Results (440)
Search Parameters:
Keyword: ProblemA Relation Extraction System for Indian Languages
Relation Extraction is an important subtask of Information Extraction that involves extracting significant facts from natural language text. Extracting structured information from the plaintext is the ultimate goal of IE systems. The Indian language content on the internet is increasing day to day. Extracting relevant information from this huge unstructured data is a challenging task…
Read MoreW.A.S.T.E. R.E.D.U.C.E.: Waste Auditing Sensor Technology to Enhance the Reduction of Edible Discards in University Cafeterias & Eateries
Food waste disposal and food availability are both problems in the world today. The ability to monitor food waste is currently limited by the use of manual data collection and sparsity of monitoring. Using sensors to automate the process of measuring and collecting data on food waste would allow constant monitoring and provide a better…
Read MoreRobust synchronization of nonfragile control of complex dynamical network with stochastic coupling and time-varying delays
This paper explores the problem of robust synchronization of complex dynamical network with stochastic coupling and time-varying delays through the application of nonfragile control. A well defined Lyapunov Krasovskii functional is established and by employing the widely acknowledged extended Jensen’s integral inequality and the Bernoulli’s distribution sequences, the stochastic nature of network coupling is modeled…
Read MoreStrategies of the Level-By-Level Approach to the Minimal Route
The task of optimal path planning for drilling tool with numerical control is considered. Such tools are used in the production of printed circuit boards. The algorithm modification of level-by-level route construction for the approximate solution of the traveling salesman problem is discussed. Bypass objects can be specified either as a table of distances or…
Read MoreCritical Embedded Systems Development Using Formal Methods and Statistical Reliability Metrics
Trusted systems are becoming more integrated into everyday life. Security and reliability are at the forefront of trusted system design and are often directed at hardware-only solutions, especially for safety critical systems. This is because hardware has a well-established process for achieving strong, precise, and reliable systems. These attributes have been achieved in the area…
Read MoreHypervolume-Based Multi-Objective Reinforcement Learning: Interactive Approach
In this paper, we propose a procedure of interactive multi-objective reinforcement learning for multi-step decision problems based on the preference of a decision maker. The proposed method is constructed based on the multi-objective reinforcement learning which is applied to multi-step multi-objective optimization problems. The existing literature related to the multi-objective reinforcement learning indicate that the…
Read MoreSimulation-Optimisation of a Granularity Controlled Consumer Supply Network Using Genetic Algorithms
The decision support systems regarding the Supply Chains (SCs) management services can be significantly improved if an effective viable method is utilised. This paper presents a robust simulation optimisation approach (SOA) for the design and analysis of a granularity controlled and complex system known as Consumer Supply Network (CSN) incorporating uncertain demand and capacity. Minimising…
Read MoreReal Time Eye Tracking and Detection- A Driving Assistance System
Distraction, drowsiness, and fatigue are the main factors of car accidents recently. To solve such problems, an Eye-tracking system based on camera is proposed in this paper. The system detects the driver’s Distraction or sleepiness and gives an alert to the driver as an assistance system. The camera best position is chosen to be on…
Read MoreUsing Fuzzy PD Controllers for Soft Motions in a Car-like Robot
This paper deals with the control problem for nonholonomic wheeled mobile robots moving on the plane, and in particular, the use of a Fuzzy controller technique for achieving a given motion task which consists of following a rectilinear trajectory until an obstacle occurs on the path. After a background part, in which the fundamental knowledge…
Read MoreMRI images Enhancement and Brain Tumor Segmentation
Brain tumor is the abnormal growth of cancerous cells in Brain. The development of automated methods for segmenting brain tumors remains one of the most difficult tasks in medical data processing. Accurate segmentation can improve diagnosis, such as evaluating tumor volume. However, manual segmentation in magnetic resonance data is a laborious task. The main problem…
Read MoreMachine Learning Applied to GRBAS Voice Quality Assessment
Voice problems are routinely assessed in hospital voice clinics by speech and language therapists (SLTs) who are highly skilled in making audio-perceptual evaluations of voice quality. The evaluations are often presented numerically in the form of five-dimensional ‘GRBAS’ scores. Computerised voice quality assessment may be carried out using digital signal processing (DSP) techniques which process…
Read MoreContract Price Model Under Active Demand Response
The power market in China is faced with problems such as the continuous widening of terminal load peak-valley difference and the imbalance between supply and demand. Under this background, this paper to establish the mathematical model of the contract price of active demand response. The first is to consider the load component of the user’s…
Read MoreProbabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots
This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…
Read MoreParallelizing Combinatorial Optimization Heuristics with GPUs
Combinatorial optimization problems are often NP-hard and too complex to be solved within a reasonable time frame by exact methods. Heuristic methods which do not offer a convergence guarantee could obtain some satisfactory resolution for combinatorial optimization problems. However, it is not only very time consuming for Central Processing Units (CPU) but also very difficult…
Read MoreGuidance Law Based on Line-of-Sight Rate Information Considering Uncertain Modeled Dynamics
Proportional navigation (PN) is a widely-used guidance law for missiletarget engagement. The goal of the missile intercept problem is to reduce the closest distance between the missile and target by diminishing the line-of-sight rate (LOS rate). In general, PN guidance law necessitates information of the LOS rate and missile velocity. The closing velocity (relative approaching…
Read MoreA Development of Agility Mode in Cardiopulmonary Resuscitation Learning Support System Visualized by Augmented Reality
This paper showed visualization of technics about cardiopulmonary resuscitation contributed to acquiring the skills and understanding them. Especially, this system is focused on the individuality in each object (men, women, and babies) There are problems of a general cardiopulmonary resuscitation (CPR) training because learners are generally taught by instruction based on a subjective judgment. Because…
Read MoreImpacts of Synchronous Generator Capability Curve on Systems Locational Marginal Price through a Convex Optimal Power Flow
This paper deals about an application of optimal power flows (OPF) constrained with synchronous generator capability curve for power market analysis (SGCC). OPF main features gather in its mathematical formulation non-convexity, non-linearity, and it shows to be a hard to solve optimization problem. In some operational scenarios, SGCC can limit power flows bringing the theoretical…
Read MoreAnalysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud
In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…
Read MoreA Novel Technique for Enhancing Color of Undersea Deblurred Imagery
Exploring the ocean underneath has always been an area of great scientific and environmental concern. However, the study of underwater environment was very difficult due to the extreme conditions. Undersea descriptions undergo severe distortion attributed to absorptive as well as scattering properties. Absorption substantially removes illumination, whereas a ray of light redirected in several path…
Read MoreHolistic Access Control and Privacy Infrastructure in Distributed Environment
This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…
Read MoreTowards Adoption of Authentication and Authorization in Identity Management and Single Sign On
Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…
Read MoreDifference in Speech Analysis Results by Coding
Mental health disorder is becoming a social problem, and there is a need for technology that can easily check for states of stress and depression as a countermeasure. Conventional methods of diagnostic support and screening include self-administered psychological tests and use of biomarkers. However, there are problems such as burden on subjects, examination costs, dedicated…
Read MoreVirtual Watershed System: A Web-Service-Based Software Package For Environmental Modeling
The physically-based environmental model is a crucial tool used in many scientific inquiries. With physical modeling, different models are used to simulate real world phenomena and most environmental scientists use their own devices to execute the models. A complex simulation can be time-consuming with limited computing power. Also, sharing a scientific model with other researchers…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreA Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments
Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…
Read More
