In this article we discuss the design of a new ankle actuation mechanism for the humanoid robot TUlip. The new mechanism consists of two coupled series-elastic systems. We discuss the choice of actuators according to ...
详细信息
Features of male/female facial images are examined by analyzing the distribution of connection weights of the hidden-layer unit and the input-layer unit of a neural network that responds to their distinction. Twenty-f...
详细信息
Features of male/female facial images are examined by analyzing the distribution of connection weights of the hidden-layer unit and the input-layer unit of a neural network that responds to their distinction. Twenty-five gray-level (black-and-white) facial images were used for each of the male and female samples. Several different numbers of mosaic blocks were used for the whole face region and each facial component region. The training parameters of the neural network and the minimum number of hidden layers that can discriminate male/female were obtained by a genetic algorithm. The neural network consisting of these parameters has a stable convergence in any region so that this can discriminate male/female with 100% accuracy. In the feature extraction experiments, hidden layers were obtained, which significantly respond to male/female facial regions. The facial features of male/female can be extracted by analyzing the connection weights between the hidden-layer unit and the input-layer unit. The facial features extracted by using the proposed method were similar to those obtained by other psychological experiments and facial measurements.
A communication library named Stampi realizes MPI communications among different computers, and it is supported in many kinds of parallel computers. In addition, I/O operations based on the MPI-I/O APIs among differen...
详细信息
A communication library named Stampi realizes MPI communications among different computers, and it is supported in many kinds of parallel computers. In addition, I/O operations based on the MPI-I/O APIs among different computers are available with it. In remote I/O operations, MPI-I/O processes are invoked on a remote computer to play I/O operations using a vendor-supplied MPI-I/O library. When the vendor-supplied one is not available on a remote computer, a single MPI-I/O process is invoked, and it uses UNIX I/O functions instead of the vendor-supplied one. This may result in an increase in execution times for nonblocking MPI-I/O operations with an increase in the number of user processes. To make the times short, a Pthreads library has been introduced in an I/O mechanism of the MPI-I/O process, and the newly implemented method makes the times short successfully. In this paper, details of the multithreaded MPI-I/O mechanism and preliminary performance results are described.
Clustering algorithms are crucial in uncovering hidden patterns and structures within datasets. Among the density-based clustering algorithms, DBSCAN (Density-Based Spatial Clustering of Applications with Noise) has g...
详细信息
The paper contains a comparative analysis of technologies used for potato production on plantations covering areas of various sizes in the context of their impact on the natural environment. The research was conducted...
详细信息
作者:
Gote, Pradnyawant M.Kumar, PraveenDhale, TrishulMishra, Gaurav Vedprakash
Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India
Jawaharlal Nehru Medical College Department of Radiodiagnosis Maharashtra Wardha442001 India
Disease diagnosis using non-invasive techniques is a key determinant in the improvement of outcomes in patients and the enhancement of precautionary health measures. The study focuses on the design and development of ...
详细信息
In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining *** paper presents an ...
详细信息
In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining *** paper presents an innovative Application Programmable Interface(API)-based hybrid model designed to enhance the detection performance of malware *** model integrates eXtreme Gradient Boosting(XGBoost)and an Artificial Neural Network(ANN)classifier,offering a potent response to the sophisticated evasion and obfuscation techniques frequently deployed by malware *** model’s design capitalizes on the benefits of both static and dynamic analysis to extract API-based features,providing a holistic and comprehensive view of malware *** these features,we construct two XGBoost predictors,each of which contributes a valuable perspective on the malicious activities under *** outputs of these predictors,interpreted as malicious scores,are then fed into an ANN-based classifier,which processes this data to derive a final *** strength of the proposed model lies in its capacity to leverage behavioral and signature-based features,and most importantly,in its ability to extract and analyze the hidden relations between these two types of *** efficacy of our proposed APIbased hybrid model is evident in its performance *** outperformed other models in our tests,achieving an impressive accuracy of 95%and an F-measure of 93%.This significantly improved the detection performance of malware variants,underscoring the value and potential of our approach in the challenging field of cybersecurity.
Inline assembly code is common in system software to interact with the underlying hardware platforms. The safety and correctness of the assembly code is crucial to guarantee the safety of the whole system. In this pap...
详细信息
Inline assembly code is common in system software to interact with the underlying hardware platforms. The safety and correctness of the assembly code is crucial to guarantee the safety of the whole system. In this paper, we propose a practical Hoare-style program logic for verifying SPARC (Scalable Processor Architecture) assembly code. The logic supports modular reasoning about the main features of SPARCv8 ISA (instruction set architecture), including delayed control transfers, delayed writes to special registers, and register windows. It also supports relational reasoning for refinement verification. We have applied it to verify that there is a contextual refinement between a context switch routine in SPARCv8 and a switch primitive. The program logic and its soundness proof have been mechanized in Coq.
The biotelemetry is more common application of biomedical engineering and telemetry in our professional life. By this reason the biotelemetry is taught in our bachelor study program Biomedical technology from its begi...
详细信息
The public’s health is seriously at risk from the coronavirus pandemic. Millions of people have already died as a result of this devastating illness, which affects countless people daily worldwide. Unfortunately, no ...
详细信息
暂无评论