Search results for "METHODOLOGIE"
showing 10 items of 2141 documents
Energy Efficient Optimization for Solar-Powered UAV Communications System
2021
In this work, we explore the energy efficiency optimization for a solar-powered unmanned aerial vehicle (UAV) communications system. We consider a scenario where a number of ground users (GUs) connect with a solar-powered multi-antenna UAV over a wireless link. First, we are able to derive the relations between the uplink data rate and heading angle of UAV and transmission power of GUs. In addition, the harvested energy from solar light is also affected by UAV’s angle. Accordingly, with the objective to maximize the energy efficiency that is related to uplink data rate and energy consumption, we propose to dynamically adjust the UAV trajectory and gesture, by optimizing its velocity, accele…
The methodology for active testing of electronic devices under the radiations
2018
The methodology, developed for active testing of electronic devices under the radiations, is presented. The test set-up includes a gamma-ray facility, the hardware board/fixtures and the software tools purposely designed and realized. The methodology is so wide-ranging to allow us the verification of different classes of electronic devices, even if only application examples for static random access memory modules are reported.
Evaluating Classifiers for Mobile-Masquerader Detection
2006
As a result of the impersonation of a user of a mobile terminal, sensitive information kept locally or accessible over the network can be abused. The means of masquerader detection are therefore needed to detect the cases of impersonation. In this paper, the problem of mobile-masquerader detection is considered as a problem of classifying the user behaviour as originating from the legitimate user or someone else. Different behavioural characteristics are analysed by designated one-class classifiers whose classifications are combined. The paper focuses on selecting the classifiers for mobile-masquerader detection. The selection process is conducted in two phases. First, the classification ac…
Learning Bayesian Metanetworks from Data with Multilevel Uncertainty
2006
Managing knowledge by maintaining it according to dynamic context is among the basic abilities of a knowledge-based system. The two main challenges in managing context in Bayesian networks are the introduction of contextual (in)dependence and Bayesian multinets. We are presenting one possible implementation of a context sensitive Bayesian multinet-the Bayesian Metanetwork, which implies that interoperability between component Bayesian networks (valid in different contexts) can be also modelled by another Bayesian network. The general concepts and two kinds of such Metanetwork models are considered. The main focus of this paper is learning procedure for Bayesian Metanetworks.
<title>Expanding context against weighted voting of classifiers</title>
2000
In the paper we propose a new method to integrate the predictions of multiple classifiers for Data Mining and Machine Learning tasks. The method assumes that each classifier stands in it's own context, and the contexts are partially ordered. The order is defined by monotonous quality function that maps each context to the value from the interval [0,1]. The classifier that has the context with better quality is supposed to predict better than the classifier from worse quality. The objective is to generate the opinion of `virtual' classifier that stands in the context with quality equal to 1. This virtual classifier must have the best accuracy of predictions due to the best context. To do thi…
Business-to-Business e-commerce adoption and perceived benefits: evidence from small and medium Spanish enterprises
2009
This paper focuses on the factors affecting Business-To-Business (B2B) e-commerce adoption and the perceived benefits for Small and Medium-sized Enterprises (SMEs). We propose and test a model that analyses the influence of firms' previous experience and environmental factors on e-B2B adoption and the effects of e-B2B adoption on the perceived benefits and the intention to continue adopting B2B. Our results show that the more e-B2B is used in SMEs, the higher the level of perceived benefits and this, in turn, has a positive influence on the intention to continue doing B2B e-commerce. Managerial implications of these findings are also discussed.
2020
Abstract. Despite the availability of both commercial and open-source software, an ideal tool for digital rock physics analysis for accurate automatic image analysis at ambient computational performance is difficult to pinpoint. More often, image segmentation is driven manually, where the performance remains limited to two phases. Discrepancies due to artefacts cause inaccuracies in image analysis. To overcome these problems, we have developed CobWeb 1.0, which is automated and explicitly tailored for accurate greyscale (multiphase) image segmentation using unsupervised and supervised machine learning techniques. In this study, we demonstrate image segmentation using unsupervised machine le…
Motion estimation and reconstruction of piecewise planar scenes from two views
2010
The task of recovering the camera motion relative to the environment (motion estimation) is fundamental to many computer vision applications. We present an algorithm for reconstruction of piece-wise planar scenes from only two views and based on minimum line correspondences. We first recover camera rotation by matching vanishing points based on the methods already exist in the literature and then recover the camera translation by searching among a family of hypothesized planes passing through one line. Unlike algorithms based on line segments, the presented algorithm does not require an overlap between two line segments or more than one line correspondence across more than two views to reco…
The iterative object symmetry transform
2005
This paper introduces a new operator named the Iterated Object Transform that is computed by combining the Object Symmetry Transform with the morphological operator erosion. This new operator has been applied on both binary and gray levels images showing the ability to grasp the internal structure of a digital object. We present some experiments on real images in face analysis.
Saliency Based Aesthetic Cut of Digital Images
2013
Aesthetic cut of photos is a process well known to professional photographers. It consists of cutting the original photo to remove less relevant parts close to the borders leaving in this way the interesting subjects in a position that is perceived by the observer as more pleasant. In this paper we propose a saliency based technique to automatically perform aesthetic cut in images. We use a standard method to estimate the saliency map and propose some post processing on the map to make it more suitable for our scope. We then apply a greedy algorithm to determine the cut (i.e. the most important part of the original image) both in the cases of free and fixed aspect ratio. Experimental result…