14 research outputs found

    Examples of Artificial Perceptions in Optical Character Recognition and Iris Recognition

    Full text link
    This paper assumes the hypothesis that human learning is perception based, and consequently, the learning process and perceptions should not be represented and investigated independently or modeled in different simulation spaces. In order to keep the analogy between the artificial and human learning, the former is assumed here as being based on the artificial perception. Hence, instead of choosing to apply or develop a Computational Theory of (human) Perceptions, we choose to mirror the human perceptions in a numeric (computational) space as artificial perceptions and to analyze the interdependence between artificial learning and artificial perception in the same numeric space, using one of the simplest tools of Artificial Intelligence and Soft Computing, namely the perceptrons. As practical applications, we choose to work around two examples: Optical Character Recognition and Iris Recognition. In both cases a simple Turing test shows that artificial perceptions of the difference between two characters and between two irides are fuzzy, whereas the corresponding human perceptions are, in fact, crisp.Comment: 5th Int. Conf. on Soft Computing and Applications (Szeged, HU), 22-24 Aug 201

    Dependability Evaluation and Supervision in Thermal Power Plants

    Get PDF
    In order to improve the productivity and the consistency of its maintenance strategies, the industrial world is based on different techniques and tools developed to ensure safe operation and the supervision of production systems. In fact, dependability evaluation is crucial to controlling the risks associated with system failure, and for this reason, it is one of the fundamental steps in automated system design. In this paper, we present firstly the basic concepts for the study of dependability as well as functional systems analysis. Thus, we present the method SADT (Structured Analysis Design technique). Given the ineffectiveness of methods that are currently exploited are not appropriate because the level of complexity of such industrial systems, we propose in the first the Safe-SADT method which allows the explicit formalization of functional interaction, the identification of the characteristic values affecting complex system dependability, the quantification of RAMS parameters (Reliability, Availability, Maintainability, and Safety) for the system鈥檚 operational architecture. Secondly, a methodology for designing supervisory production systems has been presented and has been applied on an example of a SCADA (supervisory control and data acquisition) system of a thermal power plant. Finally, a model of operating safety and supervision of a production system is proposed

    Corrections to: Multivariate normal distribution approaches for dependently truncated data

    Get PDF
    We provide corrections for Emura and Konno (2010). We also numerically verify the corrected formulae. Appendix gives a real data used for numerical analysis

    Identification of the initial rule-base of a multi-stroke fuzzy-based character recognition method with meta-heuristic techniques

    Get PDF
    This paper summarizes the basic concept of the designed a fuzzy-based character recognition algorithm family and the results of the optimization of its rule-base with two various meta-heuristic methods, the Imperialist Competitive Algorithm and the bacterial evolutionary algorithm. The results are presented and compared with two other methods from literature after a short overview of the recognition algorithm

    Cloud Service Management System for Innovative Clusters. Application for North-West Region of Romania

    Get PDF
    In order to stimulate and optimize the organization and management ofinnovative clusters from value chain perspective and guide their planning activitiestowards a differentiation strategy in which cluster members cooperate, we proposea Cloud Service Management System (CSMS) that provides IT services for theseinnovative clusters companies that can be customized for both enterprises with theassociated clusters.Within such a system, actors begin to depend one on another and to take advantageof the local knowledge base. Each cluster is designed to have a different profile whichwill integrate all the companies mapped with it, with the objective of keeping theprofile and data for each company. For the existing companies the idea is to migratetheir services into the related cluster for integration within CSMS. Thus, our proposedCSMS will consider and meet different quality of services (QoS) parameters ofeach individual enterprise and service which will be included in specific Service LevelAgreements (SLAs), after the negotiation between the cloud service provider and theCSMS. Realizing that technological progress is at the heart of regional developmentand decision-makers could support the development of technology clusters towardstransforming them into regional innovative clusters, the application of our proposalaims to overcome existing bottlenecks in terms of business strategies and regionaldevelopment policies in the North-West region of Romania

    An Hybrid Text-Image Based Authentication for Cloud Services

    Get PDF
    The problem of securing access to the online information is acute today when access to bank accounts, health records, intellectual property and business or politically sensitive information are made by only a few clicks, regardless of geographic location. At the same time, more and more of these accesses are made from handsets. Cloud Computing is eminently suitable for addressing problems related to limited client resources, as it offloads computation from clients and offers dynamic provisioning of compute resources. Authentication of the companys users to the cloud service is mandatory because in this way it is eliminated the attacks risks to enter into the Cloud services. A suitable authentication is required for organizations that want to access the Cloud services. Our solution regards increasing security at the Security Access Point level of Cloud Computing and it is in fact a strong hybrid user authentication solution based on using image combined with text in order to avoid the weakness of simple user and password solution for authentication. A two factor password image based authentication method is proposed in this paper for cloud services. This authentication approach is used without additional hardware involved and presents the advantages of utilization in terms of security and usability. Every time when the user will be asked to provide his/her identity, a form for each image included in the photo will be listed. The user will have to remember the secret code for each image and to carefully introduce them in the forms. The global cloud access solution will be based on our hybrid proposed text-image based solution, and will be completed by the X.509 certificates

    Computational intelligence in performance evaluation and fault prognosis in telecommunication access networks

    Get PDF
    Telecommunication connections are highly reliable and manageable, however, the handling of several parts of the networks is problematic. One of these parts is the access network. The variegation of the applied technologies and the individual connections to the customers in access networks makes the preliminary estimation of the performance of the telecommunications services and troubleshooting difficult. There are existing methods which can handle such problems, but the telecommunications companies (TELCO) are continuously looking for newer and more efficient methods. In this paper some existing methods for performance evaluation and the prediction of the probable failures of the wire pairs of telecommunications access networks are reviewed and novel methods that are based on the measurements of the wire pairs and use computational intelligence, fuzzy inference methods and evolutionary models are introduced

    The 8th Conference of PhD Students in Computer Science

    Get PDF
    corecore