The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present new computer algebra based methods for testing the structural stability of n-D discrete linear systems (with n ≥ 2). More precisely, starting from the usual stability conditions which resumes to deciding if an hypersurface has points in the unit polydisk, we show that the problem is equivalent to deciding if an algebraic set has real points and use state-of-the-art algorithms...
This paper considers a problem of distributed hypothesis testing and cooperative learning. Individual nodes in a network receive noisy local (private) observations whose distribution is parameterized by a discrete parameter (hypotheses). The conditional distributions are known locally at the nodes, but the true parameter/hypothesis is not known. We consider a social (“non-Bayesian”) learning rule...
The contribution presents automatic software-based self (SBST) test generation for processors as a basic blocks of current complex systems on chip and embedded systems. Processors testing can be extended by functional tests or using various application programs. Such types of tests are serving as additional tests to structural testing or as tests used in verification. Functional tests (programs) are...
This paper focuses on the attempt to formulate the prescription prediction logic based on the medical data analysis towards the future computer-assisted-diagnosis for Kampo medicine. We constructed and evaluated prediction models for some frequently-used prescriptions using six kinds of machine learning algorithms including artificial neural network, multinomial logit, random forest, support vector...
English course online learning system is designed, the function of which includes the management function (personnel management, question library management, courseware management, security management, bulletin management and resource management), online learning (PPT, teaching video, difficulty parsing, homework problem), online test (randomly selected topic, automatic marking, chapter practice)...
The main purpose of biological memory is to robustly recognize objects and concepts, not to reconstruct their copies. For this the memory should mostly record the relations among the constituents of the incoming signals, rather than the constituents themselves. Relational memories can be stored in the form of network connectivity between neurons. However, similarity testing for such spatial representations...
Assessment of learning and assessment for learning are at the core of the research on new teaching strategies involving the use of new technologies recently performed by University of Turin. The practice of automated assessment in Mathematics using the grading system Maple T.A. Has been introduced in many undergraduate scientific courses and, after the initial success, it has been diffused in high-schools...
Phasor measurement units (PMUs) provide the basis for synchrophasor measurements, which are good data sources for capturing power system dynamic behavior. The recently published IEEE Standard C37.118.1-2011 characterizes the dynamic performance of synchrophasor measurements with two performance class filters: P-class and M-class. Practical implementation of a PMU to meet all dynamic requirements is...
Identification of malware is a critical problem in computer security. Many signature-identification, behavior-recognition, and reputation-based tools are available for host-based detection. However, so many files are present on systems today that checking all files is time-consuming, and better methods are needed to suggest which files are of highest priority to check in partial scans. This work developed...
Finding a method which allows a computer recognition to be close to human recognition is a goal of many works in the present. We have set this goal too. According to us, we need to find function for simple recognition of shapes in the images as first step of this goal. Result of this method provides input of our system of recognition. System form depends on the result of shape recognition method....
State verification to check that the machine is in a specified state is a key technique in FSM-based conformance testing. This paper presents a special UIO sequence called CUIO which can verify as many states as possible and all transitions of FSM simultaneously. CUIO sequences are constructed by a chain algorithm which is proposed based on the traditional method of successor tree. As a result, desirable...
The Boundary Scan (BS) technology is widely used in the testing and debugging of Printed Circuit Boards (PCBs), being employed in various phases of product manufacturing and contributing to a very pronounced cost reduction when compared to alternative test techniques. Also, the BS technology is frequently used as a pedagogical tool. This technology is presented on a "Debug and Test of Electronic...
A framework is presented for industrial hygiene inspection using a remotely-operated ground vehicle with multiple sensor payloads attached to it for detecting various hazardous gases and chemicals. A control scheme and a graphical user interface between the vehicle and operator is strictly mandated for tasks requiring remote inspection. By leveraging existing navigation and path planning algorithms,...
This document represents a client server based application designed for the purpose of artefact recognition in a museum, based on photos made with the help of a mobile phone. Image recognition was conducted with the help of SURF (Speeded Up Robust Features) algorithm. Server was implemented with the usage of Netty library. Because of the parallel approach used both in the classification part and during...
The Pulserad electron beam accelerator at the University of New Mexico (UNM) was refurbished and reconfigured to provide a voltage pulse with a very fast risetime, inspired by simulation results that indicated that the magnetron output characteristic was very sensitive to the voltage risetime. The modified Pulserad has a 2 ns risetime after which it maintains a flat-top for 30 ns and is capable of...
Odometer is an instrument that functions to measure the vehicle mileage and is usually used for periodic inspection of vehicle lubricant replacement. For companies that have a large number of vehicles (for example banks, travel agencies, etc.), vehicle lubricant replacement is an important thing to do, because if it is not maintained well it may cause fatal damage to the vehicle and can even endanger...
The IEEE INFOCOM community has looked to large-scale computer networking testbeds such as PlanetLab, Emulab, and ORBIT to fulfill an essential role in the testing and validation of innovative ideas. Until very recently, testbeds such as these have existed in separate silos, each with its own authentication mechanisms and experiment support tools. The OneLab experimental facility breaks down the barriers...
The visually impaired face a number of challenges when performing their daily tasks. These tasks may be differentiating objects that have similar shapes or knowing the content of a restaurant menu. In fact, there is an increasing interest in developing effective solutions that can help the visually impaired to recognize objects. However, automatic techniques cannot answer most of the questions asked...
The quest for the essence of intelligence tailored around intelligent behaviors has been long exist in the history of human and artificial intelligence. The goal of such quest was to identify the behaviors capable of representing intelligence in human into artificial system. Based on claim that behavior is process and intelligent behaviors are intelligent processes, this paper proposes the framework...
Today, Online audits give profitable data about items and administrations to buyers. On the other hand, spammers are joining the group attempting to deceive pursuers by composing fake surveys. Past endeavors for spammer identification utilized reviewers' behaviors, text similarity, linguistics features and rating patterns. Those studies have the capacity recognize certain sorts of spammers, e.g.,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.