129 research outputs found

    Summarizing information from Web sites on distributed power generation and alternative energy development

    Get PDF
    The World Wide Web (WWW) has become a huge repository of information and knowledge, and an essential channel for information exchange. Many sites and thousands of pages of information on distributed power generation and alternate energy development are being added or modified constantly and the task of finding the most appropriate information is getting difficult. While search engines are capable to return a collection of links according to key terms and some forms of ranking mechanism, it is still necessary to access the Web page and navigate through the site in order to find the information. This paper proposes an interactive summarization framework called iWISE to facilitate the process by providing a summary of the information on the Web site. The proposed approach makes use of graphical visualization, tag clouds and text summarization. A number of cases are presented and compared in this paper with a discussion on future work

    Cognitive Informatics

    Get PDF
    Cognitive Informatics (CI) is a contemporary field of basic studies on the brain, computational intelligence theories and underpinning denotational mathematics. Its applications include cognitive systems, cognitive computing, cognitive machine learning and cognitive robotics. IEEE ICCI*CC'17 on Cognitive Informatics and Cognitive Computing was focused on the theme of neurocomputation, cognitive machine learning and brain-inspired systems. This paper reports the plenary panel (Part I) at IEEE ICCI*CC'17 held at Oxford University. The summary is contributed by invited keynote speakers and distinguished panelists who are part of the world's renowned scholars in the transdisciplinary field of CI and cognitive computing

    Compare Between DCT and DWT for Digital Watermarking in Color Image

    Get PDF
    In This paper we compare between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) in the field of image authentication and digital watermarking. Our proposed method depending on the embedding stage and extraction stag that presented in [1] but our scheme embeds the logo bits inside the low frequency domain because DWT gives optimal results with LL domain, while [1] used middle frequency domain with DCT. Our improvement by using a secrete K called user key (int. K=1, K<=N) where N=10, is used to generate a random vectors  for the selected coefficient, this attempt is made to increase the security and robustness for the proposed scheme to compare between DCT that illustrated in [1] with middle frequency domain and DCT, DWT in the existing paper that used low frequency domain, it used block based technique with embedding stage, the development that illustrated in the existing paper by using DWT transform on the recovered of binary watermark for the purpose of image authentication in frequency domain using DWT, and DCT transforms with true color image. The method focused on the objective quality after embedding stage and the recovered watermark after extraction stage. With DWT in the first step, the cover image is decomposed into three levels by DWT transform. Then the hiding site was LL sub band of the DWT coefficients. Furthermore, our proposed method deal with true color image without converting its color space into other color space with various image texture all of them with size of 256*256 Bit map image file format, the proposed scheme deal with three sub-bands (Red, Green, and Blue) at the same time to hide logo bits inside the host by using Patchwork technique with embedding stage, so if one is destroyed the other may survive, it provide optimal security whenever any sub-bands color destroyed. With our proposed method a secret watermark in the form of binary (o, 1) pattern is embedded inside the host under DCT, DWT, one bit from the watermark will be embedded inside the selected coefficient from the selected block of the host. Our proposed method was evaluated with different types of intended attacks such as: salt and pepper noise, Poisson noise, and speckle noise. Moreover, unintended attacks consider by spatial enhancement filter such as median filter that used to improve the quality for the watermarked image after unintended attack. After experiments, it was found that our proposed method provides security and high performance with low computational complexity and good objective quality. Our scheme evaluate the imperceptibility for the watermarked image after embedding stage by using Peak signal to Noise Ratio (PSNR), while the recovered watermark evaluated by some types of metrics such as Mean Square Error (MSE), Normalized Correlation (NC), and correlation factor (SIM). Our proposed method has ability to deal with different image texture and format such as (BMP), Portable Network Graphics (PNG), and Tagged Image File Format (TIFF). Keywords: Authentication, Objective, Subjective

    Parameter design oriented analysis of the current control stability of the weak-grid-tied VSC

    Get PDF
    This paper studies the dynamic behaviors of weak-grid-tied VSCs with simplified transfer functions, which provides an accurate stability analysis and useful indications for tuning system parameters. A reduced-order multi-input multi-output (MIMO) transfer function that contains four single-input single-output (SISO) transfer functions for the weak-grid-tied VSC is first presented. It is found that the four SISO transfer functions share the same equivalent open-loop transfer function, i.e., the same stability conclusion. The Bode plots of the equivalent open-loop transfer function show that the inner current loop behaves as a band-pass filter whose maximum gain is approximately at the frequency of the PLL's bandwidth. By stability criterion, the harmonic amplification and instability occur when its maximum gain exceeds 0dB caused by high PLL's bandwidth, large grid impedance or high active power. It is also found that the target system is less stable when it works as an inverter than as a rectifier, due to the risk of the local positive feedback in the inverter mode. An effective criterion is further proposed to guide the selection of a proper PLL's bandwidth to ensure the stability of the VSC system. Simulation results validate the correctness of the analysis and the efficacy of the criterion

    Approximation Set of the Interval Set in Pawlak's Space

    Get PDF

    Abstract intelligence: Embodying and enabling cognitive systems by mathematical engineering

    Get PDF
    Basic studies in denotational mathematics and mathematical engineering have led to the theory of abstract intelligence (aI), which is a set of mathematical models of natural and computational intelligence in cognitive informatics (CI) and cognitive computing (CC). Abstract intelligence triggers the recent breakthroughs in cognitive systems such as cognitive computers, cognitive robots, cognitive neural networks, and cognitive learning. This paper reports a set of position statements presented in the plenary panel (Part II) of IEEE ICCI*CC’16 on Cognitive Informatics and Cognitive Computing at Stanford University. The summary is contributed by invited panelists who are part of the world’s renowned scholars in the transdisciplinary field of CI and CC

    An agent-based cognitive approach for healthcare process management

    Get PDF
    Proceedings of the IEEE International Conference on Cognitive Informatics, 2009, p. 441-447Healthcare organizations are facing the challenge of delivering high-quality services through effective process management. There have been frequent changes of clinical processes and increased interactions between different functional units. To facilitate the dynamic and interactive processes in healthcare organizations, an agent-based cognitive approach is presented in this study. The emphasis is placed on dynamic clinical and administrative process management, and knowledge building as the foundation for process management. The treatment of primary open angle glaucoma is used as an example to demonstrate the effectiveness of approach for healthcare process management. © 2009 IEEE.published_or_final_versio
    • …
    corecore