derive is a first step on the path to a more complete evaluated and validated model. However, even at this stage important principles can be extracted for visual analytics systems...
<?Pub Dtl?>Contention among users utilizing a single shared resource arises in multiple contexts of computing and computer communications. We consider a setup in which users can split their work between a shared resource and a private resource. Unlike the private resource, which provides guaranteed performance, the performance of the shared resource is highly dependent on the usage pattern of...
This paper introduces an approach to obtain an empiric analytical model of the performance dynamics of computer systems out of discrete-event simulation (DES) experiments. To that end, the proposed methodology elicits the requirements for extending conventional stationary DES frameworks so as to meet the needs of transient performance analysis. The work goes through the rationales for the conceptual...
The usage of a simulation's visualization varies enormously within our community: for some, it is the simulation; for others, it is a development annoyance used for a screen-shot in presentations before the “proper” statistical results can be shown. Real-world systems are, for the most of us, explored visually so a simulation's visualization allows us to reconnect the simulation to its underlying...
It is important for artificial agents to accurately infer human emotions in order to provide believable interactions. However, there is currently a lack of empirical results supporting affective agent to propose effective computational models for this purpose through analyzing individual profile information and the interaction outcomes. In this paper, we bridge this gap with a game-based empirical...
Many advanced EMG-based upper-limb prosthesis control methods require model training in which subjects produce supervised forces/movements. Since unilateral limb-absent subjects cannot produce forces/movements on their affected side, one technique (mirrored bi-lateral training) relates forces/motions produced on the sound side to EMG on the affected side. However, the efforts made by the phantom limb...
Sustainable software is a software that able to work in a constraint environment. For example, a classroom without Internet facilities or unstable connection; a field trips; a meeting room or discussion room with inadequate computer facilities and power and etc. In this case, how to enabling a daily activity within such situations without losing the benefits of computer support? This paper presents...
Recent years have seen explosive growth in information security problem. Trusted computing is increasingly used in the fields of information security. The basic idea of trusted computing is different from traditional security method. In other words, system abstracts normal behavior and compare with real-time behavior. Most of the current research focuses on static integrity metrics. However, it is...
A well-known problem when executing data-intensive workloads with such frameworks as MapReduce is that small jobs with processing requirements counted in the minutes may suffer from the presence of huge jobs requiring hours or days of compute time, leading to a job slowdown distribution that is very variable and that is uneven across jobs of different sizes. Previous solutions to this problem for...
Digital Forensics is an area of Forensics Science that uses the application of scientific method toward crime investigation. The thwarting of forensic evidence is known as anti-forensics, the aim of which is ambiguous in the sense that it could be bad or good. The aim of this project is to simulate digital crimes scenario and carry out forensic and anti-forensic analysis to enhance security. This...
The propagation methods of viruses are diverse and studying the virus propagation is a hot topic. There appears a new way that the search engine quickly spreads network viruses, and many researches overlook its impact of propagation and few researches set a model to quantifiabely analyze how the search engine spread viruses. Based on community networks, this paper designs a specific model how the...
As society teeters on the verge of robotic automatons performing complex functions in every aspect of human existence, urgent questions arise concerning human accountability for ethics as they design robots capable of making moral decisions. The aim of this study considers a path toward an ethical paradigm for morally sentient robots. In order to determine the extent of human accountability, an ethical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.