This paper describes the architecture and implementation of Tianwang QA system2006, which works for the TREC QA Main task this year. The main improvement is: 1. add one well founded knowledge source from Web - Wikiped...
详细信息
This paper describes the architecture and implementation of Tianwang QA system2006, which works for the TREC QA Main task this year. The main improvement is: 1. add one well founded knowledge source from Web - Wikipedia, and employ some natural language processing technologies to extract high quality answers;2. design and implement a new translation algorithm in query generation. The results show that fine organized knowledge source is effective in answering all three types of questions. And such query generation algorithm can be benefit from both Frequent Asked Questions on Web and past TREC QA data.
Description logics are a popular, and widely used, formalism for describing domain knowledge in a structured way. To cope with the vagueness of real-world knowledge, several fuzzy description logics have already been ...
详细信息
Description logics are a popular, and widely used, formalism for describing domain knowledge in a structured way. To cope with the vagueness of real-world knowledge, several fuzzy description logics have already been proposed. In this contribution, we argue that, rather than modelling all vagueness in a generalized description logic, it may be more natural to encode vague attributes in concrete domains [1], and to model vague predicates on the level of query processing.
The adaptive observer for the nonlinear time-varying continuous-time system has been proposed in this paper. Also, a novel state-space adaptive observer-based tracker scheme for nonlinear time-varying sampled-data sys...
详细信息
ISBN:
(纸本)0889865515
The adaptive observer for the nonlinear time-varying continuous-time system has been proposed in this paper. Also, a novel state-space adaptive observer-based tracker scheme for nonlinear time-varying sampled-data systems, which have unanticipated decay factors in the actuators, has been proposed in this paper. Here, we utilize the advantage of digital redesign methodology to convert a theoretically well-designed analog controller/observer with a high-gain property into its corresponding low-gain digital controller/observer for a practical implementation.
computer software and the software development process belong to the class of complex systems. Continues monitoring and analysis of development process is crucial to minimize risk. For that reason many metrics and mon...
详细信息
computer software and the software development process belong to the class of complex systems. Continues monitoring and analysis of development process is crucial to minimize risk. For that reason many metrics and monitoring tools were developed. Most of metrics are programming language dependent. In the present paper we introduce a tool for analyzing program complexity using chaos theory, especially the idea of the logistic map. It enables assessment of current state of the software development process based on previous software revisions. Analysis is programming language independent and also enables analysis of object and compiled code.
We have developed scanning laser range sensor called "SOKUIKI" sensor which is ultra-small scanning laser range sensor adopted for various types of mobile robots as we have already published. As a sensor for...
详细信息
Static var compensator (SVC) are employed for providing better voltage regulation and transient stability especially for increased power transfer through the transmission lines. In this paper, two SVC damping controll...
详细信息
Static var compensator (SVC) are employed for providing better voltage regulation and transient stability especially for increased power transfer through the transmission lines. In this paper, two SVC damping controllers with single and dual inputs respectively are designed based on wide area measurements of generator speed deviations. A small population based particle swarm optimization algorithm (SPPSO) is applied to determine the optimal parameters of the damping controllers for small and large disturbances. Simulation results are provided to show that the effectiveness of the optimal damping controllers on the Kundur's two-area benchmark power system. Results show the dual input controller further improves the damping provided by the single input controller.
Ubiquitous sensor networks are application oriented system, which are composed of a large number of cooperative sensor nodes. The identification of individual sensor node is important especially for some security-sens...
详细信息
Ubiquitous sensor networks are application oriented system, which are composed of a large number of cooperative sensor nodes. The identification of individual sensor node is important especially for some security-sensitive applications. In this paper, we focus on the establishment of trust relationship among wireless sensor nodes, and try to combine the message authentication and identity authentication as a countermeasure to hostile attack. Accompanied with a simple lightweight key pre-distribution algorithm, in which each node sends only one message, we propose a lightweight trust relationship establishing scheme for ubiquitous sensor networks. The new scheme, which works without a trusted authority in the network, is not only concise in format but effective in practice to ensure network trusted and secure.
The purpose of this paper is to introduce an novel edge detector using directional wavelet transform and signal registration. Directional wavelet transform decomposes an image into four-dimensional space which augment...
详细信息
The purpose of this paper is to introduce an novel edge detector using directional wavelet transform and signal registration. Directional wavelet transform decomposes an image into four-dimensional space which augments the image by the scale and directional information. We show the directional information significantly improves edge detection in noisy images in comparison with the classical multiscale edge detector, and enables more reliable edge tracing along an object boundary. Edge detection is based on the modulus maximum principle with an adaptive threshold whose value is calculated via maximum entropy measure. Edge tracing is done with signal alignment between neighbour edges
In this article, some methods are proposed for enhancing the converging velocity of the COA (chaos optimization algorithm) based on using carrier wave two times, which can greatly increase the speed and efficiency of ...
详细信息
In this article, some methods are proposed for enhancing the converging velocity of the COA (chaos optimization algorithm) based on using carrier wave two times, which can greatly increase the speed and efficiency of the first carrier wave’s search for the optimal point in implementing the sophisticated searching during the second carrier wave is faster and more accurate. In addition, the concept of using the carrier wave three times is proposed and put into practice to tackle the multi-variables opti- mization problems, where the searching for the optimal point of the last several variables is frequently worse than the first several ones.
An encoding technique is an interesting problem in information theory (i.e., how to reduce the size of the textual material when information is continually sent from one point to another.) The important factors to imp...
详细信息
An encoding technique is an interesting problem in information theory (i.e., how to reduce the size of the textual material when information is continually sent from one point to another.) The important factors to improve efficiency of the encoding process are probability distribution and dependency of the input data. Some encoding algorithms focused on these factors are Huffman algorithm, Lempel-Ziv algorithm and enhance versions of them. In some cases, dependency of the input data is not significant, but the probability distribution remains considerable. In this paper, we propose a novel approach for an on-line encoding algorithm using a generating function that the encoding process performs in an on-line manner. Our concept is that the generating function must be constructed up to the probability distribution. Some experimental results show that our technique can apply to the normal distribution of input data
暂无评论