In today's economy, it is crucial to optimize the resources used in agriculture, especially when the everyone goal is to get a high yield, with a higher profit, at a low cost as possible. Taking into account this ...
详细信息
In today's economy, it is crucial to optimize the resources used in agriculture, especially when the everyone goal is to get a high yield, with a higher profit, at a low cost as possible. Taking into account this context, the paper presents an architectural model for a Wireless Sensor Network, as a part of an Agricultural Geographic Information System, and describes the main components, the types of sensor used in this Wireless Sensor Network and three different ways to use them. In additional, ontology for Agricultural Geographic Information System is proposed, having the aim to offer a common view and to facilitate the understanding of the knowledge.
For the visually impaired people, navigating in unfamiliar environments represents a considerable challenge. In recent years, virtual reality based applications for the blind people have used the auditive channel as a...
详细信息
For the visually impaired people, navigating in unfamiliar environments represents a considerable challenge. In recent years, virtual reality based applications for the blind people have used the auditive channel as a way to convey perceptual and spatial information. This paper presents a sound localization experiment having the purpose of studying the orientation and mobility skills of 10 blindfolded subjects. Our research concluded that the use of the hearing sense as an alternate compensatory modality has a positive impact on the improvement of the localization skills and discrimination perceptual abilities in virtual reality based auditory environments.
Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers...
详细信息
Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers cannot recover pieces of the initial data with certainty, but this comes at the cost of data utility. Noise insertion leads to errors, and signal to noise ratio can become an issue. In such cases, current differential privacy mechanisms cannot inform the end user that the sanitized data might not be reliable. We propose a new differential privacy algorithm that signals the user when relative errors surpass a predefined threshold. This allows users running complex differential privacy algorithms, such as sequence processing or geographical data analysis, to improve utility through better management of large errors. We prove that our algorithm satisfies differential privacy, and perform a formal analysis of its performance. Finally, we provide guidelines on how to customize behaviour to improve results.
We investigate the numerical solution of a special type of descriptor continuous-time Riccati equation which is key to several problems in robust control formulated for a general system. We give necessary and sufficie...
详细信息
ISBN:
(纸本)9781467371605
We investigate the numerical solution of a special type of descriptor continuous-time Riccati equation which is key to several problems in robust control formulated for a general system. We give necessary and sufficient existence conditions together with computable formulas for both stabilizing and antistabilizing solutions in terms of an associated matrix pencil. Analytic formulas for computing normalized coprime factorizations of a general system are presented as a direct application.
The classical (non-adaptive) Dynamic Matrix control (DMC) algorithm is designed and tuned for a chosen operating point of the nonlinear plant. Hence, the performance of the control system may be deteriorated in a wide...
详细信息
The classical (non-adaptive) Dynamic Matrix control (DMC) algorithm is designed and tuned for a chosen operating point of the nonlinear plant. Hence, the performance of the control system may be deteriorated in a wide range of operating levels. The paper discusses a possibility of using an adaptive Dynamic Matrix control (DMC) for a hydraulic nonlinear plant. Depending on the current value of the process variable, the idea is to use linear spline interpolation to calculate the controller parameters that appear in the final form of equation for the control increment. As a result, it is possible to reduce the number of necessary calculations. Numerical simulations of the closed-loop system show that the adaptive DMC algorithm ensures satisfactory performance over a wide range of operating levels in comparison to the classical DMC tuned for a single operating point.
With the advent of portable and high density microelectronic devices, the minimization of power consumption in CMOS VLSI circuits is becoming a critical concern. An embedded system is a combination of electronic hardw...
详细信息
With the advent of portable and high density microelectronic devices, the minimization of power consumption in CMOS VLSI circuits is becoming a critical concern. An embedded system is a combination of electronic hardware and software and sometimes additional parts designed to perform a dedicated function. In many cases system (microprocessor) must monitor the amount of power it uses and take appropriate steps to save the battery life. There are several methods to save power consumption of microprocessor unit including: clock control, power-sensitive processors, low-voltage and circuit shutdown. The effect of reducing power consumption can be achieved either by hardware or software optimization. This paper presents the software level power consumption analysis of MCU, focusing mainly on instruction and data realization.
Paper deals with an algorithm which allows the automatic selection of the best operating point of biological system. This task is one of the subjects of research in the field of metabolic engineering, which deals with...
详细信息
The paper deals with an analysis of automaticcontrol system with continuous and discrete PID controllers. A method of tuning the parameters of the continuous controller is presented, which is optimal according to the...
详细信息
The paper deals with an analysis of automaticcontrol system with continuous and discrete PID controllers. A method of tuning the parameters of the continuous controller is presented, which is optimal according to the ITAE criterion. The behavior of control systems with discrete controllers whose parameters were tuned using the mentioned method are described. The impact of changes in the sampling period of controlled signal on the control quality is shown. Changes of the values of optimal parameters of discrete PID controllers in relation to changes of the sampling rate of controlled signal are characterized.
In this paper, the potential possibilities of robust tuning of the Balance-Based Adaptive controller (B-BAC) are discussed in terms of user-defined gain and phase margins. Considering the First Order + Dead Time (FOPD...
详细信息
ISBN:
(纸本)9781479917730
In this paper, the potential possibilities of robust tuning of the Balance-Based Adaptive controller (B-BAC) are discussed in terms of user-defined gain and phase margins. Considering the First Order + Dead Time (FOPDT) process to be controlled and starting from previously suggested simple B-BAC tuning method, the additional tuning parameter is introduced and its influence on the stability boundaries and on the robust tuning region is investigated, in comparison with the conventional PI controller. It is shown that the stability and robust tuning regions are larger for the B-BAcontroller and how the additional tuning parameter can be used for robust retuning of the B-BAcontroller.
The large number and various technological solutions adopted by many enterprises, overwhelms security systems, which must acquire informations from all these diverse sources and interpret them. Furthermore, the prolif...
详细信息
The large number and various technological solutions adopted by many enterprises, overwhelms security systems, which must acquire informations from all these diverse sources and interpret them. Furthermore, the proliferation of more complex cyber threats imposes a difficult task for information security assurance. Therefore, it is clear that new solutions are required. In this paper we propose a wrapper feature selection approach that combines an improved version of the Binary Bat Algorithm with two classifiers (C4.5 and SVM). We test our proposed model on the NSL-KDD dataset and empirically prove that our method can boost the performance of the classifiers and outperforms BBA and BPSO in terms of attack detection rate and false alarm rate, obtained after a fewer number of iterations. Furthermore, we reduced the number of features with almost 64% and improved the performances of the classifier, even for unknown intrusions.
暂无评论