911 resultados para SAGA (Computer system)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This project aims to apply image processing techniques in computer vision featuring an omnidirectional vision system to agricultural mobile robots (AMR) used for trajectory navigation problems, as well as localization matters. To carry through this task, computational methods based on the JSEG algorithm were used to provide the classification and the characterization of such problems, together with Artificial Neural Networks (ANN) for pattern recognition. Therefore, it was possible to run simulations and carry out analyses of the performance of JSEG image segmentation technique through Matlab/Octave platforms, along with the application of customized Back-propagation algorithm and statistical methods in a Simulink environment. Having the aforementioned procedures been done, it was practicable to classify and also characterize the HSV space color segments, not to mention allow the recognition of patterns in which reasonably accurate results were obtained.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In large distributed systems, where shared resources are owned by distinct entities, there is a need to reflect resource ownership in resource allocation. An appropriate resource management system should guarantee that resource's owners have access to a share of resources proportional to the share they provide. In order to achieve that some policies can be used for revoking access to resources currently used by other users. In this paper, a scheduling policy based in the concept of distributed ownership is introduced called Owner Share Enforcement Policy (OSEP). OSEP goal is to guarantee that owner do not have their jobs postponed for longer periods of time. We evaluate the results achieved with the application of this policy using metrics that describe policy violation, loss of capacity, policy cost and user satisfaction in environments with and without job checkpointing. We also evaluate and compare the OSEP policy with the Fair-Share policy, and from these results it is possible to capture the trade-offs from different ways to achieve fairness based on the user satisfaction. © 2009 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The constant increase in digital systems complexity definitely demands the automation of the corresponding synthesis process. This paper presents a computational environment designed to produce both software and hardware implementations of a system. The tool for code generation has been named ACG8051. As for the hardware synthesis there has been produced a larger environment consisting of four programs, namely: PIPE2TAB, AGPS, TABELA, and TAB2VHDL. ACG8051 and PIPE2TAB use place/transition net descriptions from PIPE as inputs. ACG8051 is aimed at generating assembly code for the 8051 micro-controller. PIPE2TAB produces a tabular version of a Mealy type finite state machine of the system, its output is fed into AGPS that is used for state allocation. The resulting digital system is then input to TABELA, which minimizes control functions and outputs of the digital system. Finally, the output generated by TABELA is fed to TAB2VHDL that produces a VHDL description of the system at the register transfer level. Thus, we present here a set of tools designed to take a high-level description of a digital system, represented by a place/transition net, and produces as output both an assembly code that can be immediately run on an 8051 micro-controller, and a VHDL description that can be used to directly implement the hardware parts either on an FPGA or as an ASIC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The object of this investigation was to identify and analize aspects of the health status related to absenteism in physical education teachers in the municipal education system of the city of Campinas, Brazil, as related to the medical leave program. The non-concurrent prospective study was accomplished by means of a comparison with teachers who work only in the classroom, refering to a three year period. In the variables of greatest interest, the Pearson non-parametric chi-square (X2) statistical test was adopted. Calculations of relative risk and level of confidence were made using the Epi-info computer program. Significant differences were observed in the following diagnostic groups favoring the not exposed group: i) Supplementary Classification of factors that exercise influence over the health status and access to health services and ii) Digestive system illness; while the physical education teachers showed a significant difference in: i) diseases of the musculoskeletal and connective tissue system and ii) Injuries and poisoing. Possible explications for some of the adverse effects as well as the protective ones that were observed include physical activity as a way of life along with being a physical education teacher and on the other side, peculiar behavior of epidemiological descriptive characteristics, like sex and age, within the socio-economic context of the country. © Copyright Moreira Jr. Editora.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cuttings return analysis is an important tool to detect and prevent problems during the petroleum well drilling process. Several measurements and tools have been developed for drilling problems detection, including mud logging, PWD and downhole torque information. Cuttings flow meters were developed in the past to provide information regarding cuttings return at the shale shakers. Their use, however, significantly impact the operation including rig space issues, interferences in geological analysis besides, additional personel required. This article proposes a non intrusive system to analyze the cuttings concentration at the shale shakers, which can indicate problems during drilling process, such as landslide, the collapse of the well borehole walls. Cuttings images are acquired by a high definition camera installed above the shakers and sent to a computer coupled with a data analysis system which aims the quantification and closure of a cuttings material balance in the well surface system domain. No additional people at the rigsite are required to operate the system. Modern Artificial intelligence techniques are used for pattern recognition and data analysis. Techniques include the Optimum-Path Forest (OPF), Artificial Neural Network using Multilayer Perceptrons (ANN-MLP), Support Vector Machines (SVM) and a Bayesian Classifier (BC). Field test results conducted on offshore floating vessels are presented. Results show the robustness of the proposed system, which can be also integrated with other data to improve the efficiency of drilling problems detection. Copyright 2010, IADC/SPE Drilling Conference and Exhibition.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Actinic cheilitis (AC) is a premalignant condition intimately related to exposure of the lips to sun rays. Aim: The objective of this study was to evaluate the elastic and collagen fibers in the lamina propria of AC. The degree of epithelial atypia was correlated with the quantity of elastic and collagen fibers. Materials and Methods: Fifty-one cases were investigated. One slide was stained with hematoxylin-eosin for the evaluation of atypia, the second was stained with Weigert′s resorcin-fuchsin for the assessment of elastic fibers, and the third slide was stained with Mallory′s trichrome for the analysis of collagen fibers. Results: Ordinal logistic regression analysis revealed a significant correlation between the presence of atypia and collagen fibers (P<0.05). Conclusions: It was concluded that there seems to be a reduction in the quantity of collagen fibers in cases of moderate and severe atypia. No correlation was observed between the degradation of elastic system fibers and the grade of dysplasia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The main application area in this project, is to deploy image processing and segmentation techniques in computer vision through an omnidirectional vision system to agricultural mobile robots (AMR) used for trajectory navigation problems, as well as localization matters. Thereby, computational methods based on the JSEG algorithm were used to provide the classification and the characterization of such problems, together with Artificial Neural Networks (ANN) for image recognition. Hence, it was possible to run simulations and carry out analyses of the performance of JSEG image segmentation technique through Matlab/Octave computational platforms, along with the application of customized Back-propagation Multilayer Perceptron (MLP) algorithm and statistical methods as structured heuristics methods in a Simulink environment. Having the aforementioned procedures been done, it was practicable to classify and also characterize the HSV space color segments, not to mention allow the recognition of segmented images in which reasonably accurate results were obtained. © 2010 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper analyzes the non-linear dynamics of a MEMS Gyroscope system, modeled with a proof mass constrained to move in a plane with two resonant modes, which are nominally orthogonal. The two modes are ideally coupled only by the rotation of the gyro about the plane's normal vector. We demonstrated that this model has an unstable behavior. Control problems consist of attempts to stabilize a system to an equilibrium point, a periodic orbit, or more general, about a given reference trajectory. We also developed a particle swarm optimization technique for reducing the oscillatory movement of the nonlinear system to a periodic orbit. © 2010 Springer-Verlag.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents the work in progress of an on-demand software deployment system based on application virtualization concepts which eliminates the need of software installation and configuration on each computer. Some mechanisms were created, such as mapping of utilization of resources by the application to improve the software distribution and startup; a virtualization middleware which give all resources needed for the software execution; an asynchronous P2P transport used to optimizing distribution on the network; and off-line support where the user can execute the application even when the server is not available or when is out of the network. © Springer-Verlag Berlin Heidelberg 2010.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: This paper describes proposed health care services innovations, provided by a system called CAALYX (Complete Ambient Assisted Living eXperiment). CAALYX aimed to provide healthcare innovation by extending the state-of-the-art in tele-healthcare, by focusing on increasing the confidence of elderly people living autonomously, by building on the knowledge base of the most common disorders and respective characteristic vital sign changes for this age group. Methods: A review of the state-of-the-art on health care services was carried out. Then, extensive research was conducted on the particular needs of the elderly in relation to home health services that, if offered to them, could improve their day life by giving them greater confidence and autonomy. To achieve this, we addressed issues associated with the gathering of clinical data and interpretation of these data, as well as possibilities of automatically triggering appropriate clinical measures. Considering this initial work we started the identification of initiatives, ongoing works and technologies that could be used for the development of the system. After that, the implementation of CAALYX was done. Findings: The innovation in CAALYX system considers three main areas of contribution: (i) The Roaming Monitoring System that is used to collect information on the well-being of the elderly users; (ii) The Home Monitoring System that is aimed at helping the elders independently living at home being implemented by a device (a personal computer or a set top box) that supports the connection of sensors and video cameras that may be used for monitoring and for interaction with the elder; (iii) The Central Care Service and Monitoring System that is implemented by a Caretaker System where attention and care services are provided to elders, where actors as Caretakers, Doctors and Relatives are logically linked to elders. Innovations in each of these areas are presented here. Conclusions: The ageing European society is placing an added burden on future generations, as the 'elderly-to-working-age-people' ratio is set to steadily increase in the future. Nowadays, quality of life and fitness allows for most older persons to have an active life well into their eighties. Furthermore, many older persons prefer to live in their own house and choose their own lifestyle. The CAALYX system can have a clear impact in increasing older persons' autonomy, by ensuring that they do not need to leave their preferred environment in order to be properly monitored and taken care of. © 2011 Elsevier B.V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Intrusion detection systems that make use of artificial intelligence techniques in order to improve effectiveness have been actively pursued in the last decade. Neural networks and Support Vector Machines have been also extensively applied to this task. However, their complexity to learn new attacks has become very expensive, making them inviable for a real time retraining. In this research, we introduce a new pattern classifier named Optimum-Path Forest (OPF) to this task, which has demonstrated to be similar to the state-of-the-art pattern recognition techniques, but extremely more efficient for training patterns. Experiments on public datasets showed that OPF classifier may be a suitable tool to detect intrusions on computer networks, as well as allow the algorithm to learn new attacks faster than the other techniques. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work describes a new web system to aid project management that was created to correct the principal deficiencies identified in systems having a common purpose which are at present available, as well as to follow the guidelines that are proposed in the Project Management Body of Knowledge (PMBoK) and the quality characteristics described in the ISO/IEC 9126 norm. As from the adopted methodology, the system was structured to attend the real necessities of project managers and also to contribute towards obtaining quality results from the projects. The validation of the proposed solution was done with the collaboration of professionals that used the functions available in it for a period of 15 days. Results attested to the quality and adequacy of the developed system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article shows an analysis of the longitudinal electric parameters of a three-phase transmission line/section using a 280-meter high steel tower. This characteristic, the height of the line conductors and distance between them, are intrinsic related to the longitudinal and transversal parameters of the line. By this means, an accurate study was carried out in order to show the electric variations between a transmission line using the new technology and a three-phase conventional 440 kV line for a wide range of frequencies and a variable soil resistivity. In addition, by using a digital line model, simulations are carried out in time domain to analyze critical overvoltage transients on the studied line. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform malware distributed collection, analysis and detection, this last inspired by the human immune system. After collecting malware samples from Internet, they are dynamically analyzed so as to provide execution traces at the operating system level and network flows that are used to create a behavioral model and to generate a detection signature. Those signatures serve as input to a malware detector, acting as the antibodies in the antigen detection process. This allows us to understand the malware attack and aids in the infection removal procedures. © 2012 Springer-Verlag.