Sum of squares (SOS) optimization has been a powerful and influential addition to the theory of optimization in the past decade. Its reliance on relatively large-scale semidefinite programming, however, has seriously ...
详细信息
Sum of squares (SOS) optimization has been a powerful and influential addition to the theory of optimization in the past decade. Its reliance on relatively large-scale semidefinite programming, however, has seriously challenged its ability to scale in many practical applications. In this paper, we introduce DSOS and SDSOS optimization as more tractable alternatives to sum of squares optimization that rely instead on linear programming and second order cone programming. These are optimization problems over certain subsets of sum of squares polynomials and positive semidefinite matrices and can be of potential interest in general applications of semidefinite programming where scalability is a limitation.
Cardiotocography is one of the most widely used technique for recording changes in fetal heart rate(FHR) and uterine contractions. Assessing cardiotocography is crucial in that it leads to identifying fetuses which su...
详细信息
Cardiotocography is one of the most widely used technique for recording changes in fetal heart rate(FHR) and uterine contractions. Assessing cardiotocography is crucial in that it leads to identifying fetuses which suffer from lack of oxygen, i.e. hypoxia. This situation is defined as fetal distress and requires fetal intervention in order to prevent fetus death or other neurological disease caused by hypoxia. In this study a computer-based approach for analyzing cardiotocogram including diagnostic features for discriminating a pathologic fetus. In order to achieve this aim adaptive boosting ensemble of decision trees and various other machine learning algorithms are employed.
For several years, traffic congestion has been a major problem in big cities where the number of cars and different means of transportation has been increasing significantly. The problem of congestion is becoming more...
详细信息
According to the Greek mythology, Typhon was a gigantic monster with one hundred dragon heads, bigger than all mountains. His open hands were extending from East to West, his head could reach the sky and flames were c...
详细信息
Wireless networked mobile robots pursuing a common objective are envisioned to be an efficient solution for many military, industrial, commercial, and environmental applications. This paper presents the design conside...
详细信息
Wireless networked mobile robots pursuing a common objective are envisioned to be an efficient solution for many military, industrial, commercial, and environmental applications. This paper presents the design considerations of an autonomous intruder detection system based on wireless networked robots. Specifically, three critical aspects of these systems, such as coordination and task allocation, communication, and map-based intruder detection, have been investigated and a multi-sensor fusion mechanism has been presented. Performance results show that the fusion of redundant information from different sensors can increase the accuracy of a system and reduce overall uncertainty in intruder detection applications.
This paper presents a mobile robot aided self deploying wireless sensor network aiming to detect radiation leaks and to measure radiation levels, and explains design considerations to prolong network life. Special att...
详细信息
This paper presents a mobile robot aided self deploying wireless sensor network aiming to detect radiation leaks and to measure radiation levels, and explains design considerations to prolong network life. Special attention is given to the factors which are important for the specific requirements of radiation leak detection. Wireless sensor networks (WSNs) provide numerous benefits to applications with low duty cycle, such as environmental monitoring, event detection, etc. However, the realization of these potential benefits directly depends on energy efficient and reliable communication and coordination capabilities of the deployed system. In this study, challenges of WSNs, deployment strategies using mobile robots, and energy harvesting techniques to maximize lifetime of WSNs are discussed. Also, a comparison of two different exploration strategies is shown with the results of our own application developed in C#. Main contributions of this study are discussions on mobile robot aided WSN deployment strategies and energy harvesting techniques to maximize WSN lifetime.
Optical character recognition(OCR) can be used in some management mechanisms of state and business world to organize documents scanned or captured by camera. Therefore, OCR is one of the subjects rapidly evolving in t...
详细信息
Optical character recognition(OCR) can be used in some management mechanisms of state and business world to organize documents scanned or captured by camera. Therefore, OCR is one of the subjects rapidly evolving in the recent times. This study investigates the procedure steps until character recognition. That's because, the more correctly preprocessings are applied;the better results can be obtained in character recognition. In this study, the algorithms providing the best results are determined by following the procedure stages of gray scale transformation, noise removal and image thresholding. Binarization plays an important role in character recognition. For this reason, algorithms dynamically determine thresholds are preferred for character recognition in this study. Accordingly, Otsu thresholding method was determined to give the best results in terms of both picture quality and speed. Therefore, this method was used for character recognition. Primarily, lines were determined for character separation and then letters were individually obtained.
For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in th...
详细信息
For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in the number of network users, security becomes the main challenge in the area of network field. Most security related threats target the layers of the OSI reference model. Sophisticated attack types such as Distributed Denial of Service (DDoS), Man-in-the-Middle and IP spoofing attacks are used to attack these layers. In this paper, we analyze most of the attack types that cause serious problems in computer networks and defense techniques to stop or prevent these attacks.
QoS solutions for Core Internet Networks require that we pay special attention to scalability, as they deal with a lot of flows and demand many resources. In this paper, integrated solutions from the physical layer (S...
详细信息
QoS solutions for Core Internet Networks require that we pay special attention to scalability, as they deal with a lot of flows and demand many resources. In this paper, integrated solutions from the physical layer (SDH/SONET and DTM) to the IP layer (IntServ and DiffServ) are analysed and proposed, concentrating not only on scalability, but also on QoS guarantees.
In this paper we propose to think out of the box and discuss an approach for universal mitigation of Negative Bias Temperature Instability (NBTI) induced aging untied from the limitations of its modelling. The cost-ef...
详细信息
ISBN:
(纸本)9781509006946
In this paper we propose to think out of the box and discuss an approach for universal mitigation of Negative Bias Temperature Instability (NBTI) induced aging untied from the limitations of its modelling. The cost-effective approach exploits a simple property of a randomized design, i.e., the equalized signal probability and switching activity at gate inputs. The techniques considered for structural design randomization involve both the hardware architecture and embedded software layers. Ultimately, the proposed approach aims at extending the reliable lifetime of nanoelectronic systems.
暂无评论