Applied Soft Computing Strategies for Autonomous Field ... - CiteSeerX
Recommend Documents
In today's global world fast and reliable medical diagnosis is of vital importance as can be seen, for .... dispersedly located expert sources has to be supported by an adequate interface, various expert opinions have ..... In the best case, the info
Suite, LS/TS, a middleware based on autonomous soft- ware agents and autonomic computing principles. Specif- ically, the paper describes the autonomic ...
also identify context and broaden relations (Duch et al., 2000). Due to ..... Ich dziaÅanie zilustrowano na przykÅadzie detekcji uszkodzeÅ wentylatora dużej mocy.
Jan 29, 2003 - works, evolutionary computation, and chaos theory. Controlling real- ... Soft computing, fuzzy logic, neural networks, genetic .... In the absence of the second term in (4), .... trol combines the advantages of fuzzy logic (use of expe
A GSM modem is used to communicate the data via the SMS protocol to a laptop computer. .... platform for software development (mspgcc.sourceforge.net). ... After 24 hours of measurements the all the collected data is sent in bulk via SMS.
example on static signature verification is presented, ... ple, in particular for signature verification, is de- .... tronic pen and/or an electronic pad) for the acquisi-.
valuable and feasible solutions to the emerging social media and big data, .... was applied to CyVOD.net, a multimedia social-network-platform prototype sys-.
dian Statistical Institute, Kolkata 700 108, India (e-mail: [email protected]). ..... of divide-and-conquer strategy facilitates convergence. ...... The files han-.
Article history: ... time [1]. Search engines are the predominant tools for finding and .... an advanced optimization, as k1 â [1.2, 2.0] and b is 0.75. IDF(qi) is.
Ranking web pages for presenting the most relevant web pages to user's queries is one .... drawn. k1 and b are free parameters, usually chosen, in absence of.
autonomously managed (i.e. created and dropped) by the ..... cheap. The complexity of the above algorithm is obviously. O(n log n) for n index candidates due to ...
Server. The server is based on two quad-core Xeon 5355 âClovertownâ CPUs, with .... and with dedicated routines on 1, 2, and 4 GPUs on a S1070 computing ...
... single cubic shape like Molecube [13], which does not require much free space .... The virtual-cell based mechanoche
The last thirty years saw a dramatic rise in popularity of nature-inspired metaheuristics .... Functions 9-12 map five holes of equal width. One of ..... vector is limited within the range [−vmax i,vmax i]. 2 min max max i i i u v. −. ⋅= (5) ... The
demands of biometric systems are robustness, high recognition rates, capability to handle ..... periocular-only, and face + periocular templates formed for.
Jan 4, 2010 - An ideal-seeking fuzzy data envelopment analysis framework ..... utive steps: a predictive information step tying current financial data to future ...
Apr 18, 2014 - Present study deals with the adoption of newer technologies for developing nations. Most of the devel- .... of vehicle for deduction of toll tax and issuing/recording viola- tion enforcement ..... Above average (AA). (0.4, 0.5, 0.5 ...
Mar 12, 1997 - 7.1 Recuperative Turboshaft Engine Control (LV100) ... and Fuzzy Control: Optimal Load Cycling of Large Steam Turbines : : : : : : : 23.
Mar 12, 1997 - 5.3 High Throughput ..... ance for imprecision, thus providing us with an imprecise answer that is still useful, ... We will emphasize the role of fuzzy logic in developing supervisory ..... but rather a rst order polynomial in the sta
order approximate, dynamic models for analysis and control synthesis, particularly with respect to parameter variations
GU2 7XH, U.K. (e-mail: [email protected]). Y. Meng is with the Department ...... for evolving neurogenesis for a hydra-like animats [41]. The weights of the ...
Systems (BSS) is mainly due to its door-to-door feature (DeMaio, 2009). BSS allow to ... (no available slot) or empty station (no available bike). Thus, from the ...
the best non-fictitious offer available in the last decision process. Once the .... negotiation progress index increases, the new offers are formulated at a cheapest cost. ... alternative server and is blocking the hosting workstation). After the req
B. Davvaz and V. Leoreanu-Fotea. Applications of interval valued fuzzy n-ary polygroups with respect to t-norms (t-conorms). Computers & Mathematics with.
Applied Soft Computing Strategies for Autonomous Field ... - CiteSeerX