The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent times, we may notice some new designs of underwater vehicles, which imitate living underwater organisms, e.g. a fish. These vehicles are called biomimetic. They are driven by undulating propulsion, imitating wavy motion of fins. In the paper, problem of mathematical modeling of underwater vehicle with undulating propulsion is undertaken. This model can be used, e.g. for initial tuning of...
Assurance (Security and Safety) Case is a proven-in-use methodology to demonstrate a system compliance with security and safety critical requirements. An advance approach to improve Assurance Case is proposed in a view of Assurance Case Driven Design (AC DD). A practical using of AC DD lays in cost-effectiveness improvement of certification and licensing processes Assurance Case is based on graphical...
With all features and resources, such as: social actors, social relations, content, communication, and ratings that todays' social networks like Facebook, LinkedIn, Twitter, Google+, etc. offer to users, it still appears that at given point we have to refine and optimize our own accounts within the limits of a certain social network. In line with this trend, in this paper we present a model for efficient...
This paper proposes an online cake-cutting protocol without a long wait. Cake-cutting protocols are used to fairly divide a heterogeneous divisible good among some number of people. Though many protocols have been proposed, most of them assume that all people must simultaneously execute one protocol. Walsh proposed an online cake-cutting protocol, in which each player can join to the protocol at any...
This paper makes a comparison between two control methods for maximum power point tracking (MPPT) of a photovoltaic (PV) system under varying irradiation and temperature conditions: the fuzzy logic and the neural network control. Both techniques have been simulated and analyzed by using Matlab/Simulink software. The power transitions at varying irradiation and temperature conditions have been simulated...
This paper discusses the development of a neural network array model for predicting the radiation performance characteristics of the horn fed parabolic reflector and the dipole fed corner satellite antennas. A number of neural networks were developed in order to predict the radiation characteristics for various combinations of the design parameters. The results obtained from the neural network array...
In this paper, two transit problems which pass through the ε-neighborhood of some given objective states in turn from an arbitrary initial state will be studied for both continuous-time and discrete-time switched linear systems with constant input. At first the quadratic stabilization problem for continuous-time switched linear systems with constant input will be investigated. Next, the same problem...
With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature...
One of the key subsystems from point of view of security of the complex IoT system is the smart business center (SB?) system. Some problems the design and operation of the SBC system are analyzed. When analysis of safety of the IoT system must take into account the reliability and security of the system at several levels: the level of sensors, the level of communication (communication lines, router,...
Autonomous underwater vehicles are vehicles that are entirely or partly independent of human decisions. In order to obtain operational independence, the vehicles have to be equipped with a specialized software that usually has many different parameters. The parameters decide about effectiveness of the software and in consequence the vehicle. The paper reports experiments performed in simulation, whose...
If the pre-processing phase, in optical character recognition systems, is the heart of the recognition process, the segmentation stage is the "aorta" of this heart. This paper introduce a reliable segmentation technique for Arabic handwritten script. Number of techniques like, script height, character width, pen thickness and word/subword gaps are used to design an efficient segmentation...
In this paper, we describe how to use the dihedral group theory to detect symmetry on Facial Key Points (FKP) to recognize real emotions. We present an algorithm for symmetry detection with the dihedral group and deploy it for finding symmetry (rotation and reflection) on FKP. The method can be applied in many areas which have the same data texture. The method used for real emotion recognition and...
In this work a distributed algorithm for the optimization of signal setting on urban network is proposed. The Traffic Signal Synchronization is a traffic engineering technique of matching the green light times for a series of intersections to enable the maximum number of vehicles to pass through, thereby reducing stops and delays experienced by motorists. Synchronizing Traffic Signals ensures a better...
We present the design of a dialog manager that performs speech intent recognition, based on a finite state machine which enables simultaneous processing of multiple sub-modules and maintains ordered transitions of system states. The dialog manager is integrated into a spoken dialog system. The application area of this system is targeted on robots, and the core problem that we address is to recognize...
Multithreshold decoder (MTD) is the simplest type of majority decoder that decodes self-orthogonal codes. Low computational complexity and simple decoding hardware implementation of multithreshold decoders allow using them in high speed communication systems and data storage systems that require decoding information at speeds above 1 Gbit/s. A high-speed software binary multithreshold decoder using...
This emergence of the heterogeneous computing is based mainly on various forms of parallel accelerators. We present a family of accelerators for embedded computation with a map-reduce architecture based on the partial recursive functions computation model introduced by Stephen Kleene. A three-level virtual prototyping environment is provided to support the development of embedded applications. The...
The Axelrod model for the evolution of cultural domains is a stochastic spatial process, with parameters the number of cultural features f and their states q, that has been studied primarily by numerical simulations in social sciences and statistical physics. It may also be viewed as an asynchronous cellular automaton that exhibits a phase transition or, for a certain range of its parameters, as a...
Aim of this work is the development of a competitive alternate design topology (in terms of power density) of a small permanent magnet dc (PMDC) motor found in automotive applications. Initially, a real industrial motor is measured, designed and simulated, while its measurements and the relevant manufacturer data are considered as a benchmark. In turn, through custom developed software, a redesigned...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.