The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper gives a brief overview of the current state in the ant colony optimization (ACO) field of study. Furthermore, it introduces an alternative pheromone laying strategy for the ACO algorithm. In the paper, the newly introduced strategy is implemented, tested on a model problem and compared with the classical approach. A parameterized problem space generator has been introduced. The generator...
Computer Science 2 is one of the core elements of any computer science program; however, there has been little progress towards the development of a concept inventory for this key introductory course for CS majors. Plans to address this gap using the Delphi method are presented. Instructors and researchers with knowledge and experience of CS2 are being recruited to help identify concepts from CS2...
Listening to music can reduce stress. This research is to study the development of music mood application called DeMuse. It mainly concerns with the users' favorable and recommended music genre. In addition, DeMuse will be presented in health and fitness category of mood music based mobile application. In order to complete DeMuse, it will carry out the identification of the features for the particular...
In this paper some popular techniques of analog-to-digital converter parameters measurement are compared. The structure of the proposed software-hardware complex and experiment procedure are described. Experimental results are presented.
This paper describes two concepts of automatic systems for accuracy testing of current transformers. Advantages and disadvantages of both concepts are discussed. The concept of multi channel testing is used for developing of the measuring device for current transformer accuracy testing for factory FMT Zajecar. The short description of the device is presented as well as the results of its testing.
Formal verification serves as the theoretical basis for the engineering task of correctness and performance (quality) assurance. State of the art model checking, automatic specification refinement and theorem proving are employed to tackle the often undecidable (as imposed by the halting problem) task of complete verification. In this paper we formalize, prove and demonstrate a new unobtrusive way...
The detection of phishing websites using traditional machine learning methods has been demonstrated in previous studies. Traditional machine learning methods assume that the input feature space is the same between the training and testing data. There are scenarios in machine learning, where the available labeled training data has a different input feature space than the testing data. In cases where...
An emotion recognition method from the face images is proposed in this paper, which can recognize seven emotions of human, i.e., six basic expressions in addition to neutral. The proposed method uses the GLCM approach for feature extraction and the nearest neighbor (NN) for classification. The fuzzy Euclidean distance is used. GLCM provides the texture characteristics of an input image through the...
Software fault prediction is one of the significant stages in the software testing process. At this stage, the probability of fault occurrence is predicted based on the documented information of the software systems that are already tested. Using this prior knowledge, developers and testing teams can better manage the testing process. There are many efforts in the field of machine learning to solve...
Intruder detection in a protected zone can be performed by the physical protection which acts within the object's perimeter and survey's it (patrols, monitoring screens of CCTV systems, etc.), but intruder detection can be also done using active protection elements. Active protection elements include alarm systems (electronic safety and distress alarm systems, CCTV security systems, system for control...
Fall-related injuries of elderly people have become a major public-health burden resulting in direct physical, physiological and financial costs to the surfer and indirect societal costs. Automated fall detectors play a central role in reducing these damages and in supporting safety and independency of the seniors. Typically, automated fall detection devices can send real time notifications to the...
System design and development methods need to be contextualized to the specific needs. Most developing countries are characterized by low economies and infrastructure, complex and heterogeneous culture. In these countries software development is characterized by big differences in education and livelihood. Culture has impacts in ICT development and use. Discount usability methods are lightweight methods...
Integrated Computer Control System (abbr. ICCS) of large-scale laser facility uses a scalable software architecture to manage more than 10,000 control points to operate 48 powerful laser beamlines, provides for the integration of all elements of laser and target area distributed subsystems to form an overall operational control system. Fault detection and diagnosis test are the important technique...
The difficulty of detecting small quantities of contaminants in water supplies currently threatens the health of millions of people worldwide, as consumption of contaminated water has been associated with both cancerous and noncancerous health risks. Existing technologies make it possible to very accurately quantify contaminant levels in water; however the expense, extensive training, and off-site...
This project has designed a material treatment process to extend the lifespan of extrusion augers used by the social enterprise Appropriate Energy Saving Technologies (AEST) in Uganda. AEST uses an extruder machine to recycle agricultural waste into charcoal briquettes that they sell to low-income families. The auger components wore down quickly and needed a hardening process to remain useful for...
Based on the analysis of current conditions and shortages of the configuration files management in smart substation, the problems existing in current conditions are proposed, such as: ICD test technology, SCD test technology, SCD difference comparison technology. In order to meet the demand of the large scale smart substation construction, a solution of building the smart substation configuration...
This paper proposes the SVDNet for retrieval problems, with focus on the application of person re-identification (reID). We view each weight vector within a fully connected (FC) layer in a convolutional neuron network (CNN) as a projection basis. It is observed that the weight vectors are usually highly correlated. This problem leads to correlations among entries of the FC descriptor, and compromises...
We propose ‘Hide-and-Seek’, a weakly-supervised framework that aims to improve object localization in images and action localization in videos. Most existing weakly-supervised methods localize only the most discriminative parts of an object rather than all relevant parts, which leads to suboptimal performance. Our key idea is to hide patches in a training image randomly, forcing the network to seek...
This paper investigates how far a very deep neural network is from attaining close to saturating performance on existing 2D and 3D face alignment datasets. To this end, we make the following 5 contributions: (a) we construct, for the first time, a very strong baseline by combining a state-of-the-art architecture for landmark localization with a state-of-the-art residual block, train it on a very large...
Despite the fact that wireless systems are overwhelming most of nowadays applications, wiring networks are still forming a pivotal anchor in many controls and security units. Thus, ensuring the reliable operation of such networks necessitates investing in techniques dedicated for their protection. A vast majority of such methods rely on the presence of a reference model of the network. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.