In this paper Group Method of Data Handling (GMDH) technique is implemented and applied to the system identification problem of a Magneto-Rheological (MR) damper. GMDH networks are used to approximate the forward and ...
详细信息
Sensor networks are being used in several emerging applications not even imagined some years ago due to advances in sensing, computing, and communication techniques. However, these advances also pose various challenge...
详细信息
The Alzheimer's disease has become the most frequent cause of dementia in the last few years, and it is responsible, alone or in association with other diseases, for 50% of the cases in western countries. The main...
详细信息
The Alzheimer's disease has become the most frequent cause of dementia in the last few years, and it is responsible, alone or in association with other diseases, for 50% of the cases in western countries. The main focus of this work is to develop a multicriteria model for aiding in decision making on the diagnosis of Alzheimer's disease by using the Aranau Tool, structured on the Verbal Decision Analysis. In this work, the modeling and evaluation processes were conducted with the aid of a medical expert, bibliographic sources and questionnaires. The questionnaires taken into account were based mainly on patients' neuroimaging tests, and we analyzed wheter or not there were problems in the patients' brain that could be relevant to the diagnosis of Alzheimer's disease.
Studies indicate that making learners feel good is important only minor to clear knowledge transformation. Many studies have tried to use virtual humans as a part of interface in learning systems to increase the effec...
详细信息
ISBN:
(纸本)9781605587578
Studies indicate that making learners feel good is important only minor to clear knowledge transformation. Many studies have tried to use virtual humans as a part of interface in learning systems to increase the effect of instructions. Based on social interaction and pedagogical theories, many e-learning systems use animated films or virtual reality to boost human-computer engagement and ease their negative emotions. However, affective learning systems still need much research to improve their functionalities and usability. This study proposed a convenient approach to develop an emotionally interactive learning system;learners can express their emotions by mouse-clicking while learning. A virtual human was created to empathically react to learners in proactive and reactive ways to encourage and persuade them into persistent learning and help achieve their goals. Experimental results show that, averagely, subjects can tell virtual human's emotions and agree to its empathic reactions. Persuasion conducted by virtual human could not increase subjects' learning time, but could significantly increase their completion rate of exercises. Copyright 2009 ACM.
The decentralization of corporate policy administration aiming to maintain the unified management of user permissions is a hard task. The heterogeneity and complexity of corporate environments burdens the security adm...
详细信息
The decentralization of corporate policy administration aiming to maintain the unified management of user permissions is a hard task. The heterogeneity and complexity of corporate environments burdens the security administrator with writing equally complex policies. This paper proposes an architecture based on Web Services, policy provisioning, and authorization certificates, to build up a loosely coupled unified administrative control for corporate environments. A certificate-based permission management scheme is used to derive new policies in the local domains of each branch. These new policies will update the corporate repository which, in turn, will configure the corresponding policies in the local domains of each branch. The Web Services technology provides the underlying protocols for the development of a prototype which shows the feasibility of our proposal.
The goal of this research study was to develop a music therapy tool using a computer-generated harp which could provide users with visual, audio, and haptic feedback during interaction with the virtual instrument. Rea...
详细信息
Wireless Sensor Network (WSN) is a network of sensors that has a very large scale of nodes with a tight resources limitation. WSN is application specific, with a wide range of applications in military, survey, industr...
详细信息
ISBN:
(纸本)9781424455317;9781424455324
Wireless Sensor Network (WSN) is a network of sensors that has a very large scale of nodes with a tight resources limitation. WSN is application specific, with a wide range of applications in military, survey, industrial, up to home usage. The major problems for WSN are resource limitations and dynamic network, which require unique algorithms for unique applications. Our study focused on the implementation and the characterization of the Gravity algorithm, with the Flooding algorithm as a comparison. The Gravity algorithm uses the gravity weight which is stored on each node to form a virtual contour. This contour will guide the message to reach the sink. This work is the first implementation of the Gravity model in OMNeT++. Simulations conducted in the full mesh and the layered topology show that the Gravity algorithm uses less energy and a higher diversity factor compared to the Flooding algorithm. A similar result is also acquired when the probability of failures are considered. The result shows that the Gravity algorithm outperforms the Flooding algorithm while still maintaining the simplicity of the algorithm. This is important to a WSN which is resources limited. Only a small amount of memory is needed for the gravity weight calculation and storage.
We present a model for the certification of trust in multi-agent systems based on encryption. The objective is to raise the level of efficiency that client agents have when contracting specialized service agents. We m...
详细信息
ISBN:
(纸本)9781424435340
We present a model for the certification of trust in multi-agent systems based on encryption. The objective is to raise the level of efficiency that client agents have when contracting specialized service agents. We make three hypotheses: (i) client agents are able to measure and inform the quality of a service they receive from a service agent; (ii) distributed certificate control is possible because every service agent stores the certificates it receives from its client agents and, (iii) the content of a certificate can be considered safe as long as the public and private keys used to encrypt the certificate remain safe. This approach reduces some weak points of trust models that rely on the direct interaction between service and client agents (direct trust) or those that rely on testimony obtained from client agents (propagated trust). Simulation showed that encrypted certificates of trust improved the efficiency of client agents when choosing their service provider agents. The reason seems to be that the reputation of a given service provider agent is based on the reputation it has among the totality of client agents that used its services.
This paper presents the development of an intelligent agent used to assist vehicle drivers. The agent has a set of resources to generate its action policy: road and vehicle features and a knowledge base containing con...
详细信息
ISBN:
(纸本)9781424435340
This paper presents the development of an intelligent agent used to assist vehicle drivers. The agent has a set of resources to generate its action policy: road and vehicle features and a knowledge base containing conduct rules. The perception of the agent is ensured by a set of sensors, which provide the agent with data such as speed, position and conditions of the brakes. The main agent behaviour is to carry out action plans involving: increase, maintain or reduce speed. The main effort of this research was the induction of conduct rules from data of previous trips. These rules form a classifier used for the selection of actions forming the conduction plan. Results observed with the experiments have showed that the proposed classifier increases the efficiency throughout the conduction of vehicles.
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distributio...
详细信息
ISBN:
(纸本)9780889868021
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services require secure multicast to protect integrity and confidentiality of the group traffic, and validate group member's authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose an anonymous group key management with ID-based Signature and secret sharing technologies to distribute a new group key securely to each participant of a group with only one rekey message whenever the group membership changes. The key management guarantees that a legal user, without revealing his/her real identity, can join a group after finishing the mutual authentication with the group initiator, and enforces the forward secrecy and backward secrecy.
暂无评论