Hasil untuk "cs.OH"

Menampilkan 20 dari ~364028 hasil · dari CrossRef, DOAJ, arXiv

JSON API
arXiv Open Access 2023
Rock Climbing Route Generation and Grading as Computational Creativity

Jesse Roberts

In this paper, we bridge work in rock climbing route generation and grading into the computational creativity community. We provide the necessary background to situate that literature and demonstrate the domain's intellectual merit in the computational creativity community. We provide a guiding set of desiderata for future work in this area. We propose an approach to computational route grading. Finally, we identify important gaps in the literature and consider how they may be filled. This paper thus also serves as a pilot study, planting a flag for our ongoing research in this domain.

en cs.OH, cs.AI
arXiv Open Access 2021
Piano Fingering with Reinforcement Learning

Pedro Ramoneda, Marius Miron, Xavier Serra

Hand and finger movements are a mainstay of piano technique. Automatic Fingering from symbolic music data allows us to simulate finger and hand movements. Previous proposals achieve automatic piano fingering based on knowledge-driven or data-driven techniques. We combine both approaches with deep reinforcement learning techniques to derive piano fingering. Finally, we explore how to incorporate past experience into reinforcement learning-based piano fingering in further work.

en cs.OH
arXiv Open Access 2019
Nonintrusive Load Monitoring for Machines used in Manufacturing

Christian Gebbe

In order to increase the electric energy efficiency of production machines, it is necessary to determine the energy demand of the constituent electric loads. Therefore, a new measurement system based on nonintrusive load monitoring is proposed in this paper. It only measures the voltage and current of the aggregate load and then uses automatic disaggregation methods to estimate the energy demand of the constituent loads. In two case studies, the energy demand of most loads could be determined with an accuracy of 85~\% or more in this way.

en cs.OH, eess.SP
CrossRef Open Access 2018
Development of Adsorbent Prussian Blue (PB) Impregnated through the Grafting of Covalent Organic Polymers (COPs) for the Removal of Radioactivity Cesium (Cs-137)

Bok Seong Kim, Young Sug Kim, Sung Won Kang et al.

This study aims to utilize Prussian Blue (PB) to develop a high performance adsorbent for removing radioactive cesium from radioactive accidents. Prussian blue (PB) can adsorb selectively to cesium (Cs), which is high in adsorption efficiency, but has a disadvantage that it is difficult to recover after adsorption, so there is a high concern about secondary environmental pollution. Therefore, this study modified the surface of powder activated carbon (PAC) particles by using covalent organic polymer (COP) for stable immobilization of PB, and developed a PB-impregnated adsorbent (COP-PAC-PB). Synthesis of COP-PAC-PB was performed by sequentially reacting with iron (III) chloride and potassium ferrocyanide solution to synthesize PB in COP pore (In-situ). The maximum adsorption of COP-PAC-PB on cesium was 19 mg / g and the removal efficiency for radioactivity cesium (Cs-137, 60 Bq / kg) was 97.3%. In addition, PB was synthesized by the same method as that of COP-PAC-PB, which is a modification product of the unmodified group (PAC, Ox-PAC), and UV-vis analysis was performed to compare PB desorption characteristics after washing Respectively. In the unmodified group (PAC-PB, Ox-PAC-PB), a large amount of PB was desorbed when washed once to 6 times. In the case of COP-PAC-PB, it was not. As a result, the surface of the PAC particles was effectively modified using COP, and the adsorbent with Prussian blue stably immobilized was developed.

arXiv Open Access 2018
Cost-Benefit Analysis of Data Intelligence -- Its Broader Interpretations

Min Chen

The core of data science is our fundamental understanding about data intelligence processes for transforming data to decisions. One aspect of this understanding is how to analyze the cost-benefit of data intelligence workflows. This work is built on the information-theoretic metric proposed by Chen and Golan for this purpose and several recent studies and applications of the metric. We present a set of extended interpretations of the metric by relating the metric to encryption, compression, model development, perception, cognition, languages, and news media.

en cs.OH
arXiv Open Access 2016
Transit directions at global scale

Joris van der Geer

A novel approach to integrated ground and air public transport journey planning, operating at continent scale. Flexible date search, prerequisite for long distance trips given their typical low and irregular service frequencies, is core functionality. The algorithm is especially suited for irregular and poorly structured networks. Almost all of the described functionality is implemented in a working prototype. Using ground transport only, the system is on par with Google Transit on random country-wide trips in the US.

en cs.OH
arXiv Open Access 2015
Sensitivity Analysis of Resonant Circuits

Olivier Buu

We use first-order perturbation theory to provide a local linear relation between the circuit parameters and the poles of an RLC network. The sensitivity matrix, which defines this relationship, is obtained from the systems eigenvectors and the derivative of its eigenvalues. In general, the sensitivity matrix is related to the equilibrium fluctuations of the system. In particular, it may be used as the basis for a statistical model to efficiently predict the sensitivity of the circuit response to small component variations. The method is illustrated with a calculation of conditional probabilities by Monte Carlo Simulation.

en cs.OH
arXiv Open Access 2013
On Two Conversion Methods of Decimal-to-Binary

Zhengjun Cao

Decimal-to-binary conversion is important to modern binary computers. The classical method to solve this problem is based on division operation. In this paper, we investigate a decimal-to-binary conversion method based on addition operation. The method is very easily implemented by software. The cost analysis shows that the latter is more preferable than the classical method. Thus the current Input/Output translation hardware to convert between the internal digit pairs and the external standard BCD codes can be reasonably removed.

en cs.OH
arXiv Open Access 2012
A Knowledge Engineering Method for New Product Development

Nicolas Perry, Samar Ammar-Khodja

Engineering activities involve large groups of people from different domains and disciplines. They often generate important information flows that are difficult to manage. To face these difficulties, a knowledge engineering process is necessary to structure the information and its use. This paper presents a deployment of a knowledge capitalization process based on the enrichment of MOKA methodology to support the integration of Process Planning knowledge in a CAD System. Our goal is to help different actors to work collaboratively by proposing one referential view of the domain, the context and the objectives assuming that it will help them in better decision-making.

arXiv Open Access 2012
A Review Paper on Microprocessor Based Controller Programming

Jaswinder Singh Dilawari, Gurpreet Singh Sandhu

Designing of microprocessor based controllers requires specific hardware as well as software programming. Programming depends upon type of the software whether operating software or application software. Programming requires knowledge of system configuration and controller specific programming. Programs are always in digital form so microprocessor can control directly at digital level called Direct Digital Control (DDC).

en cs.OH
arXiv Open Access 2012
Centralized Integrated Spectrum Sensing for Cognitive Radios

Dilip s. Aldar

Spectrum sensing is the challenge for cognitive radio design and implementation, which allows the secondary user to access the primary bands without interference with primary users. Cognitive radios should decide on the best spectrum band to meet the Quality of service requirements over all available spectrum bands. This paper investigates the integrated centralized spectrum sensing techniques in multipath fading environment and the performance was analyzed with energy detection and wavelet based sensing techniques for unknown signal. Keywords: Cognitive Radio, Spectrum Sensing, Signal Detection, Primary User, Secondary User

en cs.OH
arXiv Open Access 2010
Parameter-Free Deterministic Global Search with Central Force Optimization

Richard A. Formato

This note describes a parameter-free implementation of Central Force Optimization for deterministic multidimensional search and optimization. The user supplies only one input: the objective function to be maximized, nothing more. The CFO equations of motion are simplified by assigning specific values to CFO's basic parameters, and this particular algorithmic implementation also includes hardwired internal parameters so that none is user-specified. The algorithm's performance is tested against a widely used suite of twenty three benchmark functions and compared to other state-of-the-art algorithms. CFO performs very well indeed. Includes important update 20 March 2010 addressing the issue of different probes coalescing into one.

en cs.OH
arXiv Open Access 2010
Usability Meets Instant Gratification on the Semantic Web

David Aumueller

This paper presents a semantic wiki prototype application named SHAWN [later WikSAR] that allows structuring concepts within a wiki environment. To entice the use of Semantic Web technologies applications need to offer both high usability and instant gratification. Concept creation is exceptionally easy in SHAWN since metadata as well as plain text is entered within a single edit box on each wiki page in a self-explaining fashion. The entered data is immediately used for rendering sophisticated navigational means on the wiki. By editing simple wiki pages ontologies emerge.

en cs.OH
arXiv Open Access 2009
Hierarchical Triple-Modular Redundancy (H-TMR) Network For Digital Systems

B. Baykant Alagoz

Hierarchical application of Triple-Modular Redundancy (TMR) increases fault tolerance of digital Integrated Circuit (IC). In this paper, a simple probabilistic model was proposed for analysis of fault masking performance of hierarchical TMR networks. Performance improvements obtained by second order TMR network were theoretically compared with first order TMR network.

en cs.OH
arXiv Open Access 2009
The Effectiveness of Computer Assisted Classes for English as a Second Language

Ioana Iacob

The present study aims to evaluate the efficiency of the computer assisted English classes and to emphasize the necessity of developing sound methodological strategies adjusted to the new technology. It also present the benefits of using the computer in the pre-school and elementary school classes, highlighted by a report on the comparative observation of four groups of children studying English in a computer assisted environment.

en cs.OH
arXiv Open Access 2009
Les technologies de l'information et de la communication au niveau mondial et en Roumanie dans les dernieres annees

Diana Sophia Codat

The level of development of the electronic communication market and of the information technology, the indicators regarding the penetration of Internet and the level of penetration of the connections in wide band, the integration degree of the Tic application in the business area are crucial for the development of an informational society and for the creation of a society based on knowledge. Though the levels are still reduced their positive evolution reflects the attenuation of the gaps by Romania, comparatively to other countries.

en cs.OH

Halaman 16 dari 18202