Heuristic methods are specially well suited to solve combinatorial problems. One of these problems is the distribution of petroleum products through oil pipelines networks. In this paper the problem is stated and solv...
详细信息
Heuristic methods are specially well suited to solve combinatorial problems. One of these problems is the distribution of petroleum products through oil pipelines networks. In this paper the problem is stated and solv...
详细信息
Heuristic methods are specially well suited to solve combinatorial problems. One of these problems is the distribution of petroleum products through oil pipelines networks. In this paper the problem is stated and solved using a multiobjective and constraint evolutionary optimization algorithm. Several objective functions has been defined to express the goals of the solutions as well as the preferences among them. Some constraints are included as hard objective functions and some has been evaluated through a repairing function to avoid infeasible solutions. An example of working is given.
A novel autotuning procedure is presented through application to an industrial in-line pH control system. The procedure has three advantages over classical relay auto-tuners: experiment duration is very short (no need...
详细信息
A novel autotuning procedure is presented through application to an industrial in-line pH control system. The procedure has three advantages over classical relay auto-tuners: experiment duration is very short (no need for limit-cycle convergence); all data is used for identification (instead of only peaks and switch instances); a parameter uncertainty model is identified and utilized for robust controller synthesis.
In this work, we evaluated the performances of an adaptive and online clustering algorithm (Self-Adaptive Kernel Machine - SAKM) adjusted for the automatic and online recognition of attacks on wi-fi communication (802...
详细信息
In this paper, we propose an approach for an online human daily activity recognition system using motion sensor data. From the sensor readings, the system decides which activity is performed when the values change. It...
详细信息
ISBN:
(纸本)9781467366991
In this paper, we propose an approach for an online human daily activity recognition system using motion sensor data. From the sensor readings, the system decides which activity is performed when the values change. It uses the previous measurements to interpret the current ones, without the need to wait for future information. The contributions of this study relies on the presentation of two methods to extract features from the sequence of sensor events, a clustering method to handle missing activity labels in dataset and an incremental learning method to deal with complexity and time spent in training since our system works on streaming data. Our methods are evaluated on publicly available real environment datasets.
This paper introduces a novel approach for early recognition of human actions using 3D skeleton joints extracted from 3D depth data. We propose a novel, frame-by-frame and real-time descriptor called Body-part Directi...
详细信息
This paper introduces a novel approach for early recognition of human actions using 3D skeleton joints extracted from 3D depth data. We propose a novel, frame-by-frame and real-time descriptor called Body-part Directional Velocity (BDV) calculated by considering the algebraic velocity produced by different body-parts. A real-time Hidden Markov Models algorithm with Gaussian Mixture Models state-output distributions is used to carry out the classification. We show that our method outperforms various state-of-the-art skeleton-based human action recognition approaches on MSRAction3D and Florence3D datasets. We also proved the suitability of our approach for early human action recognition by deducing the decision from a partial analysis of the sequence.
In this work, we set the bases of the integration of ambient intelligence (AmI) with mobile robot teams (MRT), aiming to enhance ambient assisted living services addressing a variety of tasks. We argue that people wit...
详细信息
In this work, we set the bases of the integration of ambient intelligence (AmI) with mobile robot teams (MRT), aiming to enhance ambient assisted living services addressing a variety of tasks. We argue that people with reduced mobility can benefit from a synergy between AmI and MRT in various aspects. Towards this direction, we identify principal functionalities such an integrated system should provide in connection to relevant previous works and the way by which synergy could be accomplished, from low-level behavioural to higher-level task planning of a multi-layered system architecture.
In this work, we evaluated the performances of an adaptive and online clustering algorithm (Self-Adaptive Kernel Machine - SAKM) adjusted for the automatic and online recognition of attacks on wi-fi communication (802...
详细信息
In this work, we evaluated the performances of an adaptive and online clustering algorithm (Self-Adaptive Kernel Machine - SAKM) adjusted for the automatic and online recognition of attacks on wi-fi communication (802.11n protocol). The results presented here are part of a wider project dealing with wi-fi system monitoring. The radio waves are easy to listen. Due to the quick evolution in the available attacks, the use of learning algorithm cannot cover all configurations. Online clustering constructs evolving models without knowledge of the different cases to discriminate and is therefore well suited to this type of problematic. Based on SVM and kernel methods, the SAKM algorithm uses a fast adaptive learning procedure to take into account variations over time.
With the continued success of the open RISC-V architecture, practical deployment of RISC-V processors necessitates an in-depth consideration of their testability, safety and security aspects. This survey provides an o...
With the continued success of the open RISC-V architecture, practical deployment of RISC-V processors necessitates an in-depth consideration of their testability, safety and security aspects. This survey provides an overview of recent developments in this quickly-evolving field. We start with discussing the application of state-of-the-art functional and system-level test solutions to RISC-V processors. Then, we discuss the use of RISC-V processors for safety-related applications; to this end, we outline the essential techniques necessary to obtain safety both in the functional and in the timing domain and review recent processor designs with safety features. Finally, we survey the different aspects of security with respect to RISC-V implementations and discuss the relationship between cryptographic protocols and primitives on the one hand and the RISC-V processor architecture and hardware implementation on the other. We also comment on the role of a RISC-V processor for system security and its resilience against side-channel attacks.
暂无评论