name
stringlengths
7
10
title
stringlengths
13
125
abstract
stringlengths
67
3.02k
fulltext
stringclasses
1 value
keywords
stringlengths
17
734
train_538
Polarization of the RF field in a human head at high field: a study with a
quadrature surface coil at 7.0 T The RF field intensity distribution in the human brain becomes inhomogeneous due to wave behavior at high field. This is further complicated by the spatial distribution of RF field polarization that must be considered to predict image intensity distribution. An additional layer of compl...
human brain;whole-body mri;reception fields;quadrature surface coil;phantom samples;7.0 t;high field mri;finite difference time domain method;segmented images;spatial distribution;transmission fields;rf field intensity distribution;high-field coil design;computer modeling;gradient echo images;300 mhz;image intensity di...
train_539
Perfusion quantification using Gaussian process deconvolution
The quantification of perfusion using dynamic susceptibility contrast MRI (DSC-MRI) requires deconvolution to obtain the residual impulse response function (IRF). In this work, a method using the Gaussian process for deconvolution (GPD) is proposed. The fact that the IRF is smooth is incorporated as a constraint in the...
perfusion quantification;gaussian process deconvolution;residual impulse response function;likelihood function;singular value decomposition;mean transit time;capillary blood flow;correlation length;dynamic susceptibility contrast mri;noise level;optimized joint gaussian distribution;optimized model parameters
train_54
Controls help harmonic spray do OK removing residues
Looks at how innovative wafer-cleaning equipment hit the market in a timely fashion thanks in part to controls maker Rockwell Automation
rockwell automation;residues removal;allen-bradley 1336 plus ii variable frequency ac drives;wafer-cleaning equipment;harmonic spray;allen-bradley controllogix automation control platform;motion control;psi machine
train_540
Ventilation-perfusion ratio of signal intensity in human lung using
oxygen-enhanced and arterial spin labeling techniques This study investigates the distribution of ventilation-perfusion (V/Q) signal intensity (SI) ratios using oxygen-enhanced and arterial spin labeling (ASL) techniques in the lungs of 10 healthy volunteers. Ventilation and perfusion images were simultaneously acquire...
multiple inert gas elimination;oxygen-enhanced techniques;ventilation-perfusion ratio;time delay;gas exchange efficiency;logarithmic normal distribution;mri;ventilation images;chronic obstructive pulmonary disease;pixel-by-pixel maps;pulmonary embolism;arterial spin labeling techniques;perfusion images;flow-sensitive a...
train_541
Virtual-reality-based multidimensional therapy for the treatment of body image
disturbances in binge eating disorders: a preliminary controlled study The main goal of this paper is to preliminarily evaluate the efficacy of a virtual-reality (VR)-based multidimensional approach in the treatment of body image attitudes and related constructs. The female binge eating disorder (BED) patients (n=20), ...
obesity;virtual reality;body image disturbances;multidimensional therapy;psychiatric symptoms;psychonutritional groups;anxiety;cognitive-behavior approach;residential weight control treatment;binge eating disorders;patient therapy
train_542
The treatment of fear of flying: a controlled study of imaginal and virtual
reality graded exposure therapy The goal of this study was to determine if virtual reality graded exposure therapy (VRGET) was equally efficacious, more efficacious, or less efficacious, than imaginal exposure therapy in the treatment of fear of flying. Thirty participants (Age=39.8+or-9.7) with confirmed DSM-IV diagno...
chi-square test;flying fear;phobia;virtual reality graded exposure therapy;physiological feedback;patient treatment;behavioral observations;imaginal exposure therapy;physiology;questionnaires;subjective ratings of anxiety
train_543
The development of virtual reality therapy (VRT) system for the treatment of
acrophobia and therapeutic case Virtual reality therapy (VRT), based on this sophisticated technology, has been used in the treatment of subjects diagnosed with acrophobia, a disorder that is characterized by marked anxiety upon exposure to heights and avoidance of heights. Conventional VR systems for the treatment of ...
virtual scene;patient treatment;heights phobia;clinical treatment;exposure therapy;acrophobia treatment;psychotherapy;patient anxiety;therapeutic case;virtual reality therapy system;personal computer;realistic virtual environment
train_544
Virtual reality treatment of flying phobia
Flying phobia (FP) might become a very incapacitating and disturbing problem in a person's social, working, and private areas. Psychological interventions based on exposure therapy have proved to be effective, but given the particular nature of this disorder they bear important limitations. Exposure therapy for FP migh...
medical virtual reality;anxiety disorders;patient treatment;psychology;exposure therapy;flying phobia;psychological interventions;virtual exposure
train_545
Interaction and presence in the clinical relationship: virtual reality (VR) as
communicative medium between patient and therapist The great potential offered by virtual reality (VR) to clinical psychologists derives prevalently from the central role, in psychotherapy, occupied by the imagination and by memory. These two elements, which are fundamental in our life, present absolute and relative li...
psychological therapy;shared virtual hospital;virtual reality;patient-therapist communication;presence;imagination;psychotherapy;clinical psychology;memory;clinical virtual environment
train_546
Real-time quasi-2-D inversion of array resistivity logging data using neural
network We present a quasi-2-D real-time inversion algorithm for a modern galvanic array tool via dimensional reduction and neural network simulation. Using reciprocity and superposition, we apply a numerical focusing technique to the unfocused data. The numerically focused data are much less subject to 2-D and layerin...
forward modeling;array resistivity logging data;formation resistivity;unfocused data;superposition;real-time quasi-2-d inversion;neural network;well site;numerical focusing technique;focused data;galvanic array tool;1-d inversion;reciprocity;real-time inversion algorithm;dimensional reduction
train_547
Excess energy [cooling system]
The designers retrofitting a comfort cooling system to offices in Hertfordshire have been able to make use of the waste heat rejected. what's more they're now making it a standard solution for much larger projects
waste heat;comfort cooling system;air conditioning;nationwide trust
train_548
Cool and green [air conditioning]
In these days of global warming, air conditioning engineers need to specify not just for the needs of the occupants, but also to maximise energy efficiency. Julian Brunnock outlines the key areas to consider for energy efficient air conditioning systems
energy efficiency;air conditioning
train_549
Taking it to the max [ventilation systems]
Raising the volumetric air supply rate is one way of increasing the cooling capacity of displacement ventilation systems. David Butler and Michael Swainson explore how different types of diffusers can help make this work
displacement ventilation systems;diffusers;cooling capacity;volumetric air supply rate
train_55
Self-testing chips take a load off ATE
Looks at how chipmakers get more life out of automatic test equipment by embedding innovative circuits in silicon
innovative circuits;embedded deterministic testing technique;automatic test equipment;design-for-test techniques;ate;self-testing chips
train_550
Market watch - air conditioning
After a boom period in the late nineties, the air conditioning market finds itself in something of a lull at present, but manufacturers aren't panicking
air conditioning;market
train_551
Access privilege management in protection systems
We consider the problem of managing access privileges on protected objects. We associate one or more locks with each object, one lock for each access right defined by the object type. Possession of an access right on a given object is certified by possession of a key for this object, if this key matches one of the obje...
protection systems;protected objects;key-lock technique;locks;selective revocation;lock conversion function;polymorphic access rights;complex access privilege possession certification;access privilege management
train_552
Anatomy of the coupling query in a Web warehouse
To populate a data warehouse specifically designed for Web data, i.e. Web warehouse, it is imperative to harness relevant documents from the Web. In this paper, we describe a query mechanism called coupling query to glean relevant Web data in the context of our Web warehousing system called Warehouse Of Web Data (WHOWE...
content;internal structure;partial knowledge;html documents;coupling text;hyperlinked documents;graphical query formulation;web warehouse;execution control;metadata;textual query formulation;tag attributes;web documents;data warehouse;warehouse of web data;xml documents;topological structure;conjunctive query condition...
train_553
Application of traditional system design techniques to Web site design
After several decades of computer program construction there emerged a set of principles that provided guidance to produce more manageable programs. With the emergence of the plethora of Internet web sites one wonders if similar guidelines are followed in their construction. Since this is a new technology no apparent u...
structured programming;system design techniques;internet web site design
train_554
A scalable and lightweight QoS monitoring technique combining passive and
active approaches: on the mathematical formulation of CoMPACT monitor To make a scalable and lightweight QoS monitoring system, we (2002) have proposed a new QoS monitoring technique, called the change-of-measure based passive/active monitoring (CoMPACT Monitor), which is based on the change-of-measure framework and is...
active monitoring;internet;network performance;quality of service;qos monitoring;delay distributions;passive monitoring;compact monitor;change-of-measure
train_555
Computing transient gating charge movement of voltage-dependent ion channels
The opening of voltage-gated sodium, potassium, and calcium ion channels has a steep relationship with voltage. In response to changes in the transmembrane voltage, structural movements of an ion channel that precede channel opening generate a capacitative gating current. The net gating charge displacement due to membr...
ion channels;markov state model;inactivation;charge movement;gating current;immobilization;action potentials;transmembrane voltage;transient gating charge movement
train_556
Coarse-grained reduction and analysis of a network model of cortical response:
I. Drifting grating stimuli We present a reduction of a large-scale network model of visual cortex developed by McLaughlin, Shapley, Shelley, and Wielaard. The reduction is from many integrate-and-fire neurons to a spatially coarse-grained system for firing rates of neuronal subpopulations. It accounts explicitly for s...
phase-averaged firing rates;visual cortex;neuronal networks;point-neuron network;coarse-graining;large-scale network model;dynamics;orientation selectivity;nonlinear spatiotemporal integral equations
train_557
Noise and the PSTH response to current transients: II. Integrate-and-fire model
with slow recovery and application to motoneuron data For pt.I see ibid., vol.11, no.2 , p.135-151( 2001). A generalized version of the integrate-and-fire model is presented that qualitatively reproduces firing rates and membrane trajectories of motoneurons. The description is based on the spike-response model and incl...
passive membrane time constant;spike-response model;spike afterpotential;recovery time;psth;membrane trajectories;integrate-and-fire model;motoneuron;firing rates
train_558
OS porting and application development for SoC
To deliver improved usability in high-end portable consumer products, the use of an appropriate consumer operating system (OS) is becoming far more widespread. Using a commercially supported OS also vastly increases the availability of supported applications. For the device developer, this trend adds major complexity t...
consumer operating system;application development;os porting;hardware design
train_559
Is open source more or less secure?
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. The paper takes a management view of protection and seeks to reconc...
open source software security;attack technology;management;computer networks;data security;commercial technical protection
train_56
New thinking on rendering
Looks at how graphics hardware solves a range of rendering problems
color values;graphics hardware;rendering;gourand-shaded image;programmability
train_560
Citizen centric identity management: chip tricks?
Accelerating and harmonizing the diffusion and acceptance of electronic services in Europe in a secure and practical way has become a priority of several initiatives in the past few years and a critical factor for citizen and business information society services. As identification and authentication is a critical elem...
public key infrastructure;electronic services;legal framework;user identification;citizen centric identity management;business information services;standardization;government;smart cards;authentication;public information services
train_561
SubSeven's Honey Pot program
A serious security threat today are malicious executables, especially new, unseen malicious executables often arriving as email attachments. These new malicious executables are created at the rate of thousands every year and pose a serious threat. Current anti-virus systems attempt to detect these new malicious program...
email attachments;malicious executables;trojan horse;security threat;subseven;intrusion detection systems;honey pot program;anti-virus systems
train_562
The Advanced Encryption Standard - implementation and transition to a new
cryptographic benchmark Cryptography is the science of coding information to create unintelligible ciphers that conceal or hide messages. The process that achieves this goal is commonly referred to as encryption. Although encryption processes of various forms have been employed for centuries to protect the exchange of ...
cryptographic benchmark;coding;business;industry;government;aes;advanced encryption standard;data exchange;unintelligible ciphers
train_563
Getting the most out of intrusion detection systems
Intrusion detection systems (IDS) can play a very valuable role in the defence of a network. However, it is important to understand not just what it will do (and how it does it) - but what it won't do (and why). This article does not go into the technical working of IDS in too much detail, rather it limits itself to a ...
network attacks;intrusion detection systems;firewall;computer network security
train_564
Development of a computer-aided manufacturing system for profiled edge
lamination tooling Profiled edge lamination (PEL) tooling is a promising rapid tooling (RT) method involving the assembly of an array of laminations whose top edges are simultaneously profiled and beveled based on a CAD model of the intended tool surface. To facilitate adoption of this RT method by industry, a comprehe...
cam software;profiled edge lamination tooling;computer aided manufacturing;abrasive water jet cutting;cutting trajectory algorithms;identical equidistant profile segmentation;rapid tooling;adaptively vector profiles projection
train_565
Control of thin film growth in chemical vapor deposition manufacturing systems:
a feasibility study A study is carried out to design and optimize chemical vapor deposition (CVD) systems for material fabrication. Design and optimization of the CVD process is necessary to satisfying strong global demand and ever increasing quality requirements for thin film production. Advantages of computer aided o...
material fabrication;operational costs;titanium nitride films;optimization;tin;precursor concentration;susceptor temperature;thin film growth;film quality;reactor gas flow rate;parameter space mappings;chemical vapor deposition
train_566
Sensing and control of double-sided arc welding process
The welding industry is driven to improve productivity without sacrificing quality. For thick material welding, the current practice is to use backing or multiple passes. The laser welding process, capable of achieving deep narrow penetration, can significantly improve welding productivity for such applications by redu...
process control;laser welding process;control system;controlled pulse keyhole;energy density;thick material welding;double-sided arc welding
train_567
Hidden Markov model-based tool wear monitoring in turning
This paper presents a new modeling framework for tool wear monitoring in machining processes using hidden Markov models (HMMs). Feature vectors are extracted from vibration signals measured during turning. A codebook is designed and used for vector quantization to convert the feature vectors into a symbol sequence for ...
tool wear monitoring;tool state detection;hidden markov models;machining processes;hmm training;feature extraction;turning process;codebook;discrete wavelet transform;vector quantization;vibration signals
train_568
Modeling cutting temperatures for turning inserts with various tool geometries
and materials Temperatures are of interest in machining because cutting tools often fail by thermal softening or temperature-activated wear. Many models for cutting temperatures have been developed, but these models consider only simple tool geometries such as a rectangular slab with a sharp corner. This report describ...
cutting temperature model;turning inserts;insert shape effects;parametric mesh generator;tool nose radius;temperature correction factor;tool geometries;machining;finite element models
train_569
Application of an internally consistent material model to determine the effect
of tool edge geometry in orthogonal machining It is well known that the edge geometry of a cutting tool affects the forces measured in metal cutting. Two experimental methods have been suggested in the past to extract the ploughing (non-cutting) component from the total measured force: (1) the extrapolation approach, a...
edge geometry;metal cutting;zinc;dwell force;cutting tool;tool edge geometry;ploughing component;orthogonal machining;extrapolation
train_57
Speaker adaptive modeling by vocal tract normalization
This paper presents methods for speaker adaptive modeling using vocal tract normalization (VTN) along with experimental tests on three databases. We propose a new training method for VTN: By using single-density acoustic models per HMM state for selecting the scale factor of the frequency axis, we avoid the problem tha...
two-pass strategy;training method;verlimobil;german spontaneous speech task;error rate reduction;sietill;training speakers;wsj task;single-density acoustic models;telephone digit string recognition;speaker adaptive modeling;hmm state;databases;vocal tract normalization;training results;single gaussian densities;frequen...
train_570
Prediction and compensation of dynamic errors for coordinate measuring machines
Coordinate measuring machines (CMMs) are already widely utilized as measuring tools in the modem manufacturing industry. Rapidly approaching now is the trend for next-generation CMMs. However, the increases in measuring velocity of CMM applications are limited by dynamic errors that occur in CMMs. In this paper a syste...
compensation;dynamic errors;inertial forces;neural networks;touch-trigger probe;laser interferometer;manufacturing industry;coordinate measuring machines
train_571
Control of transient thermal response during sequential open-die forging: a
trajectory optimization approach A trajectory optimization approach is applied to the design of a sequence of open-die forging operations in order to control the transient thermal response of a large titanium alloy billet. The amount of time the billet is soaked in furnace prior to each successive forging operation is ...
open-die forging;microstructural defects;temperature distribution;transient thermal response control;titanium alloy billet;heating profile;trajectory optimization
train_572
Characterization of sheet buckling subjected to controlled boundary constraints
A wedge strip test is designed to study the onset and post-buckling behavior of a sheet under various boundary constraints. The device can be easily incorporated into a conventional tensile test machine, and material resistance to buckling is measured as the buckling height versus the in-plane strain state. The design ...
boundary constraints;forming processes;wedge strip test;energy-based analytical wrinkling criterion;strain state;finite element analysis;stress field;sheet buckling;deformed geometry;tensile test machine
train_573
ECG-gated /sup 18/F-FDG positron emission tomography. Single test evaluation of
segmental metabolism, function and contractile reserve in patients with coronary artery disease and regional dysfunction /sup 18/F-fluorodeoxyglucose (/sup 18/F-FDG)-positron emission tomography (PET) provides information about myocardial glucose metabolism to diagnose myocardial viability. Additional information about...
normokinetic/hypokinetic/akinetic segments;left ventricular segment;myocardial glucose metabolism;fourier-based ecg-gated metabolic /sup 18/f-fluorodeoxyglucose-positron emission tomography;severe hypokinesis;/sup 18/f-fluorodeoxyglucose uptake;diseased left ventricles;myocardial viability;regional dysfunction;function...
train_574
A novel approach for the detection of pathlines in X-ray angiograms: the
wavefront propagation algorithm Presents a new pathline approach, based on the wavefront propagation principle, and developed in order to reduce the variability in the outcomes of the quantitative coronary artery analysis. This novel approach, called wavepath, reduces the influence of the user-defined start- and endpoi...
sidebranch pathline;bifurcation;lesion quantification;x-ray angiograms;correct vessel;wavefront propagation algorithm;wavefront propagation principle;quantitative coronary artery analysis;user-defined endpoints;corrections;user-defined startpoints;vessel segment;wavepath method
train_575
A new voltage-vector selection algorithm in direct torque control of induction
motor drives AC drives based on direct torque control of induction machines allow high dynamic performance to be obtained with very simple control schemes. The drive behavior, in terms of current, flux and torque ripple, is dependent on the utilised voltage vector selection strategy and the operating conditions. In thi...
high dynamic performance;torque variations;flux variations;rms value;stator current ripple;induction motor drives;operating conditions;direct torque control;50 hz;voltage-vector selection algorithm;ac drives;4-poles induction motor;inverter switching frequency;torque ripple;steady-state operation;torque step response;v...
train_576
Application of Sugeno fuzzy-logic controller to the stator field-oriented
doubly-fed asynchronous motor drive This study deals with the application of the fuzzy-control theory to wound-rotor asynchronous motor with both its stator and rotor fed by two PWM voltage-source inverters, in which the system operates in stator field-oriented control. Thus, after determining the model of the machine,...
stator field-oriented control;training;mamdani controller;pwm voltage-source inverters;stator field-oriented doubly-fed asynchronous motor drive;sugeno fuzzy-logic controller;speed regulation;wound-rotor asynchronous motor;fuzzy-control;machine modelling
train_577
A robust H/sub infinity / control approach for induction motors
This paper deals with the robustness and stability of an induction motor control structure against internal and external disturbances. In the proposed control scheme, we have used an H/sub infinity / controller with field orientation and input-output linearization to achieve the above-specified features. Simulation res...
input-output linearization;external disturbances;robustness;field orientation;internal disturbances;robust h/sub infinity / control;stability;induction motors control
train_578
New approach to standing phase angle reduction for power system restoration
During power system restoration, it is necessary to check the phase angle between two buses before closing circuit breakers to connect a line between them. These angles may occur across a tie line between two systems or between two connected subsystems within a system. In case of large standing phase angle (SPA) differ...
power line connection;synchrocheck relay;sensitivity factors;standing phase angle reduction approach;power system restoration;circuit breaker closing
train_579
Steinmetz system design under unbalanced conditions
This paper studies and develops general analytical expressions to obtain three-phase current symmetrization under unbalanced voltage conditions. It proposes two procedures for this symmetrization: the application of the traditional expressions assuming symmetry conditions and the use of optimization methods based on th...
optimization methods;balanced voltage assumption;power system control design;steinmetz system design;general analytical equations;three-phase current symmetrization;unbalanced voltage conditions
train_58
Robust speech recognition using probabilistic union models
This paper introduces a new statistical approach, namely the probabilistic union model, for speech recognition involving partial, unknown frequency-band corruption. Partial frequency-band corruption accounts for the effect of a family of real-world noises. Previous methods based on the missing feature theory usually re...
tidigits database;speaker-independent connected digit recognition;noisy bands;partial frequency-band corruption;partial feature stream corruption;noise characteristics;noise reduction techniques;missing feature theory;probabilistic union models;local frequency-band information;partial real-world noise;stationary noise;...
train_580
A genetic approach to the optimization of automatic generation control
parameters for power systems This paper presents a method based on genetic algorithm for the automatic generation control of power systems. The technique is applied to control a system, which includes two areas tied together through a power line. As a consequence of continuous load variation, the frequency of the power...
control simulation;frequency transients;continuous load variation;power systems automatic generation control parameters optimization;control design;frequency bias factors;genetic algorithm;interconnected power networks;integral controller gains;power line
train_581
Successive expansion method of network planning applying symbolic analysis
method The conventional power system network successive expansion planning method is discussed in the context of the new paradigm of competitive electric power, energy and service market. In sequel, the paper presents an application of the conceptually new computer program, based on the symbolic analysis of load flows ...
competitive electric power market;computer program;precalculated distribution factors;power system dc load flows;competitive electric energy market;symbolic analyzer;sensitivity analysis;symbolic analysis;competitive electric service market;compensation methods;load flows;power system network expansion planning method;...
train_582
Optimal estimation of a finite sample of a discrete chaotic process
The synthesis of optimal algorithms for estimating discrete chaotic processes specified by a finite sample is considered; various possible approaches are discussed. Expressions determining the potential accuracy in estimating a single value of the chaotic process are derived. An example of the application of the genera...
optimal algorithm synthesis;finite sample;space-time filtering;discrete chaotic process;optimal estimation
train_583
Neural networks in optimal filtration
The combined use and mutual influence of neural networks and optimal filtering is considered; the neural-network and filtering approaches are compared by solving two simple optimal-filtering problems: linear filtering and the filtering of a binary telegraph signal corresponding to observations in discrete white noise
binary telegraph signal;linear filtering;observations;optimal filtering;neural networks;discrete white noise
train_584
Hybrid fuzzy modeling of chemical processes
Fuzzy models have been proved to have the ability of modeling all plants without any priori information. However, the performance of conventional fuzzy models can be very poor in the case of insufficient training data due to their poor extrapolation capacity. In order to overcome this problem, a hybrid grey-box fuzzy m...
expert fuzzy model;fuzzy decision module;chemical processes;process modeling;fuzzy modeling
train_585
Fuzzy system modeling in pharmacology: an improved algorithm
In this paper, we propose an improved fuzzy system modeling algorithm to address some of the limitations of the existing approaches identified during our modeling with pharmacological data. This algorithm differs from the existing ones in its approach to the cluster validity problem (i.e., number of clusters), the proj...
pharmacokinetic modeling;fuzzy sets;significant input determination;cluster validity problem;pharmacology;projection schema;predictive performance;fuzzy system modeling;fuzzy logic
train_586
A strategy for a payoff-switching differential game based on fuzzy reasoning
In this paper, a new concept of a payoff-switching differential game is introduced. In this new game, any one player at any time may have several choices of payoffs for the future. Moreover, the payoff-switching process, including the time of payoff switching and the outcome payoff, of any one player is unknown to the ...
differential game;payoff switching;fuzzy reasoning;outcome payoff;reasoning strategy;game similarity matrix;fuzzy inference;weighting vectors;payoff-switching differential game;fuzzy matrices
train_587
An improved self-organizing CPN-based fuzzy system with adaptive
back-propagation algorithm This paper describes an improved self-organizing CPN-based (Counter-Propagation Network) fuzzy system. Two self-organizing algorithms IUSOCPN and ISSOCPN, being unsupervised and supervised respectively, are introduced. The idea is to construct the neural-fuzzy system with a two-phase hybrid l...
structure learning;counter-propagation network;initial parameters setting;neural-fuzzy system;self-organizing fuzzy system;gradient descent;back-propagation learning scheme;hybrid learning
train_588
An accurate COG defuzzifier design using Lamarckian co-adaptation of learning
and evolution This paper proposes a design technique of optimal center of gravity (COG) defuzzifier using the Lamarckian co-adaptation of learning and evolution. The proposed COG defuzzifier is specified by various design parameters such as the centers, widths, and modifiers of MFs. The design parameters are adjusted w...
learning;local search;fuzzy logic controller;evolution;optimal center of gravity defuzzifier
train_589
Hierarchical neuro-fuzzy quadtree models
Hybrid neuro-fuzzy systems have been in evidence during the past few years, due to its attractive combination of the learning capacity of artificial neural networks with the interpretability of the fuzzy systems. This article proposes a new hybrid neuro-fuzzy model, named hierarchical neuro-fuzzy quadtree (HNFQ), which...
neuro-fuzzy systems;mackey glass chaotic series;recursive partitioning;learning algorithm;quadtree;hierarchical neuro-fuzzy quadtree;fuzzy systems
train_59
Efficient tracking of the cross-correlation coefficient
In many (audio) processing algorithms, involving manipulation of discrete-time signals, the performance can vary strongly over the repertoire that is used. This may be the case when the signals from the various channels are allowed to be strongly positively or negatively correlated. We propose and analyze a general for...
time-dependent correlation;cross-correlation coefficient;audio processing algorithms;recursive formula;discrete-time signals;nonstationary signals;efficient tracking;stationary state;warping operation;tracking algorithm;stereo music fragments;convergence behavior;stationary signals;dynamic behavior;deformed correlation...
train_590
Universal approximation by hierarchical fuzzy system with constraints on the
fuzzy rule This paper presents a special hierarchical fuzzy system where the outputs of the previous layer are not used in the IF-parts, but used only in the THEN-parts of the fuzzy rules of the current layer. The proposed scheme can be shown to be a universal approximator to any continuous function on a compact set if...
hierarchical fuzzy logic;universal approximator;hierarchical fuzzy system;stone-weierstrass theorem;ball and beam control system;fuzzy rules;continuous function
train_591
Approximation theory of fuzzy systems based upon genuine many-valued
implications - MIMO cases It is constructively proved that the multi-input-multi-output fuzzy systems based upon genuine many-valued implications are universal approximators (they are called Boolean type fuzzy systems in this paper). The general approach to construct such fuzzy systems is given, that is, through the pa...
boolean type fuzzy systems;universal approximator;multi-input-multi-output fuzzy systems;many-valued implication;fuzzy systems
train_592
Approximation theory of fuzzy systems based upon genuine many-valued
implications - SISO cases It is proved that the single input and single output (SISO) fuzzy systems based upon genuine many-valued implications are universal approximators. It is shown theoretically that fuzzy control systems based upon genuine many-valued implications are equivalent to those based upon t-norm implicat...
universal approximator;many-valued implications;boolean implication;siso;single input and single output fuzzy systems;fuzzy systems
train_593
Fuzzy systems with overlapping Gaussian concepts: Approximation properties in
Sobolev norms In this paper the approximating capabilities of fuzzy systems with overlapping Gaussian concepts are considered. The target function is assumed to be sampled either on a regular gird or according to a uniform probability density. By exploiting a connection with Radial Basis Functions approximators, a new ...
overlapping gaussian concepts;fuzzy system models;learning;radial basis functions;reproducing kernel hilbert spaces;fuzzy systems
train_594
Improved analysis for the nonlinear performance of CMOS current mirrors with
device mismatch The nonlinear performance of the simple and complementary MOSFET current mirrors are analyzed. Closed-form expressions are obtained for the harmonic and intermodulation components resulting from a multisinusoidal input current. These expressions can be used for predicting the limiting values of the inpu...
threshold-voltage mismatch;input current;nonlinear performance;device mismatch;multisinusoidal input current;harmonic components;cmos current mirrors;spice simulations;intermodulation components;complementary mosfet current mirrors;simulation results;transconductance mismatch;closed-form expressions
train_595
Six common enterprise programming mistakes
Instead of giving you tips to use in your programming (at least directly), I want to look at some common mistakes made in enterprise programming. Instead of focusing on what to do, I want to look at what you should not do. Most programmers take books like mine and add in the good things, but they leave their mistakes i...
common errors;enterprise javabeans;database;xml;enterprise programming mistakes;data store;vendor-specific programming
train_596
Copyright management in the digital age
Listening to and buying music online is becoming increasingly popular with consumers. So much so that Merrill Lynch forecasts the value of the online music market will explode from $8 million in 2001 to $1,409 million in 2005. But online delivery is not without problems; the issue of copyright management in particular ...
internet;online music delivery;napster;digital age;music industry;digital content creators
train_597
Quick media response averts PR disaster
Sometimes it's not what you do, but how you do it. After hackers broke the blocking code on the home version of its popular Cyber Patrol Internet filtering software and posted it on the Internet, marketers at Microsystems Software pulled out a playbook of standard crisis management and PR techniques. But the Cyber Patr...
public relations;cyber patrol internet filtering software;crisis management;microsystems software;media response
train_598
From FREE to FEE [online advertising market]
As the online advertising market continues to struggle, many online content marketers are wrestling with the issue of how to add at least some level of paid subscription income to their revenue mix in order to reach or improve profitability. Since the business of selling content online is still in its infancy, and many...
online advertising market;paid subscription income;marketing strategies;selling content online
train_599
Keen but confused [workflow & content management]
IT users find workflow, content and business process management software appealing but by no means straightforward to implement. Pat Sweet reports on our latest research
content management;survey;market overview;business process management software;research;workflow
train_6
SBC gets more serious on regulatory compliance
With one eye on the past and the other on its future, SBC Communications last week created a unit it hopes will bring a cohesiveness and efficiency to its regulatory compliance efforts that previously had been lacking. The carrier also hopes the new regulatory compliance unit will help it accomplish its short-term goal...
regulatory compliance;telecom carrier;sbc communications
train_60
Perceptual audio coding using adaptive pre- and post-filters and lossless
compression This paper proposes a versatile perceptual audio coding method that achieves high compression ratios and is capable of low encoding/decoding delay. It accommodates a variety of source signals (including both music and speech) with different sampling rates. It is based on separating irrelevance and redundanc...
low encoding/decoding delay;adaptive pre-filters;perceptual audio coding;psycho-acoustically controlled adaptive linear filter;weighted cascaded least mean squared;pre-filter/lossless coder;high compression ratio;source signals;adaptive post-filters;adaptive filtering;predictive lossless coding;wclms lossless coder;aud...
train_600
Development of railway VR safety simulation system
Abnormal conditions occur in railway transportation due to trouble or accidents and it affects a number of passengers. It is very important, therefore, to quickly recover and return to normal train operation. For this purpose we developed a system, "Computer VR Simulation System for the Safety of Railway Transportation...
virtual reality simulation system;accidents;computer vr simulation system;railway transportation;abnormal conditions correction;normal train operation
train_601
Recent researches of human science on railway systems
This paper presents research of human science on railway systems at RTRI. They are roughly divided into two categories: research to improve safety and those to improve comfort. On the former subject, for the safeguard against accidents caused by human errors, we have promoted studies of psychological aptitude test, var...
human science;wakefulness level;safety improvement;accidents;railway facilities;tilt train;train drivers' working conditions;rtri;human errors;riding comfort;ergonomics;aged persons;train accidents;comfort improvement;psychological aptitude test;sight impaired;railway systems;disabled persons;passenger casualties risk ...
train_602
Image fusion between /sup 18/FDG-PET and MRI/CT for radiotherapy planning of
oropharyngeal and nasopharyngeal carcinomas Accurate diagnosis of tumor extent is important in three-dimensional conformal radiotherapy. This study reports the use of image fusion between (18)F-fluoro-2-deoxy-D-glucose positron emission tomography (/sup 18/FDG-PET) and magnetic resonance imaging/computed tomography (MR...
nasopharyngeal carcinomas;superficial tumors;f;image fusion;simultaneous primary site recurrence;parotid glands;mri/ct;radiotherapy planning;/sup 18/fdg-pet;normal tissues sparing;primary tumors;oropharyngeal carcinomas
train_603
PGE helps customers reduce energy costs
A new service from Portland General Electric (PGE, Portland, Oregon, US) is saving customers tens of thousands of dollars in energy costs. PGE created E-Manager to allow facility managers to analyze their energy consumption online at 15-minute intervals. Customers can go to the Web for complete data, powerful analysis ...
online energy consumption analysis;oregon;energy costs reduction;e-manager;abnormal energy use detection;portland general electric
train_604
SRP rolls out reliability and asset management initiative
Reliability planning analysis at the Salt River Project (SRP, Tempe, Arizona, US) prioritizes geographic areas for preventive inspections based on a cost benefit model. However, SRP wanted a new application system to prioritize inspections and to predict when direct buried cable would fail using the same cost benefit m...
condition monitoring;salt river project;usa;direct buried cable;cable replacement;tempe;arizona;gis;reliability planning analysis;cost benefit model;preventive inspections;wood pole;geographical information system;geographic areas;equipment analysis execution
train_605
HEW selects network management software
For more than 100 years, Hamburgische Electricitats-Werke AG (HEW) has provided a reliable electricity service to the city of Hamburg, Germany. Today, the company supplies electricity to some 1.7 million inhabitants via 285000 connections. During 1999, the year the energy market was started in Germany, HEW needed to op...
distribution management system;hamburg;xpower;hamburgische electricitats-werke;germany;tekla oyj;network management software
train_606
Taiwan power company phases into AM/FM
To face the challenges and impact of the inevitable trend toward privatization and deregulation, the Taiwan Power Co. (TPC) devised short- and long-term strategic computerization development plans. These development efforts created a master plan that included building an Automated Mapping and Facilities Management (AM/...
pilot project;am/fm;complete service territory;automated mapping and facilities management;taipei city district office;privatization;taiwan power company;deregulation
train_607
A building block approach to automated engineering
Shenandoah Valley Electric Cooperative (SVEC, Mt. Crawford, Virginia, US) recognized the need to automate engineering functions and create an interactive model of its distribution system in the early 1990s. It had used Milsoft's DA software for more than 10 years to make engineering studies, and had a Landis and Gyr SC...
staking;mapviewer;metering;gis;building block approach;interactive model;databases;distribution system;engineering functions automation;shenandoah valley electric cooperative;outage management;billing systems;line design
train_608
How closely can a personal computer clock track the UTC timescale via the
Internet? Nowadays many software packages allow you to keep the clock of your personal computer synchronized to time servers spread over the internet. We present how a didactic laboratory can evaluate, in a statistical sense, the minimum synch error of this process (the other extreme, the maximum, is guaranteed by the ...
black boxes;didactic laboratory;internet;synch error;global positioning system satellite constellation;software packages;personal computer clock;time servers;utc timescale;statistical sense;final timing difference
train_609
Chemical production in the superlative [formaldehyde plant process control
system and remote I/O system] BASF commissioned the largest formaldehyde production plant in the world, in December 2000, with an annual capacity of 180000 t. The new plant, built to meet the growing demand for formaldehyde, sets new standards. Its size, technology and above all its cost-effectiveness give it a leading...
automation technology;zone 2 hazardous area;r. stahl schaltgerate gmbh;trail-blazing simatic pcs 7;price-performance ratio;remote i/o field station design;superlative;formaldehyde production plant construction;zone 1 hazardous area;remote i/o system i.s.1;signal recording;basf;chemical production;siemens;cost-effective...
train_61
Application of time-frequency principal component analysis to text-independent
speaker identification We propose a formalism, called vector filtering of spectral trajectories, that allows the integration of a number of speech parameterization approaches (cepstral analysis, Delta and Delta Delta parameterizations, auto-regressive vector modeling, ...) under a common formalism. We then propose a ne...
contextual principal components;text-independent speaker identification;polycost database;vector filtering;delta -coefficients;contextual covariance matrix;spectral trajectories;delta delta parameterization;closed-set speaker identification;delta parameterization;cepstral analysis;time-frequency principal component ana...
train_610
AGC for autonomous power system using combined intelligent techniques
In the present work two intelligent load frequency controllers have been developed to regulate the power output and system frequency by controlling the speed of the generator with the help of fuel rack position control. The first controller is obtained using fuzzy logic (FL) only, whereas the second one by using a comb...
power output regulation;combined intelligent techniques;single-area power system;transient oscillations;frequency overshoot;competing techniques;autonomous power system;fuel rack position control;frequency control;performance evaluation;genetic algorithms;zero steady-state error;neural networks;generator speed control;...
train_611
Intelligent optimal sieving method for FACTS device control in multi-machine
systems A multi-target oriented optimal control strategy for FACTS devices installed in multi-machine power systems is presented in this paper, which is named the intelligent optimal sieving control (IOSC) method. This new method divides the FACTS device output region into several parts and selects one typical value fr...
intelligent optimal sieve;inverse system method;system oscillations attenuation;fuzzy methods;three-machine power system;facts;intelligent optimal sieving method;power system transient stability enhancement;multi-target oriented optimal control strategy;artificial neural network technologies;selected optimal output;fac...
train_612
Analysis and operation of hybrid active filter for harmonic elimination
This paper presents a hybrid active filter topology and its control to suppress the harmonic currents from entering the power source. The adopted hybrid active filter consists of one active filter and one passive filter connected in series. By controlling the equivalent output voltage of active filter, the harmonic cur...
equivalent output voltage;harmonic currents suppression;harmonic elimination;computer simulation;active filter;dc-link voltage regulation;harmonic currents;converter power rating reduction;voltage source inverter;nonlinear load;active filter equivalent voltage;passive filter;scaled-down laboratory prototype;hybrid acti...
train_613
Comparison between discrete STFT and wavelets for the analysis of power quality
events This paper deals with the comparison of signal processing tools for power quality analysis. Two signal processing techniques are considered: the wavelet filters and the discrete short-time Fourier transforms (STFT). Then, examples of the two most frequent disturbances met in the power system are chosen. An adjus...
six-pulse converter;signal processing techniques;adjustable speed drive;medium-sized industrial plant;wavelet filters;power quality events;signal processing tools;wavelets;short-time fourier transforms;discrete short-time fourier transforms;discrete stft;electrical disturbance;utility capacitors;emtp/atp
train_614
An on-line distributed intelligent fault section estimation system for
large-scale power networks In this paper, a novel distributed intelligent system is suggested for on-line fault section estimation (FSE) of large-scale power networks. As the first step, a multi-way graph partitioning method based on weighted minimum degree reordering is proposed for effectively partitioning the origin...
ieee 30-bus systems;large-scale power networks;on-line distributed intelligent fault section estimation system;computer simulation;fuzzy system;multi-way graph partitioning method based;minimum frontier elements;radial basis function neural network;weighted minimum degree reordering;ieee 14-bus systems;ieee 118-bus sys...
train_615
An intelligent tutoring system for a power plant simulator
In this paper, an intelligent tutoring system (ITS) is proposed for a power plant simulator. With a well designed ITS, the need for an instructor is minimized and the operator may readily and efficiently take, in real-time, the control of simulator with appropriate messages he(she) gets from the tutoring system. Using ...
control simulation;cai;object oriented programming;simulink;intelligent tutoring system;c programming language;fossil-fuelled power plant simulator
train_616
An overview of modems
This paper describes cursory glance of different types of modems classified for application, range, line type, operating mode, synchronizing mode, modulation, etc., highly useful for all engineering students of communication, electrical, computer science and information technology students. This paper also describes th...
computer science students;operating mode;communication students;synchronizing mode;line type;modulation;information technology students;modems;standards;protocols;engineering students;electrical students
train_617
Estimation of trifocal tensor using GMM
A novel estimation of a trifocal tensor based on the Gaussian mixture model (GMM) is presented. The mixture model is built assuming that the residuals of inliers and outliers belong to different Gaussian distributions. The Bayesian rule is then employed to detect the inliers for re-estimation. Experiments show that the...
gaussian distributions;motion analysis;gmm;inliers;trifocal tensor estimation;gaussian mixture model;image data;outliers;bayesian rule;image analysis
train_618
Blind source separation applied to image cryptosystems with dual encryption
Blind source separation (BSS) is explored to add another encryption level besides the existing encryption methods for image cryptosystems. The transmitted images are covered with a noise image by specific mixing before encryption and then recovered through BSS after decryption. Simulation results illustrate the validit...
noise image;image cryptosystems;transmitted images;dual encryption;blind source separation
train_619
Wavelet-based image segment representation
An efficient representation method for arbitrarily shaped image segments is proposed. This method includes a smart way to select a wavelet basis to approximate the given image segment, with improved image quality and reduced computational load
image segment representation;wavelet basis;dwt;reduced computational load;improved image quality;discrete wavelet transform;arbitrarily shaped image segments
train_62
Text-independent speaker verification using utterance level scoring and
covariance modeling This paper describes a computationally simple method to perform text independent speaker verification using second order statistics. The suggested method, called utterance level scoring (ULS), allows one to obtain a normalized score using a single pass through the frames of the tested utterance. The...
computationally simple method;utterance level scoring;normalized score;speaker covariance;distortion measure;gmm;nist speaker recognition evaluation;gaussian mixture model;text-independent speaker verification;covariance modeling;computational complexity;sample covariance;second order statistics;distortion measures;ver...
train_620
Adaptive image enhancement for retinal blood vessel segmentation
Retinal blood vessel images are enhanced by removing the nonstationary background, which is adaptively estimated based on local neighbourhood information. The result is a much better segmentation of the blood vessels with a simple algorithm and without the need to obtain a priori illumination knowledge of the imaging s...
retinal blood vessel images;image segmentation;adaptive image enhancement;local neighbourhood information;personal identification;nonstationary background removal;security applications
train_621
MPEG-4 video object-based rate allocation with variable temporal rates
In object-based coding, bit allocation is performed at the object level and temporal rates of different objects may vary. The proposed algorithm deals with these two issues when coding multiple video objects (MVOs). The proposed algorithm is able to successfully achieve the target bit rate, effectively code arbitrarily...
multiple video objects;bit allocation;mpeg-4 video coding;variable temporal rates;object-based rate allocation;rate-distortion encoding
train_622
Source/channel coding of still images using lapped transforms and block
classification A novel scheme for joint source/channel coding of still images is proposed. By using efficient lapped transforms, channel-optimised robust quantisers and classification methods it is shown that significant improvements over traditional source/channel coding of images can be obtained while keeping the com...
still images;block classification;channel-optimised robust quantisers;low complexity;image coding;joint source-channel coding;lapped transforms
train_623
Stochastic recurrences of Jackpot Keno
We describe a mathematical model and simulation study for Jackpot Keno, as implemented by Jupiters Network Gaming (JNG) in the Australian state of Queensland, and as controlled by the Queensland Office of Gaming Regulation (QOGR) (http://www.qogr.qld.gov.au/keno.shtml). The recurrences for the house net hold are derive...
stochastic binary search;experimental results;stochastic recurrences;mathematical model;jackpot keno;jupiters network gaming;piecewise linear;simulation;probability;chinese lottery game;house net hold;legal requirement;ternary domain split;random number generator;inverse problem
train_624
A hybrid ML-EM algorithm for calculation of maximum likelihood estimates in
semiparametric shared frailty models This paper describes a generalised hybrid ML-EM algorithm for the calculation of maximum likelihood estimates in semiparametric shared frailty models, the Cox proportional hazard models with hazard functions multiplied by a (parametric) frailty random variable. This hybrid method is...
normal random variable;cox proportional hazard models;coronary heart disease data;frailty variance estimates;asymptotic distribution;normal distribution;data analysis;maximum likelihood estimates;simulations;semiparametric shared log-normal frailty models;hazard functions;busselton health study;hybrid ml-em algorithm
train_625
Identifying multivariate discordant observations: a computer-intensive approach
The problem of identifying multiple outliers in a multivariate normal sample is approached via successive testing using P-values rather than tabled critical values. Caroni and Prescott (Appl. Statist. 41, p.355, 1992) proposed a generalization of the EDR-ESD procedure of Rosner (Technometrics, 25, 1983)). Venter and Vi...
multiple outliers;p-values;computer-intensive approach;multivariate normal sample;tabled critical values;data analysis;multivariate outlier;stepwise testing approach;multivariate discordant observations;univariate outlier;edr-ehd procedure
train_626
Approximate confidence intervals for one proportion and difference of two
proportions Constructing a confidence interval for a binomial proportion or the difference of two proportions is a routine exercise in daily data analysis. The best-known method is the Wald interval based on the asymptotic normal approximation to the distribution of the observed sample proportion, though it is known to...
uncertainty;pseudo-sample proportion;normal distribution;approximate confidence intervals;data analysis;variance estimation;coverage probability;binomial proportion;difference of two proportions;t-approximation;t-test
train_627
Comparison of non-stationary time series in the frequency domain
In this paper we compare two nonstationary time series using nonparametric procedures. Evolutionary spectra are estimated for the two series. Randomization tests are performed on groups of spectral estimates for both related and independent time series. Simulation studies show that in certain cases the tests perform re...
lag window;independent time series;spectral estimates;time window;simulation;financial time series;randomization tests;related time series;nonstationary time series;evolutionary spectra estimation;geological time series;nonparametric procedures