Story telling is a process of conveying events by words, images and sounds. It has been used in every culture as a means of entertainment, education or for instilling moral values. The power of story telling has now b...
详细信息
As a virtual experimental device for analysis and calculation of grown-in microdefects formation in undoped silicon dislocation-free single crystals the software is proposed. The software is built on the basis on diff...
详细信息
As a virtual experimental device for analysis and calculation of grown-in microdefects formation in undoped silicon dislocation-free single crystals the software is proposed. The software is built on the basis on diffusion model of formation, growth and coalescence of grown-in microdefects. Diffusion model describes kinetics of defect structure changes during cooling after growth on crystallization temperature to room temperature. The software allows the use of personal computer to investigate the defect structure of dislocation-free silicon single crystals with a diameter on 30 mm to 400 mm grown by floating-zone and Czochralski methods.
In this paper, we present the LearnLib, a library of tools for automata learning, which is explicitly designed for the systematic experimental analysis of the profile of available learning algorithms and corresponding...
详细信息
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be re...
详细信息
ISBN:
(纸本)1601320752
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be regarded as classification problem, we use Artificial Neural networks for detection. Using a benchmark study and set from the KDD (Knowledge Data Discovery and Data Mining) competition designed by DARPA and Multi-layered perceptron neural network, this Paper will aim to solve a multi class problem using MLP in to distinguish the attack records from normal ones, and also identify the attack type. In addition, it shows how to use Tikhonov regularization parameter to optimize the optimal network architecture in order to increase the system performance. The results show that the designed system is capable of classifying records with 98.34% accuracy with two hidden layers of neuron. Finally, the performance of the benchmark study is compared with our results.
We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex...
详细信息
This paper presents an Ontology-based health care information extraction system - VnHIES. In the system, we develop and use two effective algorithms called "Semantic Elements Extracting Algorithm" and "...
详细信息
The skeleton computing the distributed elementwise processing in D-Clean splits the input data, then applies an elementwise process-able function on the divided input, and finally composes the result from the already ...
详细信息
ISBN:
(纸本)9789634639251
The skeleton computing the distributed elementwise processing in D-Clean splits the input data, then applies an elementwise process-able function on the divided input, and finally composes the result from the already computed subresults. This paper presents improvements and refinements of the generalized skeleton implementation. The distributed and functional skeleton of the elementwise processing is implemented using the D-Clean coordination language with a new technique.
作者:
Y. WakasaY. YamamotoDept. of Applied Analysis and Complex Dynamical Systems
Graduate School of Informatics Kyoto University Kyoto Japan. Yuji Wakasa was born in Okayama
Japan in 1968. He received the B.S. and M.S. degrees in engineering from Kyoto university Japan in 1992 and 1994 respectively. From 1994 to 1998 he was a Research Associate in the Department of Information Technology Okayama University. Since April 1998 he has been a Research Associate in the Graduate School of Informatics Kyoto University. His current research interests include robust control and control system design via mathematical programming. Yutaka Yamamoto received his B.S. and M.S. degrees in engineering from Kyoto University
Kyoto Japan in 1972 and 1974 respectively and the M.S. and Ph.D. degree in mathematics from the University of Florida in 1976 and 1978 respectively. From 1978 to 1987 he was with Department of Applied Mathematics and Physics Kyoto University and from 1987 to 1997 with Department of Applied System Science. Since 1998 he is a professor at the current position. His current research interests include realization and robust control of distributed parameter systems learning control sampled-data systems and digital signal processing. Dr. Yamamoto is a receipient of the Sawaragi memorial paper award (1985) the Outstanding Paper Award of SICE (1987) Best Author Award of SICE (1990) the George Axelby Outstanding Paper Award of IEEE CSS in 1996 Takeda Paper Prize of SICE in 1997. He is a Fellow of IEEE. He was an associate editor of Automatica. He is currently an associate editor of IEEE Transactions on Automatic Control Systems and Control Letters and Mathematics of Control Signals and Systems. He is a member of the IEEE the Society of Instrument and Control Engineers (SICE) and the Institute of Systems Control and Information Engineers.
This paper presents a design method of control systems such that a designer can flexibly take account of tradeoffs between evaluated uncertainty ranges and the level of control performance. The problem is reduced to a...
详细信息
This paper presents a design method of control systems such that a designer can flexibly take account of tradeoffs between evaluated uncertainty ranges and the level of control performance. The problem is reduced to a BMI problem and approximately solved by LMIs. The convergence of the proposed approximation is proved in a modified sense. A numerical example shows the effectiveness of the proposed method in comparison with the standard robust control.
暂无评论