The paper presents a symmetrical T-network utilizing fractional order elements. Fractional calculus was used for its modeling. A comparative analysis of a classic T-network and fractional order T-network step response...
详细信息
The paper presents a symmetrical T-network utilizing fractional order elements. Fractional calculus was used for its modeling. A comparative analysis of a classic T-network and fractional order T-network step responses was carried out for both no-load condition and short-circuit condition.
In recent years, methods from network science are gaining rapidly interest in economics and finance. A reason for this is that in a globalized world the interconnectedness among economic and financial entities are cru...
详细信息
The aim of the study was to determine the influence of the laser processing on the properties of electro-spark coatings. The properties were assessed by analyzing the coating microstructure, X-ray radiation, microhard...
The aim of the study was to determine the influence of the laser processing on the properties of electro-spark coatings. The properties were assessed by analyzing the coating microstructure, X-ray radiation, microhardness, corrosion resistance, porosity and tribological tests. In addition, the paper presents the results of measurements and analysis of electrical pulse during ESD. The tests were carried out on WC-Cu coating (the anode) obtained by electro spark deposition over carbon steel C45 (the cathode) and molten with a laser beam. The coatings were deposited by means of the EIL-8A and they were laser treated with the Nd:YAG. The tests show that the laser-treated electro-spark deposited WC-Cu coatings are characterized by lower hardness and friction force, higher seizure resistance, roughness. The laser treatment process causes the homogenization of the chemical composition, the structure refinement and the healing of microcracks and pores of the electro-spark deposited coatings. Laser treated electro-spark deposited coatings are likely to be applied in sliding friction pairs and as protective coatings.
Face photo-sketch synthesis aims at generating a facial sketch/photo conditioned on a given photo/sketch. It is of wide applications including digital entertainment and law enforcement. Precisely depicting face photos...
详细信息
In this paper, we present a software tool capable of predicting the final quality of triple play services by using the most common assessment metrics. The quality of speech and video in network environment is a growin...
详细信息
In this paper, we present a software tool capable of predicting the final quality of triple play services by using the most common assessment metrics. The quality of speech and video in network environment is a growing concern of all the internet service providers to carry the multimedia traffic without the excessive delays and losses, which degrade the quality of multimedia as it is perceived by the end users. Prediction mathematical model is based on results obtained from many performed testing scenarios simulating real behavior in the network. Based on the proposed model, speech or video quality is calculated with regard to policies applied for packet processing by routers and to the level of total network utilization. The application cannot only predict QoS parameters but also generate the source code of particular QoS policy setting according to the user interaction and apply the policy to the routers in the network. Contribution of the work consists of a new software tool enables network administrators and designers to improve and optimize network traffic efficiently.
We introduce a novel distributed control architecture for disturbances attenuation in heterogeneous platoons of linear and time-invariant autonomous agents that inherits the performance achievable by the leader-follow...
In recent decades, high-utility itemset mining (HUIM) has emerging a critical research topic since the quantity and profit factors are both concerned to mine the high-utility itemsets (HUIs). Generally, data mining is...
详细信息
In recent decades, high-utility itemset mining (HUIM) has emerging a critical research topic since the quantity and profit factors are both concerned to mine the high-utility itemsets (HUIs). Generally, data mining is commonly used to discover interesting and useful knowledge from massive data. It may, however, lead to privacy threats if private or secure information (e.g., HUIs) are published in the public place or misused. In this paper, we focus on the issues of HUIM and privacy-preserving utility mining (PPUM), and present two evolutionary algorithms to respectively mine HUIs and hide the sensitive high-utility itemsets in PPUM. Extensive experiments showed that the two proposed models for the applications of HUIM and PPUM can not only generate the high quality profitable itemsets according to the user-specified minimum utility threshold, but also enable the capability of privacy preserving for private or secure information (e.g., HUIs) in real-word applications.
A measurement-based statistical verification approach is developed for systems with partly unknown dynamics. Grey-box systems, which are specified as a model class, are subject to identification experiments that enabl...
详细信息
A measurement-based statistical verification approach is developed for systems with partly unknown dynamics. Grey-box systems, which are specified as a model class, are subject to identification experiments that enable accepting or rejecting system properties expressed as formulae in a linear-time logic with a given confidence. We employ a Bayesian framework for the computation of the confidence level and for the design of experiments to increase the confidence. The experiment design is formulated as a stochastic optimal control problem, which solvable via dynamic programming. Applied to linear control systems, this work enables efficient data-driven verification of partly-known dynamics with controllable non-determinism (inputs) and noisy output observations. A numerical case study concerning the safety of a dynamical system is used to elucidate this approach.
In this paper, we introduced a searching platform called BCISearch, a web-portal for the collection of molecular information linked to breast cancer using text mining technology including two types of information: sta...
详细信息
ISBN:
(纸本)9781509047963
In this paper, we introduced a searching platform called BCISearch, a web-portal for the collection of molecular information linked to breast cancer using text mining technology including two types of information: static and dynamic information, involving with six categories entities and their relationships: protein, DNA, RNA, Cell-type, Cell-line, Virus. BCISearch could search 248997 Proteins, 71358 DNA, 7724 RNA, 58891 Cell-line, 871 Virus, 31698 Cell-type. The BCISearch Experimental approach is promising for develop biomedical text mining technology. The BCISearch would assist researcher to understand breast cancer etiology in genetic factors. The searching platform is available at http://210.28.186.168:8080/BCISearch.
暂无评论