摘要 :
The authors present an approach for input-to-state stabilizing control of dynamic neural networks, which extends the existing result in the literature to a wider class of systems. This methodology is developed by using the Lyapuno...
展开
The authors present an approach for input-to-state stabilizing control of dynamic neural networks, which extends the existing result in the literature to a wider class of systems. This methodology is developed by using the Lyapunov technique, inverse optimality, and the Hamilton-Jacobi-Bellman equation. Depending on the dimensions of state and input, we construct two inverse optimal feedback laws to achieve the input-to-state stabilization of a wider class of dynamic neural network systems. With the help of the Sontag's formula, one of two control laws is developed from the creation of a scalar function to eliminate a restriction requiring the same number of states and inputs. In addition, the proposed designs achieve global asymptotic stability and global inverse optimality with respect to some meaningful cost functional. Numerical examples demonstrate the performance of the approach.
收起
摘要 :
An algorithm is developed for computing which sensors to add to meet a diagnosis requirement specification concerning fault detectability and fault isolability. The method is based only on the structural information in a model, wh...
展开
An algorithm is developed for computing which sensors to add to meet a diagnosis requirement specification concerning fault detectability and fault isolability. The method is based only on the structural information in a model, which means that possibly large and nonlinear differential-algebraic models can be handled in an efficient manner. The approach is exemplified on a model of an industrial valve where the benefits and properties of the method are clearly shown.
收起
摘要 :
The identification of chromosome abnormalities is an essential part of diagnosis and treatment of genetic disorders such as chromosomal syndromes and many types of cancer. Modern cytogenetic imaging techniques have improved the st...
展开
The identification of chromosome abnormalities is an essential part of diagnosis and treatment of genetic disorders such as chromosomal syndromes and many types of cancer. Modern cytogenetic imaging techniques have improved the study of chromosome aberrations but they are most often used as adjuncts to traditional G-banded karyotype analysis. Molecular cytogenetic techniques such as comparative genomic hybridization, multicolor fluorescence in situ hybridization, and spectral karyotyping (SKY) are able to detect chromosome copy number changes and complex structural aberrations in cancers, particularly in hematological malignancies and solid tumors. However, banded chromosome analysis is essential to distinguish between normal and abnormal chromosomes. Currently available cytogenetic imaging software is designed to classify only normal chromosomes. The identification of the banded regions involved in the abnormal chromosomes is done manually. In this paper, we propose an algorithm to automate the banding analysis of abnormal chromosomes by comparing the information obtained by SKY for precise identification of translocation break points. Our algorithm is based on the dynamic time warping method in order to overcome the problems due to the nonrigid nature of chromosomes. The method has been implemented and successfully applied to detect chromosome translocations, deletions, and duplications in cell lines derived from solid tumors.
收起
摘要 :
Deadlock prevention is a crucial step in the modeling of flexible manufacturing systems. In the Petri net framework, deadlock prevention policies based on siphon control are often employed, since it is easy to specify generalized ...
展开
Deadlock prevention is a crucial step in the modeling of flexible manufacturing systems. In the Petri net framework, deadlock prevention policies based on siphon control are often employed, since it is easy to specify generalized mutual exclusion constraints that avoid the emptying of siphons. However, such policies may require an excessive computational load and result in impractical oversized control subnets. This is often a consequence of the redundancy in the control conditions derived from siphons. In this paper, a novel method is proposed that provides small size controllers, based on a set covering approach that conveniently relates siphons and markings. Some examples are provided to demonstrate the feasibility of the approach and to compare it with other methods proposed in the literature.
收起
摘要 :
Event sequences estimation is an important issue for fault diagnosis of Discrete event systems, so far as fault events cannot directly be measured. This paper is about event sequences estimation with Petri net models. Events are a...
展开
Event sequences estimation is an important issue for fault diagnosis of Discrete event systems, so far as fault events cannot directly be measured. This paper is about event sequences estimation with Petri net models. Events are assumed to be represented with transitions, and firing sequences are estimated from measurements of the marking variation. Estimation with and without measurement errors are discussed in n-dimensional vector space over alphabet Z 3 = {-1, 0, 1}. Sufficient conditions and estimation algorithms are provided. Performance is evaluated, and the efficiency of the approach is illustrated on two examples from manufacturing engineering.
收起
摘要 :
Making Web services context-aware is a challenge. This is like making Web service expose appropriate behaviors in response to changes detected in the environment. Context awareness requires a review and extension of the current ex...
展开
Making Web services context-aware is a challenge. This is like making Web service expose appropriate behaviors in response to changes detected in the environment. Context awareness requires a review and extension of the current execution model of Web services. This paper discusses the seamless combination of context and policy to manage behaviors that Web services expose during composition and in response to changes in the environment. For this purpose, a four-layer approach is devised. These layers are denoted by policy, user, Web service, and resource. In this approach, behavior management and binding are subject to executing policies of types permission, obligation, restriction, and dispensation. A prototype that illustrates how context and policy are woven into Web services composition scenarios is presented as well.
收起
摘要 :
This paper proposes a novel low-complexity lip contour model for high-level optic feature extraction in noise-robust audiovisual (AV) automatic speech recognition systems. The model is based on weighted least-squares parabolic fit...
展开
This paper proposes a novel low-complexity lip contour model for high-level optic feature extraction in noise-robust audiovisual (AV) automatic speech recognition systems. The model is based on weighted least-squares parabolic fitting of the upper and lower lip contours, does not require the assumption of symmetry across the horizontal axis of the mouth, and is therefore realistic. The proposed model does not depend on the accurate estimation of specific facial points, as do other high-level models. Also, we present a novel low-complexity algorithm for speaker normalization of the optic information stream, which is compatible with the proposed model and does not require parameter training. The use of the proposed model with speaker normalization results in noise robustness improvement in AV isolated-word recognition relative to using the baseline high-level model.
收起
摘要 :
Recommender systems are gaining widespread acceptance in e-commerce applications to confront the ldquoinformation overloadrdquo problem. Providing justification to a recommendation gives credibility to a recommender system. Some r...
展开
Recommender systems are gaining widespread acceptance in e-commerce applications to confront the ldquoinformation overloadrdquo problem. Providing justification to a recommendation gives credibility to a recommender system. Some recommender systems (Amazon.com, etc.) try to explain their recommendations, in an effort to regain customer acceptance and trust. However, their explanations are not sufficient, because they are based solely on rating or navigational data, ignoring the content data. Several systems have proposed the combination of content data with rating data to provide more accurate recommendations, but they cannot provide qualitative justifications. In this paper, we propose a novel approach that attains both accurate and justifiable recommendations. We construct a feature profile for the users to reveal their favorite features. Moreover, we group users into biclusters (i.e., groups of users which exhibit highly correlated ratings on groups of items) to exploit partial matching between the preferences of the target user and each group of users. We have evaluated the quality of our justifications with an objective metric in two real data sets (Reuters and MovieLens), showing the superiority of the proposed method over existing approaches.
收起
摘要 :
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the person to communicate. Interfaces that assist in such comm...
展开
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the person to communicate. Interfaces that assist in such communication are often intrusive, require special hardware, or rely on active infrared illumination. A nonintrusive communication interface system called EyeKeys was therefore developed, which runs on a consumer-grade computer with video input from an inexpensive Universal Serial Bus camera and works without special lighting. The system detects and tracks the person's face using multiscale template correlation. The symmetry between left and right eyes is exploited to detect if the person is looking at the camera or to the left or right side. The detected eye direction can then be used to control applications such as spelling programs or games. The game ldquoBlockEscaperdquo was developed to evaluate the performance of EyeKeys and compare it to a mouse substitution interface. Experiments with EyeKeys have shown that it is an easily used computer input and control device for able-bodied people and has the potential to become a practical tool for people with severe paralysis.
收起
摘要 :
The objective of this paper is twofold. First, a new model of team optimization is formulated. Second, this model is used to investigate the effects of uncertainty on interaction. A model of team optimization that encompasses the ...
展开
The objective of this paper is twofold. First, a new model of team optimization is formulated. Second, this model is used to investigate the effects of uncertainty on interaction. A model of team optimization that encompasses the classical team decision problem is introduced. This model is suitable for problems where agents' posterior information is not shared and is possibly inconsistent with the mutual prior information. For a broad class of problems, every agent's dominant beliefs about the posterior information of the other agents are derived. Then, the level of interaction and the level of uncertainty are defined, and the relationship between these two levels is studied. It is shown that the optimal level of interaction decreases as the level of uncertainty increases, and in some cases, the optimal level of interaction tends to zero, suggesting that the optimization problem may be decomposed. The theoretical results are demonstrated on sensor network examples.
收起