In general, web search engines respond to queries by returning a list of links to web pages that are considered relevant. However, these queries are often ambiguous or too general and the users end up browsing through...
详细信息
In general, web search engines respond to queries by returning a list of links to web pages that are considered relevant. However, these queries are often ambiguous or too general and the users end up browsing through a long list of items in order to find what they are actually looking for. And hence the idea to cluster web search results so that the output would be a list of labelled clusters. An algorithm based on the ASM (Ants Sleeping Model) is proposed. In the ASM model each data is represented by an agent, its environment being a two dimensional grid. The agents will group themselves into clusters by making simple moves according to some local environment information. At any step an agent can pro-actively decide to directly communicate with one of its fellows and choose to move accordingly, the moves being expressed by fuzzy IF-THEN rules. Thus the chance of getting trapped in a local optimum is minimized and hybridization with a classical clustering algorithm becomes needless.
The complexity of pairwise RNA structure alignment depends on the structural restrictions assumed for both the input structures and the computed consensus structure. For arbitrarily crossing input and consensus struct...
详细信息
This paper presents the communication related design considerations of Wireless Sensor Network (WSN) aided Multi-Robot Simultaneous Localization and Mapping (SLAM). In this approach, multiple robots perform WSN-aided ...
详细信息
This paper presents the communication related design considerations of Wireless Sensor Network (WSN) aided Multi-Robot Simultaneous Localization and Mapping (SLAM). In this approach, multiple robots perform WSN-aided cooperative SLAM using only range values to landmarks in the environment by measuring the Received Signal Strength Indicator (RSSI) of the received radio messages, and odometry information. The SLAM algorithm proposed in this study uses the Rao-Blackwellized Particle Filters. In addition, the inherent communication problems in WSNs, and their effects on cooperative SLAM are explained in detail and shown with the results of The Network Simulator (ns-2) simulations.
This paper presents a novel approach of using unmanned vehicles for Automated Meter Reading (AMR) applications in rural areas where there are a few consumers scattered around a wide area. The proposed system does not ...
详细信息
This paper presents a novel approach of using unmanned vehicles for Automated Meter Reading (AMR) applications in rural areas where there are a few consumers scattered around a wide area. The proposed system does not require a fixed network infrastructure to transfer data to a central database, since data collection is carried out by unmanned vehicles. Compared to traditional meter reading systems, the use of unmanned vehicles for AMR brings several advantages, such as low cost operation, flexibility, and online system management. However, the realization of these potential gains directly depends on reliable communication capabilities of the deployed system and successful navigation of unmanned vehicles. Overall, in this paper, the design principles and challenges of using unmanned vehicles for AMR applications in rural areas have been presented. Also, the communication architecture of the proposed system has been explained and comparative simulation studies have been performed in terms of energy efficiency and navigation accuracy.
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions ...
详细信息
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions by providing initial boundary points for deformable models or seed points for split and merge segmentation algorithms. Preliminary results obtained for dental CT studies of dentate and edentulous human-mandible are presented with finite element models divided by tetrahedral elements, which built based on actual CT data combined with triangulation equations. Identification of different anatomical regions set for mandible cortical and cancellous bones by generated 3D models by marching cubes technique.
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between diffe...
详细信息
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between different regions upon their gray-level values; second, a set of objects are generated and texture descriptors are calculated for selected windows from the image data sample. Finally, identification of different anatomical regions set for mandible bones to determine the cystic lesion volume based on numerical methods. Preliminary results obtained for dental CT of female patient aged 14 years old complaining of bilateral swelling in her mandible are presented.
To exploit the full potential of GPGPUs for generalpurpose computing, DOACR parallelism abundant in scientific and engineering applications must be harnessed. However, the presence of cross-iteration data dependences ...
详细信息
Boolean Differential Calculus (BDC) extends Boolean *** Boolean algebra is focused on values of logic functions,BDC allows the evaluation of changes of the function values. Such changes can be investigated between cer...
详细信息
ISBN:
(纸本)9781608451821
Boolean Differential Calculus (BDC) extends Boolean *** Boolean algebra is focused on values of logic functions,BDC allows the evaluation of changes of the function values. Such changes can be investigated between certain pairs of function values as well as regarding whole subspaces. Due to the same basic data structures, BDC can be applied to any task described by logic functions and equations together with the Boolean *** used is BDC in analysis, synthesis, and testing of digital circuits. In this chapter, we introduce basic definitions of BDC together with some typical applications.
In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure o...
详细信息
In developing multi-UAV(Unmanned Aerial Vehicle) system, a simulation environment is essential to verify the functionalities of the whole system with higher productivity and reduced risks of accidents. Simulations of ...
详细信息
暂无评论