High-Performance Computing (HPC) has been created to improve the quality of Pengantar Komputasi Parallel lectures. HPC consists of two PCs with AMD Ryzen 7 processor connected by high-speed LAN. HPC is used to solve p...
High-Performance Computing (HPC) has been created to improve the quality of Pengantar Komputasi Parallel lectures. HPC consists of two PCs with AMD Ryzen 7 processor connected by high-speed LAN. HPC is used to solve problems that students can't practice Parallel Computing because the computer used is not adequate. So it takes a machine that can used together that has many processors, so the problems encountered are resolved. The results obtained, participants can use more than four processors to solve tree problems directly.
To assist home care for the elderly, we've finished a smart walker in previous study, with the features including destination track navigation, obstacle detection, self-positioning, follow-up, and wireless inducti...
详细信息
To assist home care for the elderly, we've finished a smart walker in previous study, with the features including destination track navigation, obstacle detection, self-positioning, follow-up, and wireless inductive charging. In this study, we further finish the user's intention detection function on the smart walker to control the smart walker. We install 3 pressure sensors on both sides of smart walker handles respectively to extract the user's force application, which are taken as input signal. Through AdaBoost classifier, it finishes input signal recognition and controls of the smart walker moving forward/backward directly. The user doesn't need to press the switch or click on the panel, but apply force on the handle directly, which makes the operation easier. The experiment validates that the accuracy can achieve higher than 98%, which can simplify the operation effectively and achieve the practical purpose.
In this paper, we propose a secure mutual trust scheme based on the concept of chameleon hash function, for wireless sensor networks (WSNs). In the proposed scheme, the base station (BS), holding two common secrets, i...
详细信息
ISBN:
(纸本)9781509014132
In this paper, we propose a secure mutual trust scheme based on the concept of chameleon hash function, for wireless sensor networks (WSNs). In the proposed scheme, the base station (BS), holding two common secrets, issues an identity to every dep.oyed sensor node. An identity contains a public data and a private key. The public data is used to present a node, and the private key is used to make mutual trust keys with other node's public data. A public data can be used in verifying the legitimacy of the node. The mutual trust key is the evidence that a node owns the related public data. At any time, or after finding malicious nodes or dep.oying new nodes, BS will broadcast new group key to all sensor nodes by multiple hopping. Following the group key broadcasting and rebroadcasting, the still-legal nodes can set new information in their public data, private key, hop counters, public parameters, and neighbor nodes set, which contains the public data and hop counter of its neighboring nodes. Based on the new information, a sensor node can make the mutual trust keys with its neighboring nodes to do message authentication and secure communicating, or to set up a secure path to forward the sensed information to BS by multiple relaying. The security analysis shows that the proposed scheme can revoke the right of malicious sensor nodes, dep.oy new sensor nodes, and work well under malicious attacking. As the result of performance comparison, the proposed secure scheme is superior to the related works.
This paper introduces a fully recursive perceptron network (FRPN) architecture as an alternative to multilayer perceptron (MLP) with multiple hidden layers networks, popularly known as deep neural networks. The FRPN c...
详细信息
This paper introduces a fully recursive perceptron network (FRPN) architecture as an alternative to multilayer perceptron (MLP) with multiple hidden layers networks, popularly known as deep neural networks. The FRPN consists of an input layer, an output layer, and only one hidden layer in which the hidden layer neurons are fully connected with algebraic (instantaneous) connections, and not delayed connections. The FRPN is particularly attractive as an alternative to deep MLP since the FRPN eliminates the need of obtaining the number of hidden layers and the number of neurons per hidden layer. Some insight into the operational mechanisms of the FRPN is obtained through an application to a practical learning problem, viz., the handwritten digit recognition problem.
作者:
Choukri DjellaliMehdi AddaMathematics
Computer Science and Engineering Dep. University of Quebec At Rimouski 300 Allée des Ursulines Rimouski QC G5L 3A1 Canada
Variables selection is challenging task due mainly to huge search space. This study addresses the increasingly encountered chal- lenge of variables selection. It addresses the application of machine learning technique...
详细信息
Variables selection is challenging task due mainly to huge search space. This study addresses the increasingly encountered chal- lenge of variables selection. It addresses the application of machine learning techniques to the problem of variables selection. We detailed the various models of the variables selection and examined the basic steps that are used to select the cost-effective predictors. We also walked through the initial settings and all variables selection stages, including architecture configuration, strat- egy generation, learning, model induction, and scoring. Results from this study show that the cost and generalization were seen to improve significantly in terms of computing time and recognition accuracy when the proposed system is applied for medical diagnosis. Good comparisons with an experimental study demonstrate the multidisciplinary applications of our approach.
The performance of clustering is a crucial challenge, especially for pattern recognition. The models aggregation has a positive impact on the efficiency of Data clustering. This technique is used to obtain more clutte...
详细信息
Due to of the bandwidth constraint, sensors may only be able to transmit a finite number of bits to save the energy, and the measurement data may have to be quantized before transmission especially in wireless sensor ...
详细信息
ISBN:
(纸本)9781538629024
Due to of the bandwidth constraint, sensors may only be able to transmit a finite number of bits to save the energy, and the measurement data may have to be quantized before transmission especially in wireless sensor networks (WSNs). This paper studies the problem of the general quantized innovation filtering with random packet dropouts for linear stochastic uncertain systems. The multiplicative uncertainty of system parameters is first converted into additive noises. Then under the Gaussian assumption on the predicted density, the Lloyd-Max quantizer, a general quantized innovation filter with random packet dropouts in the linear minimum mean square error (LMMSE) sense is derived based on the projection theory and Bayes Rule. Furthermore a sufficient condition is provided, under which a general quantized innovation filter with random packet dropouts can be reduced into a standard Kalman filter. An example is simulated to illustrate the effectiveness and correctness of the designed filter.
Selecting the most suitable local invariant feature detector for a particular application has rendered the task of evaluating feature detectors a critical issue in vision research. Although the literature offers a var...
详细信息
Interoperability is one of crucial Internet-related research domains. Today, there is a shift in the architecture of the Internet and the traditional communication model; the human part in machine communication is blu...
详细信息
Interoperability is one of crucial Internet-related research domains. Today, there is a shift in the architecture of the Internet and the traditional communication model; the human part in machine communication is blurring into a more sophisticated thing-to-thing communication model. In this model things search for other things and provide collaboration-base services, this way leading to more complex interaction issues. Especially, interoperability must transcend the use of protocols and include semantic to make the different building blocks of the Internet of Things (IoT) work together and exploit the maximum of it. Hence, we present our vision and concept of a multilayer model for IoT infrastructure to: abstract the data sources infrastructure, define filtering and formatting mechanisms, and to present pertinent data in the form of simple unitary or aggregation of multiple services.
Indoor positioning often requires detecting and recognizing ad-hoc landmarks or anchor points with known coordinates and/or a given orientation within a given reference frame. Typically, the available kind of sensors ...
详细信息
ISBN:
(纸本)9781509024261
Indoor positioning often requires detecting and recognizing ad-hoc landmarks or anchor points with known coordinates and/or a given orientation within a given reference frame. Typically, the available kind of sensors and their detection area determine the landmark features and position. Of course, an excessive use of landmarks pose serious scalability and cost issues, whereas, on the other hand, a too-low amount of dep.oyed landmarks may create areas where agent's position is hard to track or localization accuracy drops. In addition, often sensors are not omni-directional. In this paper, the optimal placement problem of landmarks detected by sensors with a limited detection area is addressed in the general case of wide-open, ideally unbounded, rooms. First, landmarks placement optimization is performed numerically. Then, a closed-form expression of the optimal distance between landmarks on a regular pattern is determined as a function of both the reading range and the directional properties of the sensor considered. Finally, the performances of the chosen placement strategy in more realistic indoor environments (i.e. consisting of multiple rooms with obstacles therein) are evaluated through simulations assuming, without loss of generality, that a wheeled robot equipped with a front camera adjusts its own position by detecting suitable visual landmarks.
暂无评论