- Stability Analysis and Trajectory Tracking Control of Articulated Heavy Vehicles
- Tian Jie, Chen Qingyun, Song Zhipeng, Xu Lian, Li Meiying | Intelligent Transportation, Big Data and Smart City (ICITBS), 2015 International Conference on (v.2015 / no.12 / pp.744-748 / 2015)
- Articulated heavy vehicles have heavy loads, high shipping efficiency and low mileage cost. But due to the interaction between the tractor and the trailer, it is easy to
ÃʷϺ¸±â¿ø¹®º¸±â >
Articulated heavy vehicles have heavy loads, high shipping efficiency and low mileage cost. But due to the interaction between the tractor and the trailer, it is easy to appear 'jack-knifing' or 'trailer sway' and it is difficult to follow the given path of the travel. To this end, a four degrees of freedom single track model of a tractor/full-trailer is built, and the stability analysis is carried on to study the influences of the structural and operating parameters on the vehicle. Furthermore the trajectory tracking controller of trailer is designed, which can ensure that the trajectory of the trailer follows that of the tractor exactly by the control of the active front wheel steering angle of the trailer and the vehicle can maintain good handling stability.
- Identification of labeled Time Petri nets
- Basile, Francesco, Chiacchio, Pasquale, Coppola, Jolanda | Discrete Event Systems (WODES), 2016 13th International Workshop on (v.2016 / no.5 / pp.478-485 / 2016)
- In a previous paper we presented an approach to identify a Time Petri net system, given a set of observed timed sequences. The set of transitions, which coincides with th
ÃʷϺ¸±â¿ø¹®º¸±â >
In a previous paper we presented an approach to identify a Time Petri net system, given a set of observed timed sequences. The set of transitions, which coincides with the set of events, is assumed to be known, while the net structure, the initial marking and the firing duration of transitions are computed in one stage solving a mixed-integer linear programming problem derived from a set of logical predicates. In this paper we extend this approach by allowing that two transitions may share the same event label. Then, the identified model is a labeled Time Petri net system. The identification problem can still be solved via a mixed-integer linear programming problem but the constraint set previously determined is modified.
- A novel algorithm for measuring graph similarity: Application to brain networks
- Mheich, A., Hassan, M., Gripon, V., Khalil, M., Berrou, C., Dufor, O., Wendling, F. | Neural Engineering (NER), 2015 7th International IEEE/EMBS Conference on (v.2015 / no.4 / pp.1068-1071 / 2015)
- Measuring similarity among graphs is a challenging issue in many disciplines including neuroscience. Several algorithms, mainly based on vertices or edges properties, wer
ÃʷϺ¸±â¿ø¹®º¸±â >
Measuring similarity among graphs is a challenging issue in many disciplines including neuroscience. Several algorithms, mainly based on vertices or edges properties, were proposed to address this issue. Most of them ignore the physical location of the vertices, which is a crucial factor in the analysis of brain networks. Indeed, functional brain networks are usually represented as graphs composed of vertices (brain regions) connected by edges (functional connectivity). In this paper, we propose a novel algorithm to measure a similarity between graphs. The novelty of our approach is to account for vertices, edges and spatiality at the same time. The proposed algorithm is evaluated using synthetic graphs. It shows high ability to detect and measure similarity between graphs. An application to real functional brain networks is then described. The algorithm allows for quantification of the inter-subjects variability during a picture naming task.
- Identification of UHF Gen 2 RFID privacy and security issues
- Deepika, K., Usha, J. | Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2015 International Conference on (v.2015 / no.10 / pp.82-86 / 2015)
- Radio frequency identification (RFID) is a non-wired electromagnetic transmission to communicate between an end terminal and a chip-less tag with the principle of identif
ÃʷϺ¸±â¿ø¹®º¸±â >
Radio frequency identification (RFID) is a non-wired electromagnetic transmission to communicate between an end terminal and a chip-less tag with the principle of identification. Privacy protection and safety assurance are critical as RFID tags have an extensive range of conveyance with unauthorized scanning by malicious readers to broadcast data. Effectual confidentiality and security protocols should be exercised to safeguard the statistics in determining the exact radio waves. Characteristics of radio frequency wireless communication are accessible and the capabilities of the sensor nodes are adequate for providing protection and integrity. Analysis and exploration of the strategies on threats and countermeasures for wireless sensor network on access, retrieval and scalability of records are deliberated in this paper.
- Semantic classification of the citations
- Vaioulis, Fotios, Papavlasopoulos, Sozon, Bokos, George, Poulos, Marios | Information, Intelligence, Systems and Applications (IISA), 2015 6th International Conference on (v.2015 / no.7 / pp.1-5 / 2015)
- In this study the semantic classification of the references/citations of a scientific article according to position within the article is investigated. For this purpose,
ÃʷϺ¸±â¿ø¹®º¸±â >
In this study the semantic classification of the references/citations of a scientific article according to position within the article is investigated. For this purpose, the article is divided into two major sections: the Introduction/Background section and the rest section which contains the methodology, experimental part, results and conclusion parts. Additionally, the references of an article are divided into two categories: the Self-References and the Citations which are used for the semantic interpretation of the references in combination with the aforementioned geographic partition. For achievement of this, an algorithm was constructed which was implemented using Java programming language and was applied in a numerous articles of open springer journals. Finally, the classification results as well as the interpretation of these should create a new consideration about the contribution of each reference in the knowledge creation specifically in the self-citation case.
- Analysis of video analytic architectures
- Purohit, Manoj, Kaushik, B. K., Singh, Manvendra, Kumar, Ajay | Recent Advances in Electronics amp; Computer Engineering (RAECE), 2015 National Conference on (v.2015 / no.2 / pp.70-74 / 2015)
- Video technology is changing rapidly due to the advancement in the sensor technology, transmission bandwidth, higher storage capability and availability of high resolutio
ÃʷϺ¸±â¿ø¹®º¸±â >
Video technology is changing rapidly due to the advancement in the sensor technology, transmission bandwidth, higher storage capability and availability of high resolution displays. Conventional video systems are being replaced by intelligent video systems to cater for automatic handling of the specific tasks and availability of high-volume data due to network of sensors. These intelligent video systems incorporate video analytics to meet the specific requirements of the user. Video analytics involves autonomous understanding of events by the machine in order to reduce the burden by removing the uninformative data for subsequent analysis and to augment the given task for monitoring, logging and action. There are numerous application areas of video analytics such as intrusion detection, crowd management, face recognition, unattended baggage detection, traffic management, video surveillance, object classification, detection tracking, etc. The present work provides an overview of the available state-of-the-art video analytics and the ongoing development in the area of video analytics. Framework for the development of video analytics algorithms and architectural issue has also been covered.
- Picturing monuments and cultural heritages with ground penetrating radar method including its half bird's eye view visualization
- Kadioglu, Selma, Kadioglu, Yusuf Kagan, Akyol, Ali Akin | Advanced Ground Penetrating Radar (IWAGPR), 2015 8th International Workshop on (v.2015 / no.7 / pp.1-4 / 2015)
- The aim of this study is to show applications of the ground penetrating radar (GPR) method to the monuments and the cultural heritages in order to maintain and evaluate t
ÃʷϺ¸±â¿ø¹®º¸±â >
The aim of this study is to show applications of the ground penetrating radar (GPR) method to the monuments and the cultural heritages in order to maintain and evaluate the progress of treatments. In this framework, we involved transparent 3D half bird's eye view visualization of the GPR data. Our study area was on the Midas Monument remained a Phrygia civilization, lived between the 9th and 7th centuries BC in the Eskis #x0327;ehir region of Central Anatolia-Turkey. The monument has covered with miscellaneous geometric designs and hyerogliphics. During the Phrygian period religious ceremonies used to be held here. The Midas Monument has taken the shape of a giant rock-cut facade measuring over 16.5 meters in width and some 17 meters in height. The rock of the facade is nature rock heightened from surface. There are a lot of rock cut chambers seems as a multi-storey apartment in the North of the monument. We used the GPR method to evaluate the existence of internal discontinuities such as micro fractures and cavities of Midas Monument in order to control stability condition. 800 MHz shielded antenna was used to acquire GPR data on parallel profiles on the monument and 250 MHz shielded antenna was used on parallel profiles spaced 1m apart to research stability conditions around the monument and rock cut grave chambers. We obtained 2D/3D image of the GPR with half bird's eye view visualization of depth slices and their transparent 3D sub-volumes and pictured fractures on the Midas Monument and buried cavities representing rock cut tombs between monuments and the rock cut necropolis.
- Area, Energy, and Time Assessment for a Distributed TPM for Distributed Trust in IoT Clusters
- Hamadeh, Hala, Chaudhuri, Soma, Tyagi, Akhilesh | Nanoelectronic and Information Systems (iNIS), 2015 IEEE International Symposium on (v.2015 / no.12 / pp.225-230 / 2015)
- IoT clusters arise from natural human societal clusters such as a house, an airport, and a highway. IoT clusters are heterogeneous with a need for device to device as wel
ÃʷϺ¸±â¿ø¹®º¸±â >
IoT clusters arise from natural human societal clusters such as a house, an airport, and a highway. IoT clusters are heterogeneous with a need for device to device as well as device to user trust. The IoT devices are likely to be thin computing clients. Due to low cost, an individual IoT device is not built to be fault tolerant through redundancy. Hence the trust protocols cannot take the liveness of a device for granted. In fact, the differentiation between a failing device and a malicious device is difficult from the trust protocol perspective. We present a minimal distributed trust layer based on distributed consensus like operations. These distributed primitives are cast in the context of the APIs supported by a trusted platform module (TPM). TPM with its 1024 bit RSA is a significant burden on a thin IoT design. We use RNS based slicing of a TPM where in each slice resides within a single IoT device. The overall TPM functionality is distributed among several IoT devices within a cluster. The VLSI area, energy, and time savings of such a distributed TMP implementation is assessed. A sliced/distributed TPM is better suited for an IoT environment based on its resource needs. We demonstrate over 90% time reduction, over 3% area reduction, and over 90% energy reduction per IoT node in order to support TPM protocols.
- Simulation of film structures for CMOS image sensors
- Kuo-Tsai Wu, Sheng-Jye Hwang, Wei-Min Tsai | Microsystems, Packaging, Assembly and Circuits Technology Conference (IMPACT), 2015 10th International (v.2015 / no.10 / pp.365-368 / 2015)
- This study will use ANSYS, the commercial finite element analysis software, to simulate the thin film stacked in different processes on CMOS image sensors. For example, t
ÃʷϺ¸±â¿ø¹®º¸±â >
This study will use ANSYS, the commercial finite element analysis software, to simulate the thin film stacked in different processes on CMOS image sensors. For example, the process of color filter stacks will observe the impact with the different stacking structure and electronic properties (leakage current), and using the results to further optimize the structure of thin film stacked or change the film material to achieve the best performance. We use 2D simulation and simplification model to improve simulation efficiency, then modifying material parameters and discussing with stress singularity will get more accurate results. From the study, the film structure will produce residual stress when cooling to room temperature because of materials with the different coefficients of thermal expansion. Comparing of simulation and experiment results will find a trend: When the stress is higher and the leakage is higher; the stress is lower and the leakage is lower. This trend caused by the high stress induced defects, then defects induced high leakage current. The study will use the computer simulation to make the shorter research time, lower experimental costs, and enhancing the defect-free rate of products.
- Identification of opinion leaders in social network
- Khan, Nida Saddaf, Ata, Maira, Rajput, Quratulain | Information and Communication Technologies (ICICT), 2015 International Conference on (v.2015 / no.12 / pp.1-6 / 2015)
- Identification of the opinion leaders in the world's largest microblogging site, Twitter, is crucial problem of social network analysis. Twitter has quick information flo
ÃʷϺ¸±â¿ø¹®º¸±â >
Identification of the opinion leaders in the world's largest microblogging site, Twitter, is crucial problem of social network analysis. Twitter has quick information flow and has high impact on forming opinion on mass public. This paper presents the study based on various centrality mesaure approaches for finding key players for a specific political trend on Twitter. A novel weighted approach has been proposed for finding opinion leaders based on the centrality measures. Experiment has been conducted on the Twitter's data for the sit in procession of Pakistani politician Imran Khan in 2014. It has been found that Twitter opinion leadership makes a significant contribution to individuals' involvement in political reforms.
- Atomic decomposition based anisotropic non-local structure tensor
- Yuhui Zheng, Xiaozhou Zhou, Byeungwoo Jeon, Quansen Sun, Yi Wu | Image Processing (ICIP), 2015 IEEE International Conference on (v.2015 / no.9 / pp.966-970 / 2015)
- The existing non-local structure tensors utilize the isotropic nature of the neighborhoods and compare similarity of tensors by the Euclidean distance for tensor field re
ÃʷϺ¸±â¿ø¹®º¸±â >
The existing non-local structure tensors utilize the isotropic nature of the neighborhoods and compare similarity of tensors by the Euclidean distance for tensor field regularization, thus resulting in limited performances in image analysis. In this paper, we present an anisotropic nonlocal tensor regularization method by using a directional projection based atomic decomposition scheme, which offers two advantages: better exploitation of spatial directional information for anisotropically regularizing tensor field, and straightforward employment of the Euclidean distance to compute smoothing weights without extending the original non-local means filter to tensor field. Experimental results show that the proposed anisotropic structure tensor is superior to existing representative nonlinear structure tensors, in terms of corner detection and image denoising.
- Measurements on prototype inductive adders with extreme flat-top output pulses for CLIC damping ring extraction kickers
- Holma, Janne, Barnes, Michael J. | Power Electronics and Applications (EPE`15 ECCE-Europe), 2015 17th European Conference on (v.2015 / no.9 / pp.1-8 / 2015)
- The specifications of the extraction kicker systems for the damping rings of the Compact Linear Collider call for 160 ns duration flat-top pulses of #x00B1;12.5 kV, 250
ÃʷϺ¸±â¿ø¹®º¸±â >
The specifications of the extraction kicker systems for the damping rings of the Compact Linear Collider call for 160 ns duration flat-top pulses of #x00B1;12.5 kV, 250 A, with combined ripple and droop of #x00B1;0.02 %. Pulse waveforms of two 3.5 kV prototype inductive adders have demonstrated #x00B1;0.05 % relative flat-top stability.
- Community detection in social network with pairwisely constrained symmetric non-negative matrix factorization
- Shi, Xiaohua, Lu, Hongtao, He, Yangchen, He, Shan | Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on (v.2015 / no.8 / pp.541-546 / 2015)
- Non-negative Matrix Factorization (NMF) aims to find two non-negative matrices whose product approximates the original matrix well, and is widely used in clustering condi
ÃʷϺ¸±â¿ø¹®º¸±â >
Non-negative Matrix Factorization (NMF) aims to find two non-negative matrices whose product approximates the original matrix well, and is widely used in clustering condition with good physical interpretability and universal applicability. Detecting communities with NMF can keep non-negative network physical definition and effectively capture communities-based structure in the low dimensional data space. However some NMF methods in community detection did not concern with more network inner structures or existing ground-truth community information. In this paper, we propose a novel pairwisely constrained non-negative symmetric matrix factorization (PCSNMF) method, which not only consider symmetric community structures of undirected network, but also takes into consideration the pairwise constraints generated from some ground-truth group information to enhance the community detection. We compare our approaches with other NMF-based methods in three social networks, and experimental results for community detection show that our approaches are all feasible and achieve better community detection results.
- Simulation and analysis of a bank queuing system
- Mutingi, M., Mapfaira, H., Moakofi, N. P. K., Moeng, S. A., Mbohwa, C. | Industrial Engineering and Operations Management (IEOM), 2015 International Conference on (v.2015 / no.3 / pp.1-6 / 2015)
- Improving service quality in the banking sector is essential for customer satisfaction. Decision makers are especially concerned about the time that customers wait before
ÃʷϺ¸±â¿ø¹®º¸±â >
Improving service quality in the banking sector is essential for customer satisfaction. Decision makers are especially concerned about the time that customers wait before receiving their service. To stay competitive, decision makers have to continuously improve their service quality, measured in terms of suitable performance indicators. In this study, we focus on modelling and analysis of bank queuing systems. The study comprises three phases: (i) identify suitable performance indicators that influence customer perception with regards to service quality, (ii) simulate the behavioral performance of bank queuing systems, and (ii) evaluate and improve the service quality of the system. An illustrative case study is presented, showing the utility of proposed simulation approach.
- Identification the activities of daily living based on decision tree
- Rung-Ching Chen, Qiangfu Zhao, Chia-Ming Tsai, Bin Dai | Awareness Science and Technology (iCAST), 2015 IEEE 7th International Conference on (v.2015 / no.9 / pp.157-162 / 2015)
- The basic concept of smart environment is to be aware of the context information related to environmental and human behavioral changes, and to provide appropriate service
ÃʷϺ¸±â¿ø¹®º¸±â >
The basic concept of smart environment is to be aware of the context information related to environmental and human behavioral changes, and to provide appropriate services accordingly. To obtain the context information, people often use video cameras, microphones, and other devices. These devices can obtain complex environmental data but they also need powerful equipment for handling the data. In addition, monitoring equipment will generate privacy issues. Users will generate sense of exclusion. In these devices, users generally dislike the graphic and audio monitoring equipment. We mainly collect user activity information through the most simple data quality of sensor. Due to amount of activity of human is difficult to make computers understand by natural language. On the other hand, activity vulnerable to external factors produce different variations. In order to effectively address these issues, we propose an activity to identify architecture based on fuzzy logic. This method using fuzzy logic deal with sensor data and using fuzzy decision trees identification of a user's activities. According to the results of preliminary experiments, the system can identify 85.49% the daily activities.
- Towards coping and imagination for cognitive agents
- Wolff, Matthias, Romer, Ronald, Wirsching, Gunther | Cognitive Infocommunications (CogInfoCom), 2015 6th IEEE International Conference on (v.2015 / no.10 / pp.307-312 / 2015)
- Current technical cognitive systems cannot react on unforeseen situations. In particular, they fail if their repertoire of actions is insufficient to solve a problem or t
ÃʷϺ¸±â¿ø¹®º¸±â >
Current technical cognitive systems cannot react on unforeseen situations. In particular, they fail if their repertoire of actions is insufficient to solve a problem or to overcome a barrier. In this paper we propose a novel `coping apparatus' for cognitive agents which is capable of conceiving entirely new actions, simulating their prospective effect in the world and learning from their actual effect. The apparatus also provides the agent with `fantasy' which allows to imagine unseen world states and to develop a strategy how to try to get there.
- Cultural Promote Economic Development under the Factor Analysis - in Japan, for Example
- Xiuli Yan, Zhiyong Wang | Intelligent Transportation, Big Data and Smart City (ICITBS), 2015 International Conference on (v.2015 / no.12 / pp.250-253 / 2015)
- Based on analysis of the key factors of Japanese culture to the country's economic development has made outstanding contributions, particularly in the Japanese anime cult
ÃʷϺ¸±â¿ø¹®º¸±â >
Based on analysis of the key factors of Japanese culture to the country's economic development has made outstanding contributions, particularly in the Japanese anime culture, sports and culture is characterized by the formation of a strong cultural industry system. Further, as a manifestation of national consciousness and the national spirit, culture affects the formation of individual corporate culture, and gradually promote the rapid increase in Japan's national economy and abundant reserves, the paper extract promote cultural factors in economic terms, namely: enterprise culture, national consciousness and consumer culture, education and innovation culture, and to assess the factors influence these factors.
- Investigation of native oxide removing from HCPA ALD grown GaN thin films surface utilizing HF solutions
- Deminskyi, Petro, Haider, Ali, Biyikli, Necmi, Ovsianitsky, Alexander, Tsymbalenko, Alexander, Kotov, Dmitry, Matkivskyi, Vladyslav, Liakhova, Nata, Osinsky, Vladimir | Electronics and Nanotechnology (ELNANO), 2016 IEEE 36th International Conference on (v.2016 / no.4 / pp.128-131 / 2016)
- The paper consider oxygen contamination of HCPA ALD grown GaN films under an air conditioning and during different time duration. High resolution XPS analysis of HCPA ALD
ÃʷϺ¸±â¿ø¹®º¸±â >
The paper consider oxygen contamination of HCPA ALD grown GaN films under an air conditioning and during different time duration. High resolution XPS analysis of HCPA ALD grown GaN films after diluted 1:10 HF(41 %): H 2 O and undiluted HF (41 %) influence on oxygen impurities was investigated. Lesser oxygen impurities have been observed. Better resistivity to oxygen atoms of GaN thin films after diluted HF solution treatment was achieved compared to undiluted HF treatment and without treatment.
- Design and subsystems tests for the TPM-1U tokamak
- Nieto-Perez, M., Ramos, G., Hernandez-Arriaga, D., Ceballos-Soto, F., Lindero-Hernandez, M., Ventura-Ovalle, D. M. | Fusion Engineering (SOFE), 2015 IEEE 26th Symposium on (v.2015 / no.5 / pp.1-8 / 2015)
- A small tokamak (0.45 m major radius, 0.15 m minor radius) is currently being designed and constructed at CICATA Queretaro in Mexico. The purpose of these machines, as is
ÃʷϺ¸±â¿ø¹®º¸±â >
A small tokamak (0.45 m major radius, 0.15 m minor radius) is currently being designed and constructed at CICATA Queretaro in Mexico. The purpose of these machines, as is the case of other machines of similar size in operation around the world, is twofold: allow hands-on experience to students in order to gain a practical understanding of magnetically confined hot plasmas, and also to test innovative ideas that may be impractical to put to test in large machines. The present work highlights three efforts towards the realization of this small machine: toroidal field (TF) power system, ohmic transformer (OT) power system and electromechanical design for the TF coil array. All these efforts are focused on achieving the desired parameters of the machine minimizing the infrastructure cost; that is, performing a careful design that makes efficient use of, to name a couple, materials and power storage infrastructure. In the TF power system front, a scheme based on a line-type pulser to generate the required current pulse is being explored and tested in a scaled prototype; detachable toroidal field coils (and vessel sections) are under development to overcome the difficulty of installing and removing in vessel components in small machines; on the OT design, hybrid capacitive/inductive energy storage for powering the central solenoid and its influence on pulse shaping is also being explored in a scaled-down prototype; and finally, finite element simulations of mechanical stresses on TF coils and support structure are also being performed that may allow an adequate mechanical stability to the machine during shots.
- Managing cultural heritage: Digital documentation and archiving
- Bartolomei, Cristiana, Ippolito, Alfonso | Digital Heritage, 2015 (v.2 / pp.259-266 / 2015)
- Presented in the study is an analysis of methodologies for digital representing, documenting and popularizing cultural heritage through digital archives. The development
ÃʷϺ¸±â¿ø¹®º¸±â >
Presented in the study is an analysis of methodologies for digital representing, documenting and popularizing cultural heritage through digital archives. The development and perfecting of techniques for acquiring and elaborating photorealistic 3D models, made them pivotal elements for popularizing information of objects on the scale of architectonic structures. The experiment conducted on the Gates of Bologna aims at presenting the continuity of work starting with the acquisition and elaboration of 3D models created with the help of expeditious methodologies, then comparing various systems to finally achieve a systematization of heterogeneous data within a digital platform, bringing out its potentialities and limits. The objective is to present the way in which digital technologies allow us to document, preserve, evaluate and popularize cultural heritage by structuring out an #x201C;open #x201D; system of cognition and therefore always lending itself to implementation.