The calculation of short-circuit currents in DC auxiliary systems of power plants and substations is essential for design and application of distribution and protective devices used in these systems. Because of differ...
详细信息
ISBN:
(纸本)9781424422913
The calculation of short-circuit currents in DC auxiliary systems of power plants and substations is essential for design and application of distribution and protective devices used in these systems. Because of differences between DC and AC auxiliary systems, DC system protection designers should be take into account that important fact in calculation and dimensioning of DC auxiliary system. There are several mathematical models that are usually used for calculation of short-circuit currents in DC auxiliary system. In this paper, the authors performed short-circuit currents calculation for one real DC auxiliary system of power plant using three different, well-known, mathematical models. The results of calculations were compared with results given by testing of selectivity of DC auxiliary system on the site. Based on comparison results of different calculations and testing on the site conclusion related to choice one of three the most often used mathematical models as the most suitable has deduced.
In recent years, computer-generated interactive virtual characters, called Embodied Conversational Agents (ECAs), are subjects of considerable ongoing research. Nevertheless, their conversational abilities are mediocr...
详细信息
The interactive STANDUP software was developed to provide children who use augmentative and alternative communication (AAC) with a "language playground." The software provides appropriate functionality for u...
详细信息
In this paper we discuss one relatively hidden but important issue related to information systems development - weak integration of performing and managing the information systems development. Among others, two causes...
详细信息
This document proposes an approach for financial statements' anomalies detection by using on-line evolving clustering. Official records of the financial activities of a business are called financial statements and...
详细信息
This document proposes an approach for financial statements' anomalies detection by using on-line evolving clustering. Official records of the financial activities of a business are called financial statements and they are recorded in journals and general ledger in a supervised process. Anomalies in financial statements are caused by human mistakes during forming of financial statements, or as a result of changes in the software that produced un-expected errors, or as possible financial fraud.
Data migration within storage cloud is complicated due to the necessity of scaling the cloud. Dividing migration is proposed to speed up scaling. Migration is divided into scaling and residual migration. The problem o...
详细信息
Data migration within storage cloud is complicated due to the necessity of scaling the cloud. Dividing migration is proposed to speed up scaling. Migration is divided into scaling and residual migration. The problem of data migration within storage cloud is defined as a multi-criterion optimization problem of data relocation plan. The main criterion of the optimization is scaling speed. The second criterion is residual migration speed. In general, the problem of data migration is NP-hard. Polynomial time approximation algorithm is presented in this article. The another result of this work is a prove of optimality algorithm by the first criterion.
In this paper we describe our approach to realize a pervasive (computing) learning environment for children based on augmented toys: traditional toys that are equipped with pervasive computing technologies and can thu...
详细信息
In this paper we describe our approach to realize a pervasive (computing) learning environment for children based on augmented toys: traditional toys that are equipped with pervasive computing technologies and can thus be linked with virtual information such as educational content. We report on our experiences building and deploying the Augmented Knight's Castle, an augmented toy environment that allows for learning about the Middle Ages in a playful way. We demonstrate and discuss how educational content is provided in such an environment and describe the design of the underlying infrastructure.
Whilst techniques for narrative generation and agent behaviour have made significant progress in recent years, natural language processing remains a bottleneck hampering the scalability of Interactive Storytelling sys...
详细信息
Whilst techniques for narrative generation and agent behaviour have made significant progress in recent years, natural language processing remains a bottleneck hampering the scalability of Interactive Storytelling sys...
详细信息
ISBN:
(纸本)9781615673346
Whilst techniques for narrative generation and agent behaviour have made significant progress in recent years, natural language processing remains a bottleneck hampering the scalability of Interactive Storytelling systems. This demonstrator introduces a novel interaction technique based solely on emotional speech recognition. It allows the user to use speech to interact with virtual actors without any constraints on style or expressivity, by mapping the recognised emotional categories to narrative situations and virtual characters feelings.
Recently association rule mining algorithms are using to solve data mining problem in a popular manner. Rule based mining can be performed through either supervised learning or unsupervised learning techniques. Among ...
详细信息
Recently association rule mining algorithms are using to solve data mining problem in a popular manner. Rule based mining can be performed through either supervised learning or unsupervised learning techniques. Among the wide range of available approaches, it is always challenging to select the optimum algorithm for rule based mining task. The aim of this research is to compare the performance between the rule based classification and association rule mining algorithm based on their rule based classification performance and computational complexity. We consider PART (Partial Decision Tree) of classification algorithm and Apriori of association rule mining to compare their performance. DARPA (Defense Advanced Research Projects Agency) data is a well-known intrusion detection problem is also used to measure the performance of these two algorithms. In this comparison the training rules are compared with the predefined test sets. In terms of accuracy and computational complexity we observe Apriori is a better choice for rule based mining task.
暂无评论