In real world applications, classification models can be built by repeatedly going through the steps of data preprocessing, building classification models with different dedicated algorithms, testing the resulted mode...
In real world applications, classification models can be built by repeatedly going through the steps of data preprocessing, building classification models with different dedicated algorithms, testing the resulted models, until building a good enough classification model is achieved. The model built in this way can be used in order to perform predictions on new data, with a degree of trust resulted by testing the model. All the operations described above can be done with Weka, which is a very powerful machine learning tool. The authors consider that after going through the previous steps, for many real world applications, it would be beneficial to go through a supplementary step, of developing a custom application for data classification, specific to the realized study. The proposed application will use the Weka API, which will allow it to rebuild the selected classification model, save and load it in/from a binary file and then make predictions with the help of a user interface perfectly adapted to the data set used. The proposed application makes it easier to make predictions for a final beneficiary. The paper presents how such a custom classification application can be developed, using the Weka API and Java programming language. In order to validate the proposed solution, the authors have built a custom application for the classification of data of patients who may have heart diseases, starting from the Cleveland heart disease data set, obtained from the UCI Machine Learning Repository. The proposed application allows saving and loading the classification model through serialization and deserialization, so that building it in order to make predictions is necessary only once.
This paper presents an alternative method of obtaining linear mathematical models for the Buck, the Boost and the Buck-Boost converters. The most common method of modelling DC-DC converters is state space averaging. S...
详细信息
ISBN:
(数字)9798350329520
ISBN:
(纸本)9798350329537
This paper presents an alternative method of obtaining linear mathematical models for the Buck, the Boost and the Buck-Boost converters. The most common method of modelling DC-DC converters is state space averaging. State space averaged models provide the most information about the behaviour of the converters, but are usually non-linear. Scientific fields like automation, system control, system engineering, etc., which are at the forefront of microgrid development, require linear models. This makes it necessary to linearize the models around an operating point. The resulting model would be linear but for the price of lower accuracy. The proposed method can produce a linear model more directly, without requiring linearization. This method is based on state space averaging but it deviates from it by applying certain simplifying assumptions or mathematical artifices in the process of obtaining the differential equations, leading to a simpler model. These simplifying assumptions are based on the role of the converter within the microgrid, namely load side converters LSC. The simplified models obtained through this method have the advantage of preserving the essential characteristics of the system dynamics.
This paper presents a study on using innovative machine learning techniques that can be applied in automotive traffic scenarios to increase a vehicle’s level of autonomy. The overtaking traffic scenario is treated fo...
This paper presents a study on using innovative machine learning techniques that can be applied in automotive traffic scenarios to increase a vehicle’s level of autonomy. The overtaking traffic scenario is treated for predicting the vehicle trajectory when overtaking another vehicle and the data is obtained by image processing using a video camera. Two different methods are compared, first by using classic tracking methods and a Kalman filter (as an adaptive filter) and second by using a machine learning technique - Support Vector Machine. The present article uses as inputs the data received from the camera and focuses on tracking selected objects and estimating their position using mainly image processing in automotive scenarios. The main purpose of this work is to experiment and compare different tracking modes to determine those that have the best performances in terms of runtime, memory usage and prediction accuracy.
The control of a nonlinear process raises various problems, both in terms of the control law design and the controller tuning. This paper presents a tuning procedure of a minimum variance control system based on the a...
The control of a nonlinear process raises various problems, both in terms of the control law design and the controller tuning. This paper presents a tuning procedure of a minimum variance control system based on the analysis of the estimated gain of the controlled process. In this regard, the performed study shows that the settling-time of the estimated process gain can be used as a tuning criterion for the minimum variance controller, allowing the improvement of the control performance. The procedure involves closed-loop estimation of the process gain based on parameters estimates of a linearized model that approximates the nonlinear process functionality around an operating point. The basic idea is that, although the parameters estimates of the linearized model are different in closed-loop, respectively open-loop, the steady-state gain estimates are similar in both cases. Thus, the time dynamics of this estimated gain can be a useful indicator for the control system tuning. In order to validate the proposed procedure, an induction generator integrated into a wind energy conversion system was considered as a controlled process.
The current study proposes a network control structure for small low-cost drones like the Parrot Mambo mini-drone. The structure is composed of an inner loop running on the drone, and an outer loop running on a remote...
详细信息
ISBN:
(数字)9798350394085
ISBN:
(纸本)9798350394092
The current study proposes a network control structure for small low-cost drones like the Parrot Mambo mini-drone. The structure is composed of an inner loop running on the drone, and an outer loop running on a remote computer. The inner loop controls the attitude and altitude of the drone based on Kalman filter estimations from the onboard sensors. The outer loop ensures position tracking based on measurements from OptiTrack cameras. A time delay compensator is added to address the constraints imposed by wireless network communications between the drone and the remote computer. Experimental results using Parrot Mambo drones show good stability and tracking performances, despite model uncertainty and time delay.
This paper presents a current situation of studies and applications which are using serious games and artificial intelligence (AI) in rehabilitation of rheumatoid arthritis, and possible future directions. The objecti...
详细信息
Protecting critical infrastructures and manufacturing plants in the context of Industry 4.0 against cyber-attacks is a nowadays challenge due to lack or insufficient security mechanisms for the communication protocols...
详细信息
ISBN:
(数字)9798350381993
ISBN:
(纸本)9798350382006
Protecting critical infrastructures and manufacturing plants in the context of Industry 4.0 against cyber-attacks is a nowadays challenge due to lack or insufficient security mechanisms for the communication protocols. Even though new protocols are considering built-in security (e.g. OPC UA) there is still a struggle for assuring interoperability and interconnectivity in the IoT era while dealing with resource constrained devices. This paper attempts to implement and evaluate a solution for assuring the authenticity and integrity of the data transmitted through OPC UA protocol in a client- server communication based on ECC as an alternative to the existing implemented solution which uses RSA. We choose ECC since it can achieve similar level of security as RSA for smaller key size and in order to respond to the limited memory and resource constrained elements part of an industrial system. Furthermore, we aim to evaluate through measurements the performance of different ECC key sizes in respect to the latency introduced by each cryptographic operation.
We present a diffusion probabilistic model (DPM) capable of generating high-quality electroencephalography (EEG) signals. In particular, we investigate the fidelity of synthesized visually evoked potentials and the pe...
详细信息
Accelerometers play a crucial role in localization problems, but their accuracy depends on the precision of the calibration process. In this paper, a comparison of optimization algorithms is presented within the scope...
详细信息
The successful verification of the authenticity of banknotes, or the detection of counterfeits, is based on the combination of an effective measuring system and computer technology. In this paper, a modern diagnostic ...
详细信息
暂无评论