This paper presents the design of a controller for the maximum power point tracking of a grid-connected photovoltaic energy conversion system. A boost converter is used in the system to deliver the output from the sol...
详细信息
Thanks to the exponential growth of the Internet, Distance Education is becoming more and more strategic in many fields of daily life. Its main advantage is that students can learn through appropriate web platforms th...
详细信息
ISBN:
(纸本)9789897583308
Thanks to the exponential growth of the Internet, Distance Education is becoming more and more strategic in many fields of daily life. Its main advantage is that students can learn through appropriate web platforms that allow them to take advantage of multimedia and interactive teaching materials, without constraints neither of time nor of space. Today, in fact, the Internet offers many platforms suitable for this purpose, such as Moodle, ATutor and others. Coursera is another example of a platform that offers different courses to thousands of enrolled students. This approach to learning is, however, posing new problems such as that of the assessment of the learning status of the learner in the case where there were thousands of students following a course, as is in Massive On-line Courses (MOOC). The Peer Assessment can therefore be a solution to this problem: evaluation takes place between peers, creating a dynamic in the community of learners that evolves autonomously. In this article, we present a first step towards this direction through a peer assessment mechanism led by the teacher who intervenes by evaluating a very small part of the students. Through a mechanism based on machine learning, and in particular on a modified form of K-NN, given the teacher’s grades, the system should converge towards an evaluation that is as similar as possible to the one that the teacher would have given. An experiment is presented with encouraging results. Copyright 2018 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
The framework of feedback graphs is a generalization of sequential decision-making with bandit or full information feedback. In this work, we study an extension where the directed feedback graph is stochastic, followi...
详细信息
This work investigates the effectiveness of two training systems based on consumer hardware technologies, a first one using computer-Based Learning (CBL) and the other exploiting Virtual Reality (VR). A user study was...
详细信息
This survey on control Configuration Selection (CCS) includes methods based on relative gains, gramian-based interaction measures, methods based on optimization schemes, plantwide control, and methods for the reconfig...
This paper presents a novel watermarking technique for digital audio signals. A visually recognizable binary image served as a watermark is embedded into an audio signal in discrete cosine transform domain. In order t...
详细信息
ISBN:
(纸本)7801501144
This paper presents a novel watermarking technique for digital audio signals. A visually recognizable binary image served as a watermark is embedded into an audio signal in discrete cosine transform domain. In order to enhance robustness and make good use of masking characteristics of the audio signal, the techniques of pseudo-random permutation and energy-based permutation are used during watermarking. The experimental results show that the proposed watermarking technique is robust to several signal manipulations, such as filtering, compression, and so on.
Nowadays, online and real-time pattern classification applications are required in many areas. Most classification algorithms are suitable only for off-line applications. Using the concept of evolving intelligent syst...
详细信息
The paper examines a new approach to controlling deterministic dynamical chaotic mode of power system with two electric generate-sources. A control law is synthesized in the class of one-parameter structurally stable ...
详细信息
Recently, the use of security surveillance system including CCTV is increasing due to the increase of terrors and crimes. However as the data recorded through the video surveillance system is exposed, the invasion of ...
详细信息
暂无评论