Aiming at the deficiencies of analysis capacity from different levels and fuzzy treating method in product function modeling of conceptual design, the theory of quotient space and universal triple I fuzzy reasoning me...
详细信息
Aiming at the deficiencies of analysis capacity from different levels and fuzzy treating method in product function modeling of conceptual design, the theory of quotient space and universal triple I fuzzy reasoning method are introduced, and then the function modeling algorithm based on the universal triple I fuzzy reasoning method is proposed. Firstly, the product function granular model based on the quotient space theory is built, with its function granular representation and computing rules defined at the same time. Secondly, in order to quickly achieve function granular model from function requirement, the function modeling method based on universal triple I fuzzy reasoning is put forward. Within the fuzzy reasoning of universal triple I method, the small-distance-activating method is proposed as the kernel of fuzzy reasoning; how to change function requirements to fuzzy ones, fuzzy computing methods, and strategy of fuzzy reasoning are respectively investigated as well; the function modeling algorithm based on the universal triple I fuzzy reasoning method is achieved. Lastly, the validity of the function granular model and function modeling algorithm is validated. Through our method, the reasonable function granular model can be quickly achieved from function requirements, and the fuzzy character of conceptual design can be well handled, which greatly improves conceptual design.
After a general introduction of the VIKING EU FP7 project two specific cyber-attack mechanisms, which have been analyzed in the VIKING project, will be discussed in more detail. Firstly an attack and its consequences ...
详细信息
Mutation analysis is widely employed to evaluate the effectiveness of various software testing techniques. In most situations, mutation operators are uniformly applied to the original programs, while the faults tend t...
详细信息
Aiming at the problems of registration error and synthetic movement ghost which are caused by moving objects in image mosaicing, a mosaicing algorithm for dynamic scene using multi-scale pyramid histogram of oriented ...
详细信息
Aiming at the problems of registration error and synthetic movement ghost which are caused by moving objects in image mosaicing, a mosaicing algorithm for dynamic scene using multi-scale pyramid histogram of oriented gradients (PHOG) and optimal seam is proposed. Firstly, a new feature, multi-scaled PHOG, is generated by introducing PHOG to multi-scale space corner detections. The feature is used to align images for avoiding the local impact caused by moving objects in image registration. Then, an optimal seam, guaranteeing the minimum difference in geometry and gray value, is searched by graph cut algorithm through constructing an energy function to remove the movement ghost. The experimental results show that the proposed algorithm is efficient in dealing with the problems of image mosaicing with moving objects, and the mosaicing results are satisfactory with high precision.
The electromyography (EMG) pattern recognition and classification of intentional movements for control of multifunctional prostheses have adopted steady state data. Actually, most of human body's movements are con...
详细信息
The background of images often obstructs the edge extraction.A new method of edge extraction is proposed in this paper, which combines classic edge extraction algorithms with optimal global threshold and the morpholog...
详细信息
The background of images often obstructs the edge extraction.A new method of edge extraction is proposed in this paper, which combines classic edge extraction algorithms with optimal global threshold and the morphological dilation and *** can accurately extract edges and eliminate fake edges and filter out the background well.
Routing algorithm has been well studied as a hotspot in wireless Ad Hoc networks. However, due to the strictly limited resources, few routing algorithm take into account extending the network lifetime and achieves an ...
详细信息
A method for detecting spikes and slow burst in photic evoked electroencephalogram (EEG) was proposed. The spikes were detected by combining methods of the morphological filter and the similarity coefficient in the ti...
详细信息
In this paper, we introduce a SAR images target recognition approach based on the contourlet transform and support vector machine (SVM), which takes technological advantages of both SVM and the contourlet transform fo...
详细信息
In this paper, we introduce a SAR images target recognition approach based on the contourlet transform and support vector machine (SVM), which takes technological advantages of both SVM and the contourlet transform for feature extraction.
For cable network fire detection system in intelligent building the existence of the problems that the information transmission is slow, the rate of miss/false alarm of fires is high, and detection and alarm of poison...
详细信息
暂无评论