- Identification of multivariate system based on PID neural network
- Shu, Hua, Wang, Xiaogang, Huang, Zihang | Intelligent Control and Information Processing (ICICIP), 2015 Sixth International Conference on (v.2015 / no.11 / pp.199-202 / 2015)
- System identification is the basis for control system design. For linear time-invariant systems have a variety of identification methods, identification methods for nonli
ÃʷϺ¸±â¿ø¹®º¸±â >
System identification is the basis for control system design. For linear time-invariant systems have a variety of identification methods, identification methods for nonlinear dynamic system is still in the exploratory stage. Nonlinear identification method based on neural network is a simple and effective general method that does not require too much priori experience about the system to be identified. Through training and learning, the network weights are corrected to achieve the purpose of system identification. The paper is about the identification of multivariable nonlinear dynamic system based on PID neural network. The structure and algorithm of PID neural network are introduced and the properties and characteristics are analyzed. The system identification is completed and the results are fast convergence.
- Architectural decomposition for 3D landmark building understanding
- Kobyshev, Nikolay, Riemenschneider, Hayko, Bodis-Szomoru, Andras, Van Gool, Luc | Applications of Computer Vision (WACV), 2016 IEEE Winter Conference on (v.2016 / no.3 / pp.1-10 / 2016)
- Decomposing 3D building models into architectural elements is an essential step in understanding their 3D structure. Although we focus on landmark buildings, our approach
ÃʷϺ¸±â¿ø¹®º¸±â >
Decomposing 3D building models into architectural elements is an essential step in understanding their 3D structure. Although we focus on landmark buildings, our approach generalizes to arbitrary 3D objects. We formulate the decomposition as a multi-label optimization that identifies individual elements of a landmark. This allows our system to cope with noisy, incomplete, outlier-contaminated 3D point clouds. We detect three types of structural cues, namely dominant mirror symmetries, rotational symmetries, and polylines capturing free-form shapes of the landmark not explained by symmetry. Combining these cues enables modeling the variability present in complex 3D models, and robustly decomposing them into architectural structural elements. Our architectural decomposition facilitates significant 3D model compression and shape-specific modeling.
- Identification of GSM and LTE signals using their second-order cyclostationarity
- Karami, Ebrahim, Dobre, Octavia A., Adnani, Nikhil | Instrumentation and Measurement Technology Conference (I2MTC), 2015 IEEE International (v.2015 / no.5 / pp.1108-1112 / 2015)
- Automatic signal identification (ASI) has various military and commercial applications, such as spectrum surveillance and cognitive radio. In this paper, a novel ASI algo
ÃʷϺ¸±â¿ø¹®º¸±â >
Automatic signal identification (ASI) has various military and commercial applications, such as spectrum surveillance and cognitive radio. In this paper, a novel ASI algorithm is proposed for the identification of GSM and LTE signals, which is based on the pilot-induced second-order cyclostationarity. The proposed algorithm provides a very good performance at low signal-to-noise ratios and short observation times, with no need for channel estimation, and timing and frequency synchronization. Simulations and off-the-air signals acquired with the ThinkRF WSA4000 receiver are used to confirm the findings.
- Community recycling models for remanufacturing system
- Zhang Minhong, Fu Yuqiang | Control and Decision Conference (CCDC), 2015 27th Chinese (v.2015 / no.5 / pp.3920-3924 / 2015)
- This article reports the results of a study that explores the choice of the community recycling channels in the closed-loop supply chain. The used products are collected
ÃʷϺ¸±â¿ø¹®º¸±â >
This article reports the results of a study that explores the choice of the community recycling channels in the closed-loop supply chain. The used products are collected by the manufacturer or community service center. A model contains single manufacturer and single community service center was established and solved based on the relationship between unit take-back cost, the beginning investment parameter and the return rate. In addition, we show that simple coordination mechanisms can be designed such that the collection effort of community service center and the supply chain profits are attained at the same level as in a centrally coordinated system. In order to explain the remanufacturing impact on enterprise profits, we also consider the case of no recycling as a comparison.
- Analysis of covariance by using DLR metric
- Mozafari, Mahdieh, Arabpour, Ali Reza | Fuzzy and Intelligent Systems (CFIS), 2015 4th Iranian Joint Congress on (v.2015 / no.9 / pp.1-5 / 2015)
- One-way analysis of covariance is a popular and common statistical method, wherein the equality of the means of several random variables which have a linear relationship
ÃʷϺ¸±â¿ø¹®º¸±â >
One-way analysis of covariance is a popular and common statistical method, wherein the equality of the means of several random variables which have a linear relationship with a random mathematical variable, is tested. In this study by using D LR metric, a method is presented to improve the one-way analysis of covariance when there is an uncertainty in accepting the statistical hypotheses. The method deals with a fuzzy test statistic which is produced by a set of confidence intervals. Finally an example is provided for illustration.
- Restructuring cultural heritage collections in the basic formal ontology
- Zou, Qing, Park, Eun G. | Digital Heritage, 2015 (v.2 / pp.483-484 / 2015)
- This study aims to build an event based ontology in order to apply semantic web technologies to cultural heritage collections and restructure them more explicitly in web
ÃʷϺ¸±â¿ø¹®º¸±â >
This study aims to build an event based ontology in order to apply semantic web technologies to cultural heritage collections and restructure them more explicitly in web environments.
- Analysis of a radial flux hysteresis IPM motor
- Rabbi, S. F., Rahman, M. A. | Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on (v.2015 / no.5 / pp.7-12 / 20150840-7789)
- Design of self-start permanent magnet motors over wide operating range has been a challenging topic of interest among the researchers over the last two decades. This pape
ÃʷϺ¸±â¿ø¹®º¸±â >
Design of self-start permanent magnet motors over wide operating range has been a challenging topic of interest among the researchers over the last two decades. This paper presents the design and finite element analysis of a novel 1HP 208V 3-phase 4-pole line start radial flux hysteresis interior permanent magnet (IPM) motor. The proposed motor is a solid-rotor self-starting hybrid synchronous motor combining both hysteresis phenomena and permanent magnet excitation inside the rotor. The transient performance analysis results of the hysteresis IPM motor are presented and explained in this paper. Simulation results exhibit that the proposed hysteresis IPM motor has smooth starting and good synchronization capabilities.
- Simulation selection for empirical model comparison
- Zhang, Qiong, Yongjia Song | Winter Simulation Conference (WSC), 2015 (v.2015 / no.12 / pp.3777-3788 / 2015)
- We propose an efficient statistical method for the empirical model comparison, which is typically referred to as a simulation procedure to evaluate multiple statistical l
ÃʷϺ¸±â¿ø¹®º¸±â >
We propose an efficient statistical method for the empirical model comparison, which is typically referred to as a simulation procedure to evaluate multiple statistical learning algorithms. First, we use experimental designs to appropriately construct the training and test sets for estimating the empirical performances of these models using the mean square errors. Second, we apply the idea of Bayesian fully sequential ranking and selection to optimally allocate the simulation budget according to the value of information. To make the procedure computationally tractable, we assume a normal-Wishart prior distribution, and propose a new approximation scheme for the posterior distribution by matching it with a normal-Wishart distribution using the first-order moment. Numerical experiments are conducted to show the superiority of the proposed approach on empirical model comparison problems.
- Wireless Injection Attacks Based on Fake Data Injection in TinyOS
- Lingfeng Qiu, Wanyuan Jiang, Wei Zhang, Peng Li | Parallel Architectures, Algorithms and Programming (PAAP), 2015 Seventh International Symposium on (v.2015 / no.12 / pp.236-242 / 20152168-3042)
- Although wireless sensor networks are widely used in recent years, it remains a big security risk in the transmission of information and energy consumption of the nodes.
ÃʷϺ¸±â¿ø¹®º¸±â >
Although wireless sensor networks are widely used in recent years, it remains a big security risk in the transmission of information and energy consumption of the nodes. By summarizing the existing wireless sensor networks attack measures, this paper proposes a way to attack wireless sensor networks by wireless injection, at different times fake nodes is disguised as acquisition nodes and transmission nodes, passing a lot of fake information to other nodes, and it results in the excessive energy consumption of the transmission nodes. In the component-based development Tiny OS system, we use the Micaz nodes to carry out the attack experiments and performance evaluation. Experiment results show that this method achieves the results. It is that the transmission delay will be significantly with more attack nodes and longer attack period, and it also verifies the insufficient performance of wireless sensor networks nodes.
- Securing transmissions between nodes of WSN using TPM
- Furtak, Janusz, Chudzikiewicz, Jan | Computer Science and Information Systems (FedCSIS), 2015 Federated Conference on (v.2015 / no.9 / pp.1059-1068 / 2015)
- Nowadays, Wireless Sensors Networks (WSN) are the most important components in the booming Internet of Things (IoT). Given the use of WSN in systems that are part of the
ÃʷϺ¸±â¿ø¹®º¸±â >
Nowadays, Wireless Sensors Networks (WSN) are the most important components in the booming Internet of Things (IoT). Given the use of WSN in systems that are part of the critical infrastructure of a country, the primary task is continuous authentication of WSN nodes. This paper describes how to use the Trusted Platform Module (TPM) to authenticate sensors which create a sensors' domain in WSN. A model of wireless sensor network as well as operations associated with authentication in the sensors domain are presented. Additionally, an implementation of selected operations in the sensors domain is described; this includes: the master node initialization, slave nodes registration, and data transfer between them. Testing environment including the construction of nodes equipped with the TPM is described. The solution developed by the authors of the paper is only a partial realization of a broader concept of authentication in WSNs supported by the TPM.
- Community Friend: An empirical approach to solve community problems of Bangladesh
- Chowdhury, Mahfuzulhoq, Imteaj, Ahmed, Patwary, Kamrul Hossain, Zaman, Saika | Electrical Engineering and Information Communication Technology (ICEEICT), 2015 International Conference on (v.2015 / no.5 / pp.1-6 / 2015)
- Technological advancements have flaunted a substantial maturation concerned with each and every field in the world and is regarded as a blessing for the human being. Tech
ÃʷϺ¸±â¿ø¹®º¸±â >
Technological advancements have flaunted a substantial maturation concerned with each and every field in the world and is regarded as a blessing for the human being. Technology succors to diminish our tribulation and makes our life more congenial. In his regards, we propounded an android based application named #x2018;Community Friend #x2019; which aspiration is to collaborate with the society people in different manners. In this application, people can delineate on drug selling, food adulteration, different kinds of community problems like need of road construction, electricity or water problem, sexual harassment, early marriage etc. and the report will be dispatched to the proper authority. Therewithal, people can discover the nearby distressed center with distance through a map. Besides, the application has an attribute of audio section which comprised of different religious sermon and medical advice for motivating people from doing malfeasance.
- Analysis of spatially-coupled counter braids
- Rosnes, Eirik, Graell i Amat, Alexandre | Information Theory Workshop - Fall (ITW), 2015 IEEE (v.2015 / no.10 / pp.133-137 / 2015)
- A counter braid (CB) is a novel counter architecture introduced by Lu et al. in 2007 for per-flow measurements on high-speed links. CBs achieve an asymptotic compression
ÃʷϺ¸±â¿ø¹®º¸±â >
A counter braid (CB) is a novel counter architecture introduced by Lu et al. in 2007 for per-flow measurements on high-speed links. CBs achieve an asymptotic compression rate (under optimal decoding) that matches the entropy lower bound of the flow size distribution. Spatially-coupled CBs (SC-CBs) have recently been proposed. In this work, we further analyze single-layer CBs and SC-CBs using an equivalent bipartite graph representation of CBs. On this equivalent representation, we show that the potential and area thresholds are equal. We also show that the area under the extended belief propagation (BP) extrinsic information transfer curve (defined for the equivalent graph), computed for the expected residual CB graph when a peeling decoder equivalent to the BP decoder stops, is equal to zero precisely at the area threshold. This, combined with simulations and an asymptotic analysis of the Maxwell decoder, leads to the conjecture that the area threshold is in fact equal to the Maxwell decoding threshold and hence a lower bound on the maximum a posteriori (MAP) decoding threshold. Finally, we present some numerical results and give some insight into the apparent gap of the BP decoding threshold of SC-CBs to the conjectured lower bound on the MAP decoding threshold.
- Cultural Networks and the Future of Cultural Analytics
- Suarez, Juan-Luis, McArthur, Ben, Soto-Corominas, Adriana | Culture and Computing (Culture Computing), 2015 International Conference on (v.2015 / no.10 / pp.95-98 / 2015)
- The objectives of this paper are to point out the different trends prevalent in the analysis and study of culture by digital means, to define the concept of 'cultural net
ÃʷϺ¸±â¿ø¹®º¸±â >
The objectives of this paper are to point out the different trends prevalent in the analysis and study of culture by digital means, to define the concept of 'cultural network', and to explain why this concept can help us to understand the past and to solve social and economic issues facing our modern world.
- Simple and accurate student outcomes assessment: A unified approach using senior computer engineering design experiences
- Damaj, Issam, Yousafzai, Jibran | Global Engineering Education Conference (EDUCON), 2016 IEEE (v.2016 / no.4 / pp.204-211 / 2016)
- Accurate and simple assessment frameworks are of essential need in technical higher education. Although accurate results in most cases demand complicated setups, good com
ÃʷϺ¸±â¿ø¹®º¸±â >
Accurate and simple assessment frameworks are of essential need in technical higher education. Although accurate results in most cases demand complicated setups, good compromises can lead to the desired assessment with simplicity. In this paper, we propose a unified framework for the assessment of student outcomes based on senior design experiences of undergraduate computer engineering students. Senior design experiences provide unique opportunities for students to demonstrate their abilities, skills, and experiences that are attained throughout a bachelor of engineering program. The proposed framework is built upon capstone design projects and senior design courses. The learning outcomes of senior design courses can be carefully designed to map to all student outcomes. Accordingly, senior design courses can lead to accurate assessments at the program level and within a simple setup of senior courses. The proposed framework allows for sound evaluations of student performance and project qualities. The developed framework comprises criteria, indicators, extensive analytic rubrics, and a summative statistical formulation. The framework is supported by evaluative and comparative analyses of course and student outcome assessments within a pilot study.
- Community detection game
- Xuanyu Cao, Yan Chen, Liu, K. J. Ray | Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on (v.2016 / no.3 / pp.6220-6224 / 2016)
- Real-world networks are often cluttered and hard to organize. Recent studies show that most networks have the community structure, i.e., nodes with similar attributes for
ÃʷϺ¸±â¿ø¹®º¸±â >
Real-world networks are often cluttered and hard to organize. Recent studies show that most networks have the community structure, i.e., nodes with similar attributes form a certain community, which enables people to better understand the constitution of the networks. Hitherto, various community detection methods have been proposed in the literature yet none of them takes the strategic interactions among nodes into consideration. Additionally, many real-world observations of networks are noisy and incomplete, i.e., with some missing links or fake links, due to either technology constraints or privacy regulations. In this work, a game-theoretic framework of community detection is established, where nodes interact and produce links with each other in a rational way based on mutual benefits. Given the proposed game-theoretic generative models for communities, we use expectation maximization (EM) algorithm to detect communities. Simulations on synthetic networks and experiments on real-world networks demonstrate that the proposed detection method outperforms the state-of-the-art.
- Community Detection Analysis of Heterogeneous Network
- Shuai Du, Kai Niu, Zhiqiang He, Yuqian Qiao | Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2015 International Conference on (v.2015 / no.9 / pp.509-512 / 2015)
- With the rapid development of information society, intricate relationship between objects establish huge heterogeneous networks. The linkage is affected by multiple facto
ÃʷϺ¸±â¿ø¹®º¸±â >
With the rapid development of information society, intricate relationship between objects establish huge heterogeneous networks. The linkage is affected by multiple factors, which makes community detection on heterogeneous network a difficult task. Traditional clustering algorithms focus on divided factors, ignoring the combination of them. If the structure of multi-dimensional information is taken into consideration, the results can be more accurate and meaningful. In this paper, we introduce an improved fuzzy clustering algorithm to solve the problem of community detection of heterogeneous network. First extract the features of heterogeneous network and initialize K clusters. Then use a model to create a K-dimensional vector for each object which denotes the probability of belonging to every cluster. Through modifying a classic fuzzy clustering algorithm FCM (Fuzzy c-means) called HFCM, objects can be reassigned to cluster based on the maximum probability. Finally synthetic data and real data are used to verify the correctness of the algorithm.
- Seed pre-treatment of grain and vegetable crops by microwave energy
- Kontar, A. A., Valevakhin, G. N., Buryak, Yu I., Bespalko, V. V., Ogurtsov, Yu Ye, Onischenko, O. I. | Antenna Theory and Techniques (ICATT), 2015 International Conference on (v.2015 / no.4 / pp.1-3 / 2015)
- Systematic joint studies being done in laboratory and field conditions, enabled to develop a scientific concept of microwave energy influence on the rate of growth of gra
ÃʷϺ¸±â¿ø¹®º¸±â >
Systematic joint studies being done in laboratory and field conditions, enabled to develop a scientific concept of microwave energy influence on the rate of growth of grain crops under a considerable reduction of chemical reactants. A model is developed that explains the effect of intensity and duration of microwave energy impact on the change of germination energy, germinating ability and productivity of grain crops using an example of successive changes in the chain of associated water - amylase - maltose - glucose depending upon the initial grain moisture content. A method of seed treatment of vegetable crops has been developed which ensures the rate of growth, which is important for vegetable farming in greenhouses. Results of increasing germinating ability of melon seeds from 10% to 83% after microwave effect are of practical interest.
- Á¦¸ñ
- ÀúÀÚ | ÇмúÁö (v.±Ç / no.È£ / ÆäÀÌÁö¼ö / ¹ßÇà³âissn)
- ÃÊ·Ï
¿ø¹®º¸±â >
- Pre-treatment planning for hepatic radiofrequency ablation
- Qiyong Chen, Muftu, Sinan, Meral, F. Can, Tuncali, Kemal, Akcakaya, Murat | Signal Processing in Medicine and Biology Symposium (SPMB), 2015 IEEE (v.2015 / no.12 / pp.1-6 / 2015)
- We develop a pre-treatment planning method for optimum hepatic radiofrequency (RF) ablation. In conventional methods, pre-treatment planning is minimal and for a specific
ÃʷϺ¸±â¿ø¹®º¸±â >
We develop a pre-treatment planning method for optimum hepatic radiofrequency (RF) ablation. In conventional methods, pre-treatment planning is minimal and for a specific tumor size, it only includes reading pre-specified treatment length and input voltage values from a look-up table that lists experimentally obtained ablation parameters. Such planning, in order to assure certain level of cell death, usually results in more healthy cell damage than desired. Different than the conventional methods, here, we develop a model-based pre-treatment optimal planning framework. As an example, we use 1-D axisymmetric tissue geometry and over this geometry, we solve Pennes' bioheat and Laplace equations to model the RF heating. Using the solutions of these equations, we define constrained nonlinear optimization problems to achieve specific temperature profiles in certain areas of the tissue. Results demonstrate that compared to the conventional methods, our approach significantly improves the healthy tissue preservation.
- Identification of stable models via nonparametric prediction error methods
- Romeres, Diego, Pillonetto, Gianluigi, Chiuso, Alessandro | Control Conference (ECC), 2015 European (v.2015 / no.7 / pp.2044-2049 / 2015)
- A new Bayesian approach to linear system identification has been proposed in a series of recent papers. The main idea is to frame linear system identification as predicto
ÃʷϺ¸±â¿ø¹®º¸±â >
A new Bayesian approach to linear system identification has been proposed in a series of recent papers. The main idea is to frame linear system identification as predictor estimation in an infinite dimensional space, with the aid of regularization/Bayesian techniques. This approach guarantees the identification of stable predictors based on the prediction error minimization. Unluckily, the stability of the predictors does not guarantee the stability of the impulse response of the system. In this paper we propose and compare various techniques to address this issue. Simulations results comparing these techniques will be provided.