Seamless simulation and rendering of realistic natural environments has the goals of modeling the terrain and placing large groups of plants in a manner that would generate a scene similar to what a viewer would see i...
详细信息
A correct diagnostics together with the early prediction of failure or malfunction of the system are the major issues in modern maintenance. Nowadays, the time-honored diagnostics may be inadequate and lead to omittin...
详细信息
A correct diagnostics together with the early prediction of failure or malfunction of the system are the major issues in modern maintenance. Nowadays, the time-honored diagnostics may be inadequate and lead to omitting failures, resulting in higher costs of repairing damaged equipment. That is why the interest in intelligent diagnostics increases due to the possibility of better interpretation of the component status and early failure prediction. One of the ways of determining the device condition is to measure and analyze the temperature of multiple points on the device. Thermographics may show a beginning of significant wear of a component, and enable a repair or replacing before the failure appears. The paper presents the key aspects of the diagnostics with thermal images, including: technology mapping, mapping algorithms, together with a presentation of available software solutions.
Seamless simulation and rendering of realistic natural environments has the goals of modeling the terrain and placing large groups of plants in a manner that would generate a scene similar to what a viewer would see i...
详细信息
Seamless simulation and rendering of realistic natural environments has the goals of modeling the terrain and placing large groups of plants in a manner that would generate a scene similar to what a viewer would see in real life. The placement of plants is derived automatically from real land cover classification (LCC) data which describes each area on the map as a single vegetation type. This work presents a method for solving the problem of plant distribution in transition areas between different vegetation classes by using the concept of linear diffusion in an arbitrary direction. In practice this direction can be determined by different climatic factors. Our proposed implementation can accurately process a high number of neighboring areas in real-time by using parallel processing on the graphics processing unit.
Evolutionary algorithms have become popular in the recent years as a general, simple, and robust technique that can be used when other optimization methods cannot be applied. Presently, there are a number of evolution...
详细信息
Evolutionary algorithms have become popular in the recent years as a general, simple, and robust technique that can be used when other optimization methods cannot be applied. Presently, there are a number of evolutionary/genetic algorithm libraries publicly available; however, they are not specifically designed for multiagent systems. The framework described in this paper addresses this problem and presents a general architecture for evolutionary optimization aimed to be used by agents in a multiagent system implemented in the JADE framework inspired from the island model of parallel genetic algorithms. The characteristics of evolutionary algorithms that are more appropriate for use in a distributed, cooperative multiagent environment are also identified.
Computational grids (CGs) have become an attractive research area as they suggest a suitable environment for developing large scale parallel applications. CGs integrate a large amount of distributed heterogeneous reso...
详细信息
Wireless networks rely greatly on security for authentication and confidentiality, due to the use of an open communication medium. The tendency to incorporate wireless capabilities in battery powered hand-held devices...
详细信息
Wireless networks rely greatly on security for authentication and confidentiality, due to the use of an open communication medium. The tendency to incorporate wireless capabilities in battery powered hand-held devices makes it difficult to enforce security because of computational resources and battery capacity limitations. One approach to this problem consists in adaptable security mechanisms: different security algorithms may be enforced at any given time, to assure a proper level of protection, while respecting constraints on power and resource consumption. This paper presents such a mechanism (CLASS), which uses a clustering scheme to setup homogenous security areas in the network. The scheme is based on the available energy at every node and on the individual security requirements. By proper assignment of the nodes and by proper selection of security, we show that our method significantly reduces the average energy consumption compared to a heterogeneous network.
This study is an attempt to take advantage of a cerebellar model to control a biomimetic arm. The cerebellar controller is a modified MOSAIC model which adaptively controls the arm. We call this model ORF-MOSAIC (Orga...
详细信息
Association Rule Mining (ARM) represents an important tool for Data Mining techniques. A key step in ARM is to determine the frequent itemsets present within the analyzed data. Recent algorithms addressing this proble...
详细信息
Association Rule Mining (ARM) represents an important tool for Data Mining techniques. A key step in ARM is to determine the frequent itemsets present within the analyzed data. Recent algorithms addressing this problem focus on identifying frequent itemsets without candidate generation steps. This paper details a new algorithm - Fast Itemset Miner (FIM for short) - that still relies on candidate generation stages, but has a different approach from the standard Apriori algorithm. This approach focuses on increasing size of the interval that candidates belong to, rather than increasing the size of the candidates by one with each corresponding iteration. By comparing the Apriori and FIM candidate generation stages, we show that this second approach uses a faster and more efficient method of determining candidate itemsets. Moreover, such an approach also favors a better support counting method, which greatly impacts on the overall time response of the FIM algorithm.
In this paper a visual self-localization method for a humanoid robot is presented. This one is based on monocular information. The goal of this method is to obtain the position (x; y) and orientation θ of the humanoi...
详细信息
In this paper a visual self-localization method for a humanoid robot is presented. This one is based on monocular information. The goal of this method is to obtain the position (x; y) and orientation θ of the humanoid robot inside the field of play. The methods proposed include some digital image processing algorithms and geometric interpretation to perform a 3D monocular reconstruction, that allows to measure the relative position between the robot and some known objects (goals and beacons), and to use them to obtain the robot's absolute position, by means of a triangulation method. Finally, the results obtained in Webots and in the real platform are presented.
In this paper, the authors do a comparative study of two methods to eliminate the static hazards from logical functions. The first method consists in determining the coupled terms and getting the term that masks the s...
详细信息
In this paper, the authors do a comparative study of two methods to eliminate the static hazards from logical functions. The first method consists in determining the coupled terms and getting the term that masks the static hazards, and the second method consists in determining the masking additional term by solving a system of Boolean equations. From the presented examples, the authors deduced that the 2 nd method (solving a Boolean equations system) is more advantageous because it eliminates the heuristic nature of the first method (the determination of coupled terms) and, by solving the equations system it determines all prime implicants that needs to be added to the function's expression.
暂无评论