Search results for " Mach"
showing 10 items of 1388 documents
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions
2013
In this paper the concept of virtual environment for implementation and testing private Wide Area Network (WAN) solutions is presented. The VMware vSphere virtualization platform is used. The paper presents the ability to reflect the structure of any given WAN topology using Vyatta software routers and VMware virtualization platform and verifies its reliability regarding data transfer. The paper includes a number of performance tests to verify the dependability of the proposed solution and provide a proof-of-concept for the network topology during the Design phase of the PPDIOO methodology, right before the Implementation phase.
Managing IFC for civil engineering projects
2003
The "Industrial Foundation Classes" (IFC) are an ISO norm to define all components of a building in a civil engineering project. IFC files are textual files whose size can reach 100 megabytes. Several IFC files can coexist on the same civil engineering project. Due to their size, their handling and sharing is a complex task. In this paper, we present an approach to automatically identify business objects in the IFC files and simplify their visualization and manipulation on the Internet. We construct an IFC Viewer which transforms the IFC file into a XML IFC tree manipulated through the 3D visualization of the building. The IFC Viewer composed a web-based platform called ACTIVe3D BUILD SERVE…
Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection
2017
The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…
Study of a Self-Contained Electro-Hydraulic Cylinder Drive
2018
Self-contained electro-hydraulic cylinders that can be powered just by an electrical wire will be popular in the coming years. Combining electrical-drives and hydraulic cylin- ders exploits some excellent properties of these two technologies and enables flexible implementation. To fully benefit from such a drive solution, there is the need to develop electro-hydraulic cylinders capable of operating independently as opposed to standard hydraulic systems that are connected to a central power supply. Therefore, this paper presents a numerical investigation of a self-contained electro-hydraulic cylinder with passive load- holding capability. The corresponding dynamic model is proposed and used …
Optical See-Through Head-Mounted Displays With Short Focal Distance: Conditions for Mitigating Parallax-Related Registration Error
2020
Optical see-through (OST) augmented reality head-mounted displays are quickly emerging as a key asset in several application fields but their ability to profitably assist high precision activities in the peripersonal space is still sub-optimal due to the calibration procedure required to properly model the user's viewpoint through the see-through display. In this work, we demonstrate the beneficial impact, on the parallax-related AR misregistration, of the use of optical see-through displays whose optical engines collimate the computer-generated image at a depth close to the fixation point of the user in the peripersonal space. To estimate the projection parameters of the OST display for a …
Automation Inner Speech as an Anthropomorphic Feature Affecting Human Trust: Current Issues and Future Directions
2021
This paper aims to discuss the possible role of inner speech in influencing trust in human–automation interaction. Inner speech is an everyday covert inner monolog or dialog with oneself, which is essential for human psychological life and functioning as it is linked to self-regulation and self-awareness. Recently, in the field of machine consciousness, computational models using different forms of robot speech have been developed that make it possible to implement inner speech in robots. As is discussed, robot inner speech could be a new feature affecting human trust by increasing robot transparency and anthropomorphism.
Iterative pairs and multitape automata
1996
In this paper we prove that if every iterative k-tuple of a language L recognized by a k-tape automaton is very degenerate, then L is recognizable. Moreover, we prove that if L is an aperiodic langnage recognized by a deterministic k-tape automaton, then L is recognizable.
Concepts, proto-concepts, and shades of reasoning in neural networks
2019
One of the most important functions of concepts is that of producing classifications; and since there are at least two different types of such things, we better give a preliminary short description of them both. The first kind of classification is based on the existence of a property common to all the things that fall under a concept. The second, instead, relies on similarities between the objects belonging to a certain class A and certain elements of a subclass AS of A, the so-called ‘stereotypes.’ In what follows, we are going to call ‘proto-concepts’ all those concepts whose power of classification depends on stereotypes, leaving the term ‘concepts’ for all the others. The main aim of th…
Arabic Named Entity Recognition: A Feature-Driven Study
2009
The named entity recognition task aims at identifying and classifying named entities within an open-domain text. This task has been garnering significant attention recently as it has been shown to help improve the performance of many natural language processing applications. In this paper, we investigate the impact of using different sets of features in three discriminative machine learning frameworks, namely, support vector machines, maximum entropy and conditional random fields for the task of named entity recognition. Our language of interest is Arabic. We explore lexical, contextual and morphological features and nine data-sets of different genres and annotations. We measure the impact …
Electroanalytical chemistry for the analysis of solids: Characterization and classification (IUPAC Technical Report)
2012
Solid state electroanalytical chemistry (SSEAC) deals with studies of the processes, materials, and methods specifically aimed to obtain analytical information (quantitative elemental composition, phase composition, structure information, and reactivity) on solid materials by means of electrochemical methods. The electrochemical characterization of solids is not only crucial for electrochemical applications of materials (e.g., in batteries, fuel cells, corrosion protection, electrochemical machining, etc.) but it lends itself also for providing analytical information on the structure and chemical and mineralogical composition of solid materials of all kinds such as metals and alloys, variou…