In a search space of a multilayer perceptron having J hidden units, MLP(J), there exist flat areas called singular regions that cause serious stagnation of learning. Recently a method called SSF1.3 utilizing singular ...
详细信息
ISBN:
(纸本)9789897580543
In a search space of a multilayer perceptron having J hidden units, MLP(J), there exist flat areas called singular regions that cause serious stagnation of learning. Recently a method called SSF1.3 utilizing singular regions has been proposed to systematically and stably find excellent solutions. SSF1.3 starts search from a search space of MLP(1), increasing J one by one. this paper proposes SSF2 that performs MLP search by utilizing singular regions with J changed bidirectionally within a certain range. the proposed method was evaluated using artificial and real data sets.
In this paper, we propose a regularized least-squares estimation method for discrete-time linear systems with structural disturbances. In practice, disturbances or system faults are usually described by step and ramp ...
详细信息
URP, through a portal system, integrate various kinds of information in various application systems as a whole digital campus. Single sign-on is a method to achieve a unified portal authentication. On the basis of sum...
详细信息
the research presented in this paper focuses on modeling and visualization of logistical control parameters. In the developed application, the internal logistical control parameters cycle time, timeliness, inventory, ...
详细信息
ISBN:
(纸本)9783319213835;9783319213828
the research presented in this paper focuses on modeling and visualization of logistical control parameters. In the developed application, the internal logistical control parameters cycle time, timeliness, inventory, and capacity were considered. A novel concept to visualize these parameters was developed on the basis of the well-known funnel model. the original model was enhanced by and compared to a further developed model. Our approach to visualize the internal logistical control parameters is based on a paddle-wheel model. An online survey with both models and different visualizations of the internal logistical control parameters was carried out to compare both models and the different visualizations. Both models are investigated with regard to comprehension and visual learning versus verbal learning. In the poster session, we will present further development of the paddle-wheel model to show the cause-effect relationship between the individual internal logistical control parameters and draw a comparison withthe original funnel model.
the tracking control problem of Duffing-Holmes chaotic systems containing unknown parameters is studied. Based on the backstepping design method, special barrier functions are employed in Lyapunov synthesis. the deriv...
详细信息
In Re-Understanding Automation and control in the era of digital automation of societal systems, we need to understand the inter-connected relations between knowledge, culture, technology and society. this in turn dem...
详细信息
In Re-Understanding Automation and control in the era of digital automation of societal systems, we need to understand the inter-connected relations between knowledge, culture, technology and society. this in turn demands the exploration of social and cultural architectures, which facilitate them. Whilst computational model of data systems is built upon the bottom-up architecture, it is the top-down architecture of social and cultural contexts that synchronises the processing and outcomes of data systems, may they relate to organisational systems, heath and welfare systems, or institutional systems. It is this notion of the inter-dependence of the bottom-up and top-down architectures that makes us act beyond the linear gaze worldview of automation and control of production systems, and explore the multiplicity of interconnections between and across societal systems. In these horizons, we see the inter-connectedness between the unit and the whole, between the horizontal and vertical, and a symbiosis of hand and brain- an augmentation of the human and the machine. the ideas of inter-connectedness, augmentation and symbiosis lie at the core of holonic horizons. these horizons allow us to transcend the limit of the calculation and control model of automation, and enable the design of human-centred systemsthat valorise differences whilst utilising the richness and diversity of human-machine collaborations. When we envision these interactions and collaborations as a systems developmental process, we begin to visualise systems design from an interdependent perspective, which goes beyond the linear gaze of "utility". the paper explores the ways holonic architectures engage us in the design process. (C) 2019, IFAC (international Federation of Automatic control) Hosting by Elsevier Ltd. All rights reserved.
Time is a crucial notion for intelligent systems, such as robotic systems, cognitive systems, multi-agent systems, cyber-physical systems, or autonomous systems, since it is inherent to any real-world process and/or e...
详细信息
ISBN:
(纸本)9783031590566;9783031590573
Time is a crucial notion for intelligent systems, such as robotic systems, cognitive systems, multi-agent systems, cyber-physical systems, or autonomous systems, since it is inherent to any real-world process and/or environment. Hence, in this paper, we present operational temporal logic notations for modeling the time aspect of intelligent systems in terms of temporal interval concepts. their application to intelligent systems' application scenarios have demonstrated the usefulness and effectiveness of our developed approach.
the cerebral palsy (CP) is an irreversible disorder that affects the human brain and causes problems with mobility and communication. this paper presents the results of designing, implementing and evaluating an easy-t...
详细信息
ISBN:
(纸本)9783319402475;9783319402468
the cerebral palsy (CP) is an irreversible disorder that affects the human brain and causes problems with mobility and communication. this paper presents the results of designing, implementing and evaluating an easy-to-use and low-cost equipment that seeks to increase the motivation and effort of the children with cerebral palsy while they do their physical therapies. through a validation process withthe help of patients and physiotherapists, we designed a set of multimedia applications that were evaluated with children with cerebral palsy while doing their therapies. Our emphasis was on providing support for the distension muscle exercises as they are identified as the most painful activities that take place in a physical therapy session. the application was based on a Wiimote control, connected to a personal computer via Bluetooth, as a receptor of the infrared light emitted by a simple control made of an infrared led, an interrupter and a battery.
Event based applications of Wireless Sensor Networks (WSNs) are prone to traffic congestion, where unpredicted event detection yields simultaneous generation of traffic at spatially co-related nodes, and its propagati...
详细信息
Event based applications of Wireless Sensor Networks (WSNs) are prone to traffic congestion, where unpredicted event detection yields simultaneous generation of traffic at spatially co-related nodes, and its propagation towards the sink. this results in loss of information and waste energy. Early congestion detection is thus of high importance in such WSN applications to avoid the propagation of such a problem and to reduce its consequences. Different detection metrics are used in the congestion control literature. However, a comparative study that investigates the different metrics in real sensor motes environment is missing. this paper focuses on this issue and compares some detection metrics in a testbed network with MICAz motes. Results show the effectiveness of each method in different scenarios and concludes that the combination of buffer length and channel load constitute the better candidate for early and fictive detection. (C) 2014 the Authors. Published by Elsevier B.V.
A mobile ad hoc network is a group of mobile hosts that depends on wireless network interfaces with no use of fixed infrastructure or centralized administration. the main equipments of a mobile station are wireless tr...
详细信息
A mobile ad hoc network is a group of mobile hosts that depends on wireless network interfaces with no use of fixed infrastructure or centralized administration. the main equipments of a mobile station are wireless transmitters/ receivers. In this respect, the network can be seen as random chart because of the nodes 'movement. the change of network topology relies on time when nodes move or adjust their transmission and reception parameters. the design of these networks is characterized by its vulnerability to denial of service attacks ( DOS). thus, it is very challenging. In this paper, the focus lies on a special kind of denial of service attacks called Jamming. Indeed, stations in a mobile ad hoc network share a wireless medium. therefore, a radio signal can be jammed or interfered, which leads to the corruption and loss of the message. In this study, we suggest a new method of detection of that predictable attack by the application of the statistical process control (SPC). the SPC can be the key element of the detection of jamming attack, applied on the packet drop ratio (PDR) which refers as the number of dropped packets to the total of packets sent. the assimilation of this metric shows the nonconforming fraction. As we evaluated the performance, we substantiate that the control chart for fraction nonconforming based on the PDR detects the jamming attack in a real time by a visual graph. (C) 2016 the Authors. Published by Elsevier B.V.
暂无评论