Mathematical models are often used in system identification applications. The dynamics of most systems, however, change over time and the sources of these changes cannot always be directly determined or measured. To m...
详细信息
We have proposed a checklist-based usability inspection technique (WDP - Web Design Perspectives-Based Usability Evaluation) specific for Web applications' usability evaluation and we are following an experimentat...
详细信息
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ...
详细信息
This work extends Propositional Dynamic Logic (PDL) with parallel composition operator and four atomic programs which formalize the storing and recovering of elements in data structures. A generalization of Kripke sem...
详细信息
The development of artificial intelligence(AI) and the mining of biomedical data complement each other. From the direct use of computer vision results to analyze medical images for disease screening, to now integratin...
The development of artificial intelligence(AI) and the mining of biomedical data complement each other. From the direct use of computer vision results to analyze medical images for disease screening, to now integrating biological knowledge into models and even accelerating the development of new AI based on biological discoveries, the boundaries of both are constantly expanding, and their connections are becoming closer.
The need for safe operation and effective maintenance of pipelines grows as oil and gas demand ***,it is increasingly imperative to monitor and inspect the pipeline system,detect causes contributing to developing pipe...
详细信息
The need for safe operation and effective maintenance of pipelines grows as oil and gas demand ***,it is increasingly imperative to monitor and inspect the pipeline system,detect causes contributing to developing pipeline damage,and perform preventive maintenance in a timely ***,pipeline inspection is performed at pre-determined intervals of several months,which is not sufficiently robust in terms of *** research proposes a drone and artificial intelligence reconsolidated technological solution(DARTS) by integrating drone technology and deep learning *** solution is aimed to detect the targeted potential root problems-pipes out of alignment and deterioration of pipe support system-that can cause critical pipeline failures and predict the progress of the detected problems by collecting and analyzing image data *** test results show that DARTS can be effectively used to support decision making for preventive pipeline maintenance to increase pipeline system s afety and resilience.
In this paper, we propose an alternative QoS architecture for the IEEE 802.16 Standard, that incorporates a priority based packet scheduling and a new traffic shaping. For this, we present the ideas of a traffic condi...
详细信息
ISBN:
(纸本)1595934561
In this paper, we propose an alternative QoS architecture for the IEEE 802.16 Standard, that incorporates a priority based packet scheduling and a new traffic shaping. For this, we present the ideas of a traffic conditioner based on concept of "Fair Marker".
IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to deter...
详细信息
Software product lines, usually described using feature models, have proven to be a feasible solution to develop mobile and context-aware applications. These applications use con- text information to provide services ...
详细信息
ISBN:
(纸本)9781450313094
Software product lines, usually described using feature models, have proven to be a feasible solution to develop mobile and context-aware applications. These applications use con- text information to provide services and data for their users from anywhere and at any time. However, building feature models for mobile and context-aware software product lines demands advanced skills of software engineers, since it comprises system and context information. Moreover, to guarantee a correct application execution, these models must be thoroughly specified, composed and verified to check whether some composition and adaptation rules are violated. Although this is an important task, there is a lack of formalization of such rules, which makes it difficult to use those rules for feature models verification. In this paper, we propose an approach to prevent defects in context-aware feature models and in their product reconfiguration based on formal methods. To validate our work, we developed a prototype to check the correctness of context-aware feature models. Copyright 2012 ACM.
Under-resourced automatic speech recognition (ASR) has become an active field of research and has experienced significant progress during the past decade. However, the performance of under-resourced ASR trained by exi...
详细信息
暂无评论