Elliptic curve cryptography (ECC) has shorter key length than other asymmetric cryptography algorithms such as RSA with the same security level. Existing faults in cryptographic computations can cause faulty results. ...
详细信息
Hybrid continuous-time and discrete-event system models are developed for applications to intelligent robot and autonomous control systems. Certain general properties, including the interface structure between the dis...
详细信息
Hybrid continuous-time and discrete-event system models are developed for applications to intelligent robot and autonomous control systems. Certain general properties, including the interface structure between the discrete event part and the continuous part of hybrid systems, are studied. Petri nets are proposed as the model for the discrete event sub-system (DES), and state equations with a set of binary parameters as the model for the continuous time sub-system (CTS) in a hybrid system. The quantized CTS is formulated in prime event structures, which can also be modeled by a condition/event Petri net. Therefore, a complete hybrid system can be fit into an extended Petri net formalism, which provides a unified framework for hybrid system description. The validity of the proposed model is demonstrated by modeling a two-tank system.
We present the results of a data mining research on the use of GPS positions and speed of travel of vehicles in urban areas to determine optimal travel routes for emergency vehicles. A new approach using predictive pr...
详细信息
ISBN:
(纸本)9781424448784
We present the results of a data mining research on the use of GPS positions and speed of travel of vehicles in urban areas to determine optimal travel routes for emergency vehicles. A new approach using predictive programming is presented. The approach focuses on using data mining of existing data as the key factor in the application logic where various decisions are to be made. The main appeal of such an approach is that the application logic evolves over time according to the application data. As the data changes the decisions soon follow. This gives the impression of intelligent behavior of the application. Copy;2009 IEEE.
Games have been used extensively to study human behavior. Researchers in the field of human-robot interaction (HRI) are becoming more aware of the importance of designing compelling and playful games to study interrel...
详细信息
Machine learning (ML) methods are used to extract new knowledge from existing datasets. Ensemble methods (EM) were introduced to improve the ML performance. While EM's offer performance improvements, they limit th...
详细信息
ISBN:
(纸本)1601322178
Machine learning (ML) methods are used to extract new knowledge from existing datasets. Ensemble methods (EM) were introduced to improve the ML performance. While EM's offer performance improvements, they limit the amount of control and general understanding of how the final result was achieved. We are researching the possibility to verify ML results with formalization of research results accessible in natural language. We propose to use the extracted information from scientific papers for the verification of ML results. In order to be able to extract the information, relevant to the ML results, an approach to extract specific information rich segments from scientific papers is needed. We present an approach to automated selection of relevant segments from large repositories.
To compute multidimensional data, tensor algebra is a powerful tool and it has many applications in machine learning and data analytics. This multidimensional data which is represented with higher-order tensors for mu...
详细信息
This work proposes a new and innovative approach to the knowledge diffusion, through experiments as well as experiential training, focusing on cutting-edge technologies. These technologies refer to robotic technologie...
详细信息
High-speed and energy-efficient computations are mandatory in the financial and insurance industry to survive in competition and meet the federal reporting requirements. On a hybrid CPU/FPGA system we propose a modula...
详细信息
In contrast to fault diagnosis relying solely on a single sensor, the method of multi-sensor information fusion for fault diagnosis (MSIFFD) broadens the spectrum of available information sources. It is renowned for i...
详细信息
systematic level design and optimization of a Radio Frequency (RF) receiver is a multidimensional problem and it is usually an arduous and experience-based work because of the trade-off between various system paramete...
详细信息
ISBN:
(纸本)9783037853801
systematic level design and optimization of a Radio Frequency (RF) receiver is a multidimensional problem and it is usually an arduous and experience-based work because of the trade-off between various system parameters. In the mean while, co-operated with Genetic Algorithm (GA) and local search, Memetic Algorithm (MA) gradually becomes popular to solve multidimensional optimization problems, and it can be an efficient method for computer-aided design of RF receivers. In this paper, the MA method was adopted to aid the design of a 5.8 GHz RF receiver front-end. The transfer function for the signal-to-noise ratio at the front-end output (SNRout) was first derived based on the gain, noise figure and inter-modulation product of each individual circuit component, and the transfer function was then used as the required fitness function for the MA method. The efficacy of the proposed method was validated by ADS simulations.
暂无评论