An effective NDT (Non-Destructive Testing) image analysis technique for detecting materials damage and defects existence has been developed successfully and applied to PVT images of composite structures. The developed...
详细信息
An effective NDT (Non-Destructive Testing) image analysis technique for detecting materials damage and defects existence has been developed successfully and applied to PVT images of composite structures. The developed technique is based on converting an image to its equivalent pixel values and then applying Search Through (ST) algorithm to the converted image such that the presence of damage in the composite structure and its extent can be easily verified. The technique has a novel approach to data analysis by employing intensity, RGB signal re-mix. and wavelength variation of a thermally generated IR-beam onto the specimen under test which can be sensed and displayed on a computer screen as an image. Specimen inspection and data analysis are carried out through pixel level re-ordering and shelving techniques within a transformed image file using a sequence grouping and regrouping software system, which is specifically developed for this work.
ICA (Independent Component Analysis) can separate unknown source signals from their mixture signals without information on the transfer functions, provided that the sources are statistically independent. When the numb...
详细信息
ICA (Independent Component Analysis) can separate unknown source signals from their mixture signals without information on the transfer functions, provided that the sources are statistically independent. When the number of the source signals is equal to that of the observed signals, the original sources can be recovered except for indeterminacy of scale and permutation. However, the number of the sources is unknown in a real environment. In this paper, we propose an estimation method for the number of the sources based on the joint distribution of the observed signals under two-sensor configuration. From several simulation results, it is found that the number of the sources is coincident to that of peaks in the histogram of the distribution
In this paper we present the parallelization process of the AES algorithm (Rijndael) based on loop-level parallelism along with the description of exploited parallelization tools. The data dependence analysis of the m...
详细信息
In this paper we present the parallelization process of the AES algorithm (Rijndael) based on loop-level parallelism along with the description of exploited parallelization tools. The data dependence analysis of the most time-consuming loops and appropriate loop transformations were applied in order to parallelize the sequential algorithm. The OpenMP standard was chosen for representing the parallelism of the AES algorithm. Speed-up measurements for a parallel program are presented. A strategy of the parallelization process of the standard modes of operation for the AES algorithm is also described.
Testing is important and gives the confident to the developer and user; but it is expensive and may consume at least 50% of the total costs involved in developing software. This cost is just for a normal application b...
详细信息
Testing is important and gives the confident to the developer and user; but it is expensive and may consume at least 50% of the total costs involved in developing software. This cost is just for a normal application but if it involves extreme and critical software, the number might increases. As we know, designing test suite for testing is a tedious and meticulous work. We need to have a deep understanding of the program before we could design a good test suite and even an expert tends to miss some test cases. Manual testing for large-scale program is very expensive and frustrating for humans. The same scenario applies in visual programming language (VPL). Visual programming (VP) is a much complex program than conventional one. Testing VP program give users the confidence on what they visualize is correctly transformed according to their perception. Most studies in designing test suites are using requirement specification, complex technique (i.e. Z) and third-party tools that require novices and non-expert user to supply information that is not familiar to them. It is certain that the information they supplied is more or less inaccurate and thus affects the test suite produced. Furthermore, there are no standard structures in exchanging the data about a program. The objective of this paper is to propose an XML-based test case language called test case markup language (TCML).
H.264 is the new multimedia compression standard developed by VCEG and MPEG. In order to maximize the compression performance, H.264 adopts RDO mode decision techniques at the cost of very remarkable computational com...
详细信息
A new concurrency control protocol for parallel Btree structures, MARK-OPT, is proposed. MARK-OPT marks the lowest structure-modification-operation (SMO) occurrence point during optimistic latch coupling operations, t...
详细信息
Evolutionary programming (EP) is one of the main classes of evolutionary algorithms (EAs). Improving existing EAs is necessary in order to achieve better results and overcome their costly computational complexity. In ...
详细信息
Evolutionary programming (EP) is one of the main classes of evolutionary algorithms (EAs). Improving existing EAs is necessary in order to achieve better results and overcome their costly computational complexity. In this paper, we present a new version of EP called Directed Evolutionary programming (DEP) in which more directing strategies with learned termination criteria are invoked to overcome some drawbacks of EP. In DEP, the mutated children are given the chance to improve themselves with the guidance of their parents. The search process in DEP is supported by diversification and intensification schemes in order to keep the diversity, achieve faster convergence and equip the search with an automatic termination criteria. The computational experiments show that DEP is efficient and cheaper than some well-known versions of EP.
As data integration over the Web has become an increasing demand, there is a growing desire to use XML as a standard format for data exchange. For sharing their grammars efficiently, most of the XML documents in use a...
详细信息
Neuronal activities related to context-dependent recall have been found in the monkey inferotemporal cortex. If we set the same task for an artificial neural network, however, a serious computational difficulty arises...
详细信息
Neuronal activities related to context-dependent recall have been found in the monkey inferotemporal cortex. If we set the same task for an artificial neural network, however, a serious computational difficulty arises. In the present paper, we overcome this difficulty by implementing a novel method of contextual modulation, termed selective desensitization, and construct a neural network model that performs the same context-dependent memory task as that assigned to the monkey. The model, being consistent with the anatomical structure of the inferotemporal lobe, as well as with physiological findings, not only reproduces the empirical data well but also gives a clear account for a phenomenon that had not been explicable to date. This strongly suggests that the brain implements context-dependent recall based on the same principle as adopted in the model.
Optimization requirements often include finding various solutions and search under muti-objective situations. A maintaining diversity of individuals is one of the effective approaches to meet the requirements. Our res...
详细信息
Optimization requirements often include finding various solutions and search under muti-objective situations. A maintaining diversity of individuals is one of the effective approaches to meet the requirements. Our research aims to maintain the diversity. We also propose a fuzzy clustering based selection method to maintain the diversity and apply the selection method to genetic algorithm (GA). The selection method determines the individual selection probabilities based on fitness values and membership values, which are given by a fuzzy clustering. Here, a preparing a sub-population is one of the effective ways to maintain the diversity. The proposed selection method is treated as a getting the sub-population method by the fuzzy clustering. We also discuss about behavior and search capability of the GA with the proposed selection method via some simulations. Based on results of the simulations, we were able to find out that the GA makes the individuals widely distributed in a solution space.
暂无评论