The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an approach for optical communication via visible light using a focusable LED flashlight as the transmitting device and a digital camera as the receiver. One novelty of the approach is that the design can integrate generic off-the-shelf light source and camera components and is designed to work indoors under typical lighting conditions, i.e., overhead lighting and ambient daylight...
The photovoltaic (PV) arrays can be affected by several factors such as temperature, shading, solar insolation, and the array configuration. In some cases, PV arrays can be completely or partially shaded by obstacles such as clouds and trees or manmade structures. The PV characteristics become complex with the shading effect on the system. Therefore to achieve the maximum power possible, it is important...
There have been numerous simulation works done on Grid Restoration using Multi-Agent System but almost no experimental work to ascertain the duplicity of these simulation results. This work aims to experimentally perform distributed restoration of a smart power grid system. The concept used in this research is based on the distributed and intelligent multi-agent system technology where multiple smart...
In this research work, Internet Protocol (IP ) receive module is proposed to represent the IP layer at receiving path of an open TCP/IP custom single-purpose processor. Main components of IP receive module architecture and Finite-State Machine (FSM) are designed at Register Transfer Level (RTL) using VHDL language. Design and synthesis verification results are depicted using SignalTab logic analyzer.
Distributed microphone systems can be used to enhance intelligibility for a speaker of interest (SOI) in a noisy environment of multiple speech sources (cocktail party scenario). For finite microphone distributions, however, interfering speech sources leak into the beamformed signal and degrade intelligibility. This article introduces an auditory inspired post-processing algorithm for beamformed signals...
In this paper, we investigate the performance of two wrapper methods for semi-supervised learning algorithms for classification of protein crystallization images with limited labeled images. Firstly, we evaluate the performance of semi-supervised approach using self-training with naïve Bayesian (NB) and sequential minimum optimization (SMO) as the base classifiers. The confidence values returned by...
A microgrid system under three phase fault is investigated with MATLAB based Graphical User Interface (GUI) for studying the effects of voltage changes on load buses having static polynomial (ZIP) loads. Load modeling is always a critical aspect on approaching power system rationally. Examining the behavior of the ZIP load model under a faulty condition is the main objective of this paper. Static...
Today some camera systems provide various opportunities to the scientists in computer vision since they capture color and depth images of a scene simultaneously. This paper presents a new 3D model construction and surface texture mapping technique for real object images captured by Microsoft (MS) Kinect camera system. Our ultimate goal is to construct textured 3D model of the real objects. To achieve...
Short Tandem Repeats (STR) are specific repeats of a sequence of four or more nucleotides with no breaks in it (e.g. ATAGATAGATAGATAG where ‘ATAG’ is the repeating sequence). In criminal investigations involving biological evidence, the FBI recognizes 13 core loci (specific areas on chromosomes where STRs are most commonly found) where usually one or two alleles exist for every individual [1]. These...
In this paper, we rigorously define the problem of mining probabilistic association rules from uncertain databases. We further analyze the probability distribution space of a candidate probabilistic association rule, and propose an efficient mining algorithm with pruning to find all probabilistic association rules from uncertain databases.
We demonstrate both analytically and numerically that the modal analysis of optical slab waveguides based on the total internal reflection (TIR) method and the wave equation method are equivalent. The analytical method based on the TIR and Fresnel equations is also applied to the evanescently-pumped active waveguides where the cladding layers have optical gain, and the results are compared to the...
There had been significant research on background mosaic or sprite generation in the past. In some application domains such as surveillance, the complete view of an object might be of interest rather than the background scene. In this paper, we present object mosaicking for reconstruction of a moving object from its partial views due to limited view or object occlusion. Object mosaicking may play...
A Genetic Algorithm (GA) based approach is proposed in this paper to search optimal assembly sequences in a robotic autonomous assembly task. In particular, the chromosome definition, the operations of crossover, copy and mutation and a specific fitness table are presented. Some simulation results are employed to validate the effectiveness of the proposed approach. The simulation results also indicate...
Collaborative learning has been used extensively in undergraduate education to improve learning for all students. To improve performance in computer science courses, our study incorporated a new, although related, pedagogical approach entitled Collaborative-Adversarial Pair Learning (CAPL). The CAPL employs a software development technique called Collaborative-Adversarial Pairs (CAP) to teach computer...
There is a classic tension between technical requirements and user requirements - users care little about technical requirements, especially when they interrupt task completion. This tension is elevated within the burgeoning “Bring Your Own Device” (BYOD) model of enterprise mobility enablement - users care even less about technical requirements when they interrupt use of their personal mobile device,...
It has been known that the primes are infinite in number but the exact sequence of primes is not predictable. Prime numbers and computers have been linked since the 1950s. Computer security authorities use extremely large prime numbers when they devise cryptographs, like RSA (short for Rivest, Shamir, and Adleman) algorithm, for protecting vital information that is transmitted between computers. There...
The data confirm that a decrease in base dimension improves the performance of the bipolar junction transistor. In addition, modifications in design and procedures have improved the quantity and quality of the data collected.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.