Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013最新文献

筛选
英文 中文
Perception in autonomous ground vehicles 自动地面车辆的感知
C. Ilas
{"title":"Perception in autonomous ground vehicles","authors":"C. Ilas","doi":"10.1109/ECAI.2013.6636180","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636180","url":null,"abstract":"This paper reviews current approaches, challenges, objectives, architecture and trends in the perception, one of the most important systems in autonomous ground vehicles AGV. Several implementations reported in the literature in the past five years are reviewed to see the evolution and to determine the main areas for future research.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"35 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A neural networks application in ergonomics 神经网络在人体工程学中的应用
A. Ene, D. Anghel
{"title":"A neural networks application in ergonomics","authors":"A. Ene, D. Anghel","doi":"10.1109/ECAI.2013.6636177","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636177","url":null,"abstract":"In this paper is presented a feed forward neural networks application in ergonomics. The neural network is used to quantify from the ergonomics point of view, a working place. Based on the combination of six input measurable parameters, the working place is characterized with one from the following three categories: “good”, “medium” or “poor”. The six input parameters that are taken into account by our application are: temperature, humidity, noise, luminosity, weight and frequency. The Java application crates the feed forward neural network, trains it using a set of training patterns and then tests it using real data. The experiment and the Java application were made at University of Pitesti.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114193022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
EM performance improvements through advanced winding techniques 通过先进的缠绕技术改善电磁性能
Blaz Stefe, G. Lampič
{"title":"EM performance improvements through advanced winding techniques","authors":"Blaz Stefe, G. Lampič","doi":"10.1109/ECAI.2013.6636159","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636159","url":null,"abstract":"For the development of new electric motor winding techniques a detailed knowledge in the currently used techniques is essential; therefore a review of the most commonly used winding techniques is provided in this paper, focusing on the winding of PMSM AC winding. To compare several different winding topologies and production techniques the two key parameters are presented with the mathematical model. These two parameters are the length of the straight part of the wire and the conductor diameter, from which the efficiency peak and motor power are calculated. These calculations are based on the model of the newly developed high pole pair number three phase wave winding topology - Elaphe type winding. The results can be used also in other PMSM winding topologies since they show the key important facts of the winding detail. In addition, the methodology can be adopted for any winding type.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121781433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network performance evaluation for RIP, OSPF and EIGRP routing protocols RIP、OSPF和EIGRP路由协议的网络性能评估
Ioan Fitigau, G. Toderean
{"title":"Network performance evaluation for RIP, OSPF and EIGRP routing protocols","authors":"Ioan Fitigau, G. Toderean","doi":"10.1109/ECAI.2013.6636217","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636217","url":null,"abstract":"The main function of a network layer is to route packets from the source machine to the destination machine. Algorithms that are used for route selection and data structure are the main parts for the network layer. In this paper we examine the network performance when using three routing protocols, RIP, OSPF and EIGRP. Video, HTTP and Voice application where configured for network transfer. We also examine the behaviour when using link failure/recovery controller between network nodes. The simulation results are analyzed, with a comparison between these protocols on the effectiveness and performance in network implemented.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115121938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Presentation design of e-assessments for blind users using touch screen devices 使用触屏设备的盲人电子评估演示设计
M. Fakrudeen, S. Yousef, A. Hussein, Maaruf Ali
{"title":"Presentation design of e-assessments for blind users using touch screen devices","authors":"M. Fakrudeen, S. Yousef, A. Hussein, Maaruf Ali","doi":"10.1109/ECAI.2013.6636214","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636214","url":null,"abstract":"The Web Content Accessibility Guidelines (WCAG) have been used by web developers to develop accessible web pages. However, touch screen accessibility varies with web site accessibility. This research is dedicated to the improvement of accessibility of e-assessment in mobile touch screen for blind users. We chose IMS' Question and Test Interoperability specification (QTI) as a basis to generate the components of the e-assessment. We then extended the components to derive the Accessibility and Usability features Guidelines (AUG) using the WCAG. Specifically, we designed a prototype according to the derived AUG to check the accessibility for blind users. We analysed the results and found that the performance of the prototype is promising.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124685740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of the development and implementation of VANET network intervehiculary communication systems 分析了VANET网车载通信系统的开发与实现
M. Surugiu, R. V. Alexandrescu
{"title":"Analysis of the development and implementation of VANET network intervehiculary communication systems","authors":"M. Surugiu, R. V. Alexandrescu","doi":"10.1109/ECAI.2013.6636190","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636190","url":null,"abstract":"Severe and immediate consequences of social and economical nature of the anual worldwide road accidents lead towards the development of new active and passive vehicle safety systems. Vehicle-to-vehicle communication is a relatively new concept in the field of road traffic safety, an increasing number of worldwide studies and research being performed on the subject. Traffic safety has become a priority and, with the development of communication technologies and wireless networks, VANET networks have emerged. VANET, or Vehicular Ad-hoc Network, ensures a communication protocol between close vehicles or between a vehicle and infrastructure (indicator, traffic light, road junction). The main purpose of these networks remains occupant safety and comfort in traffic. This paper is an analysis of the concept of vehicle-to-vehicle communication currently proposed in the technical literature of the field.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integration of RFID and WSN for supply chain intelligence system 供应链智能系统中RFID与WSN的集成
Shiva Mirshahi, S. Uysal, A. Akbari
{"title":"Integration of RFID and WSN for supply chain intelligence system","authors":"Shiva Mirshahi, S. Uysal, A. Akbari","doi":"10.1109/ECAI.2013.6636160","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636160","url":null,"abstract":"Radio Frequency Identification (RFID) system is used for detecting and identifying the tagged objects by electromagnetic signals. Wireless Sensor Networks (WSN), which consists of a huge numbers of nodes, can monitor the condition of the environment including pressure, humidity, and temperature. Data is transferred via nodes to a certain location. Integration of RFID and WSN provides a new feature and improves their functionalities. In the RFID system, each tag can only communicate with a reader. By integrating RFID tags with nodes, communication of the RFID tags with each other is possible and also integration of readers with nodes facilitates negotiation of readers together. The RFID and WSN integration in supply chain provides system intelligence. In such a case, tag is embedded in objects and reader is integrated with nodes. Therefore, identification and detection of tagged items is provided by using RFID and monitoring of environment can be obtained by using WSN. The present case study is simulated in the Petri Net Toolbox in MATLAB environment. It represented the negotiation of smart devices spontaneously in managing variety of instructions in order to enhance system performance.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116544474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Doping concentration variation in the barrier layers of a 462 nm In0.02Ga0.98N QW laser for structure performance improvement 462 nm In0.02Ga0.98N QW激光器阻挡层掺杂浓度变化对结构性能的影响
A. Dragulinescu
{"title":"Doping concentration variation in the barrier layers of a 462 nm In0.02Ga0.98N QW laser for structure performance improvement","authors":"A. Dragulinescu","doi":"10.1109/ECAI.2013.6636166","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636166","url":null,"abstract":"Lasers with quantum wells, based on the InGaN material system, have been researched for more than a decade, taking advantage from their wide bandgap energy, high emission efficiency and possibility of working in various spectra (red, green, blue, ultraviolet). We investigated if, for a structure of a 462 nm (blue) In0.02Ga0.98N QW laser, the variation of doping concentration in the barrier layers of the structure may lead to obtaining a lower threshold current, a higher slope efficiency and external differential quantum efficiency.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125013218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The analysis of the .NET architecture security system .NET体系结构安全系统的分析
M. Pirnau
{"title":"The analysis of the .NET architecture security system","authors":"M. Pirnau","doi":"10.1109/ECAI.2013.6636185","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636185","url":null,"abstract":"The security and integrity of data play an essential role in distributed environments. Due to the large number of independent components that must work together in order to distribute data processing, special emphasis must be placed on providing security applications, in order to prevent errors that could affect the integrity of the data, as well as the potential attacks that such distributed systems may be exposed. The NET Framework component, stands at the base of NET technology and is the last interface between NET applications and the operating system. In practice, both operating systems and computer networks on which NET platform is based on , contain inherent risks that can be vulnerable in case of inappropriate management. Even though in most instances, the security model .NET can eliminate in a transparent manner a number of errors at the level of the code. This one is not immune in case of wrong configured accounts or granting access rights to resources for some insecure systems.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weights set selection method for feed forward neural networks 前馈神经网络权值集选择方法
A. Ene, C. Stirbu
{"title":"Weights set selection method for feed forward neural networks","authors":"A. Ene, C. Stirbu","doi":"10.1109/ECAI.2013.6636168","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636168","url":null,"abstract":"In this paper is described a method for weights set selection for a feed forward neural network, based on the fault tolerance analysis of the network. For a certain neural network used in a specific problem, one can obtain many weight sets, as a result of backpropagation training algorithm, due to the fact that this algorithm initializes the weights with random numbers. Each time we repeat the training, we obtain a new set of weights. We propose a method to select one of the available training sets of weights, taking into account the fault tolerance of the network. We considered as a typical fault, the fault of the neurons from the hidden layer. We developed a Java application to illustrate the proposed method.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126901380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信