The aim of this article is to develop optical aberration correcting methods using adaptive optics for co focal microscopy in imaging systems. In order to compensate the aberrations, a dynamic element, consisting of a ...
详细信息
The aim of this article is to develop optical aberration correcting methods using adaptive optics for co focal microscopy in imaging systems. In order to compensate the aberrations, a dynamic element, consisting of a deformable mirror, was used. The correction is performed by controlling the surface of the deformable mirror, in order to improve the overall system image resolution. Moreover, the wave front sensor less system case was considered. By combining the automaticcontrol algorithms with the physics laws, quite accurate estimations can be obtained, while testing several different scenarios.
This paper presents a novel document clustering algorithm that represents documents as a time series of words. Document clustering is very important due to the fact that it permits us to group them based on some certa...
详细信息
This paper presents a novel document clustering algorithm that represents documents as a time series of words. Document clustering is very important due to the fact that it permits us to group them based on some certain criteria, especially nowadays when a large number of articles are available. The timed series representation of the document instead of the vector model permits us to consider a new algorithm for the computation of the distance between documents: dynamic time warping. This novel representation together with the dynamic time warping algorithm represents the foundation for computing the similarity and the clustering of the documents. The clustering algorithm used is hierarchical clustering. This novel clustering method of texts is applied on named entities and on the parts of speech of the words that compose the documents. As test data we are using the Reuters corpus of newspaper articles.
The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous systems. Adding the current dynamic and complex cyber...
详细信息
The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous systems. Adding the current dynamic and complex cyber threats in this context, make it clear that new security solutions are needed. In this paper we propose a wrapper feature selection approach that combines two machine learning algorithms with an improved version of the Binary Bat Algorithm. Tests on the NSL-KDD dataset empirically prove that our proposed method can reduce the number of features with almost 60% and obtains good results in terms of attack detection rate and false alarm rate, even for unknown attacks.
In light of the rapid development of network technology, the general concept of software requires redefinition. New opportunities provided by broadband networking, distributed processing, and available network resourc...
详细信息
Nowadays, novel construction materials, more efficient power supplies and advanced artificial intelligence algorithms allow one to use unmanned aerial vehicles (UAV) in various fields of life. One of the biggest event...
详细信息
ISBN:
(纸本)9781479987023
Nowadays, novel construction materials, more efficient power supplies and advanced artificial intelligence algorithms allow one to use unmanned aerial vehicles (UAV) in various fields of life. One of the biggest events promoting this idea is the Air Cargo Challenge (ACC) competition. In this paper the motivation for ACC participation and the overall procedure of CAD aided UAV design are presented. The nonlinear aircraft model as well as Computational Fluid Dynamic simulations are discussed. Finally, some details concerning designed UAV prototype are revealed.
Agents aimed at accomplishing task specific goals require reasoning and learning capabilities;their internal architecture is built using artificial intelli- gence techniques like problem solving, knowledge representat...
详细信息
Agents aimed at accomplishing task specific goals require reasoning and learning capabilities;their internal architecture is built using artificial intelli- gence techniques like problem solving, knowledge representation or planning. But agents aimed at interacting with human users are expected to know more than that: they need to show believable behavior and social abilities. Emotions, with their influence on behavior and cognitive processes, are able to provide the required abilities. We believe that modeling human emotional mechanisms as faithfully as possible makes an agent suitable for performing in a human-agent interaction en- vironment. In this paper we present such an architecture, which aims at modeling the human affective mechanisms of primary and secondary emotions, personality and resource usage. The agent is integrated in a human-agent interaction sce- nario, showing how its affect infuences its behavior and the activities during a lesson in an e-learning system.
The e-Healthcare system can be improved greatly by involving of latest information technology. However now in absent and developing nations, conventional sheet built a system that applied in healthcare. In the sector ...
详细信息
ISBN:
(纸本)9781467375467
The e-Healthcare system can be improved greatly by involving of latest information technology. However now in absent and developing nations, conventional sheet built a system that applied in healthcare. In the sector of healthcare besides other business fields, cloud computing is evolving as a new computing model. Among the developing countries, Iraq is attempting to change to electronic health records utilizing services of cloud computing. Cloud computing is the emerging technology can be utilized to build up a composite network to enhance the system. Therefore, this paper recommended a model of designing flexible e-healthcare management system based on Cloud Computing and Service Oriented Architecture (SOA). Cloud and SOA are becoming ubiquitous nowadays. However, their applications are deployed in this area and desired to appear various period stringent also workable conditions. The suggested system has been improved and includes various fractions to develop healthcare system. Rich Internet Application (RIA) based on the client side, simple database cloud server and application side leads to achieving a scheme that creates a readily attainable network. Finally, the system proposed improves cost management, time, storing patients profile and taking the right doctor decision.
Ambient Intelligence is an active research field that studies embed- ding computing elements into the environment - Weiser's concept of disap- pearing computer. Practical experiments are complex to orchestrate, be...
详细信息
Ambient Intelligence is an active research field that studies embed- ding computing elements into the environment - Weiser's concept of disap- pearing computer. Practical experiments are complex to orchestrate, because of the technical expertise required in hardware, software engineering and machine learning. The entry barrier for running such an experiment is very high, requiring coordinated e orts at all levels in a research team, and an actual laboratory with sensors in order to collect the data. In this work, we show how the power of Amazon's EC2 cloud can be lever- aged in conjunction with a record and replay system for sensor data in order to allow researchers from anywhere in the world to run such experiments. The software infrastructure used for the experiments is open-source and freely available at https: // github. com/ ami-lab/ AmI-Platform . This platform is used in the AmI Laboratory (EF 210) of the University Po- litehnica of Bucharest.
Smart Grid is the future of electricity based on information and telecommunication technology. This article presents the characteristics of the new technological developments in this field, some of the standards inclu...
详细信息
Smart Grid is the future of electricity based on information and telecommunication technology. This article presents the characteristics of the new technological developments in this field, some of the standards included in it, along with several implementation strategies. The validity of the novel proposed approach was demonstrated by simulation with a dedicated module which allows checking how each part of the architecture responds to various case studies. Taking into account the novelty of the subject, this paper brings new opportunities to explore and develop this subject.
Infrared modulated signals are widely used in remote controls of common household appliances, as well as in business and public places. However, the transmission is not encrypted in any form, and can easily be interce...
详细信息
Infrared modulated signals are widely used in remote controls of common household appliances, as well as in business and public places. However, the transmission is not encrypted in any form, and can easily be intercepted and stored for future control of the appliance. This paper explains the functioning of a portable device which can intercept infrared (IR) signals and retransmit them when needed. The device was designed to include multiple functions, have a small number of buttons, and also to be portable, making it a functional keyring. As an added feature, the device can emit an infrared jamming signal, disabling any other user's commands. Finally, we created a small, low power, reliable device that can easily duplicate infrared codes. This makes the device a portable IR security penetration tool that can take over an appliance or disable its remote control.
暂无评论