there is presented error evaluation of temperature measurement system by thermocouple with controlled temperature field. this temperature measurement system provides precision correction of systematic error of tempera...
详细信息
ISBN:
(纸本)9781424413478
there is presented error evaluation of temperature measurement system by thermocouple with controlled temperature field. this temperature measurement system provides precision correction of systematic error of temperature measurement in the condition of using thermocouples with significant heterogeneity of electrodes acquired during their exploitation in variable temperature field.
Over the lastfew decades the competitive advantage of business organizations and their profitability have been linked to effective resources management. In a rapidly evolving economy, the responsiveness necessary to c...
详细信息
ISBN:
(纸本)9781424413478
Over the lastfew decades the competitive advantage of business organizations and their profitability have been linked to effective resources management. In a rapidly evolving economy, the responsiveness necessary to compete is increasing and the challenge facing organizations is to focus on the individual (whether a customer, a supplier, or an internal resource) to design competitive strategies. this paper proposes intelligent models of individual behaviour to support effective resource allocation strategies within a business environment. the context for application and demonstration of this research is a London-based investment bank and the focus of the study is on the performance of their liquid bond trading desk. the objective of the study is to improve the portfolio profitability of the trading desk by improving team performance.
this paper presents a method for power management of energy-aware embedded systems. the method is suitable for systems on a chip or microcontrollers where a processor runs in parallel with embedded peripherals. Since ...
详细信息
ISBN:
(纸本)9781424413478
this paper presents a method for power management of energy-aware embedded systems. the method is suitable for systems on a chip or microcontrollers where a processor runs in parallel with embedded peripherals. Since the approach is based on clock rate control, it is very easy to implement. While the assumption is that the CPU has an active and a power-saving mode, we introduce a fine-grain energy model which accords well with individually controlled peripherals. the method allows calculating an optimal clock frequency for each task. Also, we discuss the case when the clock scaling must be consistent with constant-clock peripherals such as timers. Under this hardware model we outlined possibilities to scale the CPU clock rate keeping the constant-clock peripherals operational.
this paper presents a non-standard approach for solving computer viruses defection problem based on the Artificial Immune System (AIS) method the AIS is the biologically-inspired technique which have powerful informat...
详细信息
ISBN:
(纸本)9781424413478
this paper presents a non-standard approach for solving computer viruses defection problem based on the Artificial Immune System (AIS) method the AIS is the biologically-inspired technique which have powerful information processing capabilities that makes it attractive for applying in computer security systems. Computer security systems based on AIS principles allow detect unknown malicious code. In this work we are describing model build on the AIS approach in which detectors represent the Learning Vector Quantization (LVQ) neural networks. Basic principles of the biological immune system and comparative analysis of unknown computer viruses detection for different antivirus software and our model are presented.
Design of efficient control algorithms for autonomous mobile robot movement in unknown and changing environment with obstacles and walls is a difficult task there exist different strategies to design control systems t...
详细信息
ISBN:
(纸本)9781424413478
Design of efficient control algorithms for autonomous mobile robot movement in unknown and changing environment with obstacles and walls is a difficult task there exist different strategies to design control systems to perform the robot movement. In this article possibility to use FUZZY logic, IF-thEN rules, and Genetic Algorithm for autonomous mobile robot control is presented Control using fuzzy logic is softer and better then control using IF-thEN rules because of absence of motors speed jumps. It is shown that the rough control system can be designed using an expert knowledge. then genetic algorithm can be used to improve the quality of the control system.
this document presents the application of biometrics to strength conventional passwords. We show methods to analyze and compare users' keystroke patterns to be able to verify their identity when entering the passw...
详细信息
ISBN:
(纸本)9781424413478
this document presents the application of biometrics to strength conventional passwords. We show methods to analyze and compare users' keystroke patterns to be able to verify their identity when entering the password into a computer system. the problem's difficulty arises from the fact that only a very limited amount data is available and that new users can come and others may leave the system meantime. that is we are not allowed to re-evaluate all users' data during the application. We show test results based on 2400 records collected from 25 users of different typing ability.
this paper describes a peer-to-peer distributed system predicated by a Trust Management entity that provides a functionally stable, scalable, anonymous peer-centric conglomeration we call SPATE. SPATE stands for Soft-...
详细信息
ISBN:
(纸本)9781424413478
this paper describes a peer-to-peer distributed system predicated by a Trust Management entity that provides a functionally stable, scalable, anonymous peer-centric conglomeration we call SPATE. SPATE stands for Soft-Profiling Architecture for Trust Evaluation in which a peer is evaluated minimally within a flexible range. If the range remains invariant within a time-span, evaluation scores need not be updated this results in less update traffics. In this scheme, the system attempts to stay robust against malicious peers with pertinent trust-records replicated and distributed among coordinators.
this paper presents use conditional probability for schedules cluster recognition problem. Task scheduling in this approach are generated withthe fiinction, which defines the dependence between random parameter of pr...
详细信息
ISBN:
(纸本)9781424413478
this paper presents use conditional probability for schedules cluster recognition problem. Task scheduling in this approach are generated withthe fiinction, which defines the dependence between random parameter of priority rule and the operation number. there are some algorithms, which differ from each other in type and in the manner of change value of these functions. the paper gives the formulation of schedules cluster recognition problem and basic grid-based clustering algorithm is described. Schedules are generated too by the optimization algorithms (for example: simulated annealing, taboo method, genetic algorithm, and other mataheuristic) many times in the clustering process. Structures for some of schedules are considered.
作者:
Kupin, AndreyDepartment of Informatics
Automatics and Control Systems Krivoy Rog Technical University 50027 Krivoy Rog XXII party congress str. 11 Ukraine
this document presents results to identification of technological process (TP) of beneficiation of iron ore on bases of models NNARX (Neural Network based AutoRegressive eXogenous signal), NNARXMAX (Neural Network bas...
详细信息
ISBN:
(纸本)9781424413478
this document presents results to identification of technological process (TP) of beneficiation of iron ore on bases of models NNARX (Neural Network based AutoRegressive eXogenous signal), NNARXMAX (Neural Network based AutoRegressive, Moving Average, eXogenous signal), NNOE (Neural Network Output Error). Computer modeling has been carried out with application of Neuro Solution software package. As internal modeling structure bases on the basis of multilayered perceptron (MLP) and networks of the radial basis functions (RBF) network have been analyzed the sample of parameters of the Southern mining complex (Krivoy Rog city, Ukraine) has been used for training and verification. It is proved efficiency of application of neural networks for identification of parameters of concentrating technology.
the blind source deconvolution/separation problem is considered based on inverse deconvolution model application. A new approach to inverse model design based on unknown-input observer theory is considered with refere...
详细信息
ISBN:
(纸本)9781424413478
the blind source deconvolution/separation problem is considered based on inverse deconvolution model application. A new approach to inverse model design based on unknown-input observer theory is considered with reference to blind separation problem. the method of reduced-order inverse model design in proposed and the conditions of inverse model parametric design problem solvability are found as a special type of observability. For special case of solvability conditions violation a regularized inverse model is proposed which ensures the possibility of arbitrary pole-placement of inverse model. the method of wave source signals identification and prediction is also proposed.
暂无评论