Results (102)
Search Parameters:
Keyword: RobustComputational Techniques to Recover Missing Gene Expression Data
Almost every cells in human’s body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. However, it is a very expensive and time consuming task. Using computational methods can help biologists to…
Read MoreHolistic Access Control and Privacy Infrastructure in Distributed Environment
This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…
Read MoreSynthesis of QDI Combinational Circuits using Null Convention Logic Based on Basic Gates
Currently, synchronous digital circuits (SDC) may require certain design conditions, such as power consumption, robustness, performance, etc. These design conditions are more difficult to satisfy when SDC are implemented in VLSI (Very Large Scale Integration) technology and in the deep-sub-micron MOS (DSM-MOS) technology. The asynchronous design style has properties that serve as an alternative to…
Read MoreDirect Torque Control Strategy Based on the Emulation of Six-Switch Inverter Operation by a Four-Switch Inverter Using an Adaptive Fuzzy Controller
This paper presents a novel direct torque control (DTC) strategy aimed to four-switch three-phase (FSTP) inverter-fed an interior permanent magnet synchronous machine (IPMSM), using a fuzzy logic toolbox in speed control loop. In fact, the introduced DTC approach is based on the emulation of the operation of the standard six-switch three-phase (SSTP) inverter. This fact…
Read MoreDesign and Implementation of Closed-loop PI Control Strategies in Real-time MATLAB Simulation Environment for Nonlinear and Linear ARMAX Models of HVAC Centrifugal Chiller Control Systems
The objective of this paper is to investigate three different approaches of modeling, design and discrete-time implementation of PI closed-loop control strategies in SIMULINK simulation environment, applied to a centrifugal chiller system. Centrifugal chillers are widely used in large building HVAC systems. The system consists of an evaporator, a condenser, a centrifugal compressor and an…
Read MoreStabilization of constrained uncertain systems by an off-line approach using zonotopes
In this paper, stabilization of uncertain systems was established using zonotopic sets. The obtained state feedback control laws are computed by an off-line approach reducing computational burdens. The resolution of a robust model predictive control (MPC) allows computing a sequence of state feedback control laws corresponding to a sequence of zonotopic invariant sets. The implemented…
Read MoreImpact of Line Resistance Combined with Device Variability on Resistive RAM Memories
In this paper, the performance and reliability of oxide-based Resistive RAM (ReRAM) memory is investigated in a 28nm FDSOI technology versus interconnects resistivity combined with device variability. Indeed, common problems with ReRAM are related to high variability in operating conditions and low yield. At a cell level ReRAMs suffer from variability. At an array level,…
Read MoreMachine Learning framework for image classification
Hereby in this paper, we are going to refer image classification. The main issue in image classification is features extraction and image vector representation. We expose the Bag of Features method used to find image representation. Class prediction accuracy of varying classifiers algorithms is measured on Caltech 101 images. For feature extraction functions we evaluate…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreImproved Hybrid Opponent System for Professional Military Training
Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming.…
Read MoreA Novel Approach to Sensor and Actuator Integrity Monitoring and Fault Magnitude Reconstruction
This paper proposes a novel approach to sensor and actuator integrity monitoring in a dynamic system. Multiple sensor and actuator faults can be detected. Furthermore, faulty sensors and actuators are isolated by contribution analysis. Most importantly, fault magnitudes can be correctly estimated and failed sensors or actuators outputs can be reconstructed. The proposed approach is…
Read MoreRetrieving Dialogue History in Deep Neural Networks for Spoken Language Understanding
In this paper, we propose a revised version of the semantic decoder for multi-label classification task in the spoken language understanding (SLU) pilot task of the Dialog State Tracking Challenge 5 (DSTC5). Our model concatenates two deep neural networks – a Convolutional Neural Network (CNN) and a Recurrent Neural Networks (RNN) – for detecting semantic…
Read MoreSoft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems
The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read MoreGrasping and Placing Operation for Labware Transportation in Life Science Laboratories using Mobile Robots
In automated working environments, mobile robots can be used for different purposes such as material handling, domestic services, and objects transportation. This work presents a grasping and placing operation for multiple labware and tube racks in life science laboratories using the H20 mobile robots. The H20 robot has dual arms where each arm consists of…
Read MoreRecognition and Position Estimation for Multiple Labware Transportation Using Kinect V2 and Mobile Robots
Mobile robots can be used to perform transportation tasks for different objects. These tasks have to be implemented carefully. Therefore, an accurate approach for object recognition and position estimation is required. This work presents a concept for identification and position estimation of multiple labware. These labware, which contain chemical and biological components, have to be…
Read MoreComparative Study of Adaptive Consensus Control of Euler-Lagrange Systems on Directed Network Graph
A comparative study between adaptive consensus control of multi-agent systems composed of fully actuated mobile robots which are described as a class of Euler-Lagrange systems on directed network graphs based on the notion of inverse optimal H∞ control criterion (Controller I), and the similar control strategy without H∞ control criterion (Controller II), is given in this paper.…
Read MoreSupport Vector Machine based Vehicle Make and Model Recognition System
Vehicle analysis is a very useful component in various real world applications. In this paper, we have developed a Vehicle Make and Model Recognition (VMMR) system using Support Vector Machine (SVM). Scale Invariant Feature Transform (SIFT) and Speed-Up Robust Transform (SURF) are used to extract local features from an image. Bag-of-Features (BoF) model is used…
Read MoreGNSS Positioning in Non-line-of-Sight Context—a Survey for Technological Innovation
Reliable, available and accurate localization of people and vehicles is one crucial requirement for intelligent transportation systems (ITSs). This has led to a variety of technical approaches in recent years. Towards an exact positioning via Global Navigation Satellite Systems (GNSSs) the visibility of satellites is an important factor. In this paper, we review the literature…
Read MoreA delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances
In this paper, a delay-dependent controller based on the sliding mode concept is proposed to stabilize a networked robotic system in a decentralized synchronization scheme. In addition to being affected by communication time-delays between agents, and seen that external disturbances obviously affect any physical and dynamic system, an unsettling action resulting from measurement errors affects…
Read MoreAdaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems
In this paper, we propose an adaptive discrete-time fuzzy sliding mode control for a class of chaotic systems. For this aim, a discrete sliding mode controller and a fuzzy system are combined to achieve an adequate control. The Laypunov stability theorem is used to testify the asymptotic stability of the whole system and the consequence…
Read MoreReal Time Advanced Clustering System
This paper describes a system to gather information from a stationary camera to identify moving objects. The proposed solution makes only use of motion vectors between adjacent frames, obtained from any algorithm. Starting from them, the system is able to retrieve clusters of moving objects in a scene acquired by an image sensor device. Since…
Read MoreReal Time Implementation of an Improved Hybrid Fuzzy Sliding Mode Observer Estimator
This paper extends some of our research results disseminated in the most recent awarded international conference paper concerning the implementation in real time of a sliding mode observer state estimator. For the same case study developed in the conference paper, more precisely a DC servomotor angular speed control system, we extend the proposed concept of…
Read MoreDetailed Analysis of Torque Ripple in High Frequency Signal Injection based Sensor less PMSM Drives
High Frequency Signal Injection based techniques are robust and well proven to estimate the rotor position from stand still to low speed. However, Injected high frequency signal introduces, high frequency harmonics in the motor phase currents and results in significant Output Torque ripple. There is no detailed analysis exist in the literature, to study the…
Read MoreRecent Trends in ELM and MLELM: A review
Extreme Learning Machine (ELM) is a high effective learning algorithm for the single hidden layer feed forward neural networks. Compared with the existing neural network learning algorithm it solves the slow training speed and over-fitting problems. It has been used in different fields and applications such as biomedical engineering, computer vision, remote sensing, chemical process…
Read More
