Search results for " Mach"

showing 10 items of 1388 documents

Virtual Environment for Implementation and Testing Private Wide Area Network Solutions

2013

In this paper the concept of virtual environment for implementation and testing private Wide Area Network (WAN) solutions is presented. The VMware vSphere virtualization platform is used. The paper presents the ability to reflect the structure of any given WAN topology using Vyatta software routers and VMware virtualization platform and verifies its reliability regarding data transfer. The paper includes a number of performance tests to verify the dependability of the proposed solution and provide a proof-of-concept for the network topology during the Design phase of the PPDIOO methodology, right before the Implementation phase.

Computer sciencebusiness.industryReliability (computer networking)Virtualizationcomputer.software_genreNetwork topologyWide area networkVirtual machineDependabilityEnterprise private networkbusinesscomputerVirtual networkComputer network
researchProduct

Managing IFC for civil engineering projects

2003

The "Industrial Foundation Classes" (IFC) are an ISO norm to define all components of a building in a civil engineering project. IFC files are textual files whose size can reach 100 megabytes. Several IFC files can coexist on the same civil engineering project. Due to their size, their handling and sharing is a complex task. In this paper, we present an approach to automatically identify business objects in the IFC files and simplify their visualization and manipulation on the Internet. We construct an IFC Viewer which transforms the IFC file into a XML IFC tree manipulated through the 3D visualization of the building. The IFC Viewer composed a web-based platform called ACTIVe3D BUILD SERVE…

Computer sciencebusiness.industrycomputer.internet_protocolBusiness objectcomputer.software_genreCivil engineeringVisualizationMegabyteWorld Wide WebVirtual machineThe InternetbusinesscomputerXMLProceedings of the twelfth international conference on Information and knowledge management
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Study of a Self-Contained Electro-Hydraulic Cylinder Drive

2018

Self-contained electro-hydraulic cylinders that can be powered just by an electrical wire will be popular in the coming years. Combining electrical-drives and hydraulic cylin- ders exploits some excellent properties of these two technologies and enables flexible implementation. To fully benefit from such a drive solution, there is the need to develop electro-hydraulic cylinders capable of operating independently as opposed to standard hydraulic systems that are connected to a central power supply. Therefore, this paper presents a numerical investigation of a self-contained electro-hydraulic cylinder with passive load- holding capability. The corresponding dynamic model is proposed and used …

Computer sciencelawElectrical wireMechanical engineeringComputerApplications_COMPUTERSINOTHERSYSTEMSHydraulic machineryActuatorElectro hydraulicCylinder (engine)law.inventionPower (physics)2018 Global Fluid Power Society PhD Symposium (GFPS)
researchProduct

Optical See-Through Head-Mounted Displays With Short Focal Distance: Conditions for Mitigating Parallax-Related Registration Error

2020

Optical see-through (OST) augmented reality head-mounted displays are quickly emerging as a key asset in several application fields but their ability to profitably assist high precision activities in the peripersonal space is still sub-optimal due to the calibration procedure required to properly model the user's viewpoint through the see-through display. In this work, we demonstrate the beneficial impact, on the parallax-related AR misregistration, of the use of optical see-through displays whose optical engines collimate the computer-generated image at a depth close to the fixation point of the user in the peripersonal space. To estimate the projection parameters of the OST display for a …

Computer sciencelcsh:Mechanical engineering and machineryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION01 natural sciencesCollimated lightlcsh:QA75.5-76.95Rendering (computer graphics)010309 opticsArtificial Intelligenceregistration0103 physical sciencesFocal lengthComputer visionlcsh:TJ1-1570Original Research010302 applied physicsRobotics and AIbusiness.industryoptical see-through displayscalibrationFixation pointaugmented realityComputer Science ApplicationsPhotogrammetryCardinal pointparallax related errorAugmented realityArtificial intelligencelcsh:Electronic computers. Computer scienceParallaxbusinessFrontiers in Robotics and AI
researchProduct

Automation Inner Speech as an Anthropomorphic Feature Affecting Human Trust: Current Issues and Future Directions

2021

This paper aims to discuss the possible role of inner speech in influencing trust in human–automation interaction. Inner speech is an everyday covert inner monolog or dialog with oneself, which is essential for human psychological life and functioning as it is linked to self-regulation and self-awareness. Recently, in the field of machine consciousness, computational models using different forms of robot speech have been developed that make it possible to implement inner speech in robots. As is discussed, robot inner speech could be a new feature affecting human trust by increasing robot transparency and anthropomorphism.

Computer sciencemedia_common.quotation_subject050105 experimental psychologyHuman–robot interactionhuman-robot interactioninner speechArtificial IntelligenceHuman–computer interactionHypothesis and TheoryTJ1-1570Feature (machine learning)0501 psychology and cognitive sciencesMechanical engineering and machinery050107 human factorsmedia_commonautomationRobotics and AIComputational modelhuman-automation interaction05 social sciencesInternal monologueanthropomorphismtrustrobotQA75.5-76.95Transparency (behavior)Computer Science ApplicationsCovertanthropomorphism automation human-automation interaction human-robot interaction inner speech robot trustElectronic computers. Computer scienceRobotConsciousnessFrontiers in Robotics and AI
researchProduct

Iterative pairs and multitape automata

1996

In this paper we prove that if every iterative k-tuple of a language L recognized by a k-tape automaton is very degenerate, then L is recognizable. Moreover, we prove that if L is an aperiodic langnage recognized by a deterministic k-tape automaton, then L is recognizable.

ComputingMilieux_GENERALDiscrete mathematicsTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESFinite-state machineAperiodic graphFree monoidDegenerate energy levelsMathematicsAutomaton
researchProduct

Concepts, proto-concepts, and shades of reasoning in neural networks

2019

One of the most important functions of concepts is that of producing classifications; and since there are at least two different types of such things, we better give a preliminary short description of them both. The first kind of classification is based on the existence of a property common to all the things that fall under a concept. The second, instead, relies on similarities between the objects belonging to a certain class A and certain elements of a subclass AS of A, the so-called ‘stereotypes.’ In what follows, we are going to call ‘proto-concepts’ all those concepts whose power of classification depends on stereotypes, leaving the term ‘concepts’ for all the others. The main aim of th…

Concepts proto-concepts stereotypes prototypes neural networks machine learningSettore M-FIL/02 - Logica E Filosofia Della Scienza
researchProduct

Arabic Named Entity Recognition: A Feature-Driven Study

2009

The named entity recognition task aims at identifying and classifying named entities within an open-domain text. This task has been garnering significant attention recently as it has been shown to help improve the performance of many natural language processing applications. In this paper, we investigate the impact of using different sets of features in three discriminative machine learning frameworks, namely, support vector machines, maximum entropy and conditional random fields for the task of named entity recognition. Our language of interest is Arabic. We explore lexical, contextual and morphological features and nine data-sets of different genres and annotations. We measure the impact …

Conditional random fieldAcoustics and UltrasonicsComputer sciencebusiness.industryPrinciple of maximum entropycomputer.software_genreMachine learningLinear discriminant analysisCable televisionSupport vector machineDiscriminative modelNamed-entity recognitionEntropy (information theory)Artificial intelligenceElectrical and Electronic EngineeringbusinesscomputerNatural language processingIEEE Transactions on Audio, Speech, and Language Processing
researchProduct

Electroanalytical chemistry for the analysis of solids: Characterization and classification (IUPAC Technical Report)

2012

Solid state electroanalytical chemistry (SSEAC) deals with studies of the processes, materials, and methods specifically aimed to obtain analytical information (quantitative elemental composition, phase composition, structure information, and reactivity) on solid materials by means of electrochemical methods. The electrochemical characterization of solids is not only crucial for electrochemical applications of materials (e.g., in batteries, fuel cells, corrosion protection, electrochemical machining, etc.) but it lends itself also for providing analytical information on the structure and chemical and mineralogical composition of solid materials of all kinds such as metals and alloys, variou…

Conductive polymerChemistryGeneral Chemical EngineeringPhase compositionChemical nomenclatureProcess analytical chemistryOrganic chemistryNanotechnologyGeneral ChemistryElectrochemical machiningElectrochemistryCorrosionCharacterization (materials science)Pure and Applied Chemistry
researchProduct