Spelling suggestions: "subject:"computational power"" "subject:"computational lower""
1 |
Spatially localised membrane systemsCsuhaj-Varju, E., Gheorghe, Marian, Stannett, M., Vaszil, G. January 2015 (has links)
No / In this paper we investigate the use of general topological spaces in connection with a
generalised variant of membrane systems. We provide an approach which produces a fine grain
description of local operations occurring simultaneously in sets of compartments of the system by
restricting the interactions between objects. This restriction is given by open sets of a topology and
multisets of objects associated with them, which dynamically change during the functioning of the
system and which together define a notion of vicinity for the objects taking part in the interactions. / The first, the second, and the third authors were partially supported under the Royal Society International Exchanges Scheme (ref. IE110369). The second author was also partially supported by the project MuVet, Romanian National Authority for Scientific Research (CNCS – UEFISCDI) grant number PNII- ID-PCE-2011-3-0688. This work was partially completed whilst the third author was a visiting fellow at the Isaac Newton Institute for the Mathematical Sciences in the programme ‘Semantics & Syntax: A Legacy of Alan Turing’. The work of the first and the fourth author was also supported in part by the Hungarian Scientific Research Fund (OTKA), Grant no. K75952. The fourth author was supported by the European Union through the T´AMOP-4.2.2.C-11/1/KONV-2012-0001 project which is co-financed by the European Social Fund.
|
2 |
A Comparative Study of Facial Recognition Techniques : With focus on low computational powerSchenkel, Timmy, Ringhage, Oliver, Branding, Nicklas January 2019 (has links)
Facial recognition is an increasingly popular security measure in scenarios with low computational power, such as phones and Raspberry Pi’s. There are many facial recognition techniques available. The aim is to compare three such techniques in both performance and time metrics. An experiment was conducted to compare the facial recognition techniques Convolutional Neural Network (CNN), Eigenface with the classifiers K-Nearest Neighbors (KNN) and support vector machines (SVM) and Fisherface with the classifiers KNN and SVM under the same conditions with a limited version of the LFW dataset. The Python libraries scikit-learn and OpenCV as well as the CNN implementation FaceNet were used. The results show that the CNN implementation of FaceNet is the best technique in all metrics except for prediction time. FaceNet achieved an F-score of 100% while the OpenCV implementation of Eigenface using SVM scored the worst at 15.5%. The technique with the lowest prediction time was the scikit-learn implementation of Fisherface with SVM.
|
3 |
Further results on generalised communicating P systemsKrishna, S.N., Gheorghe, Marian, Ipate, F., Csuhaj-Varju, E., Ceterchi, R. 01 June 2017 (has links)
Yes / In this paper we consider four restricted cases of the generalised communicating P systems and
study their computational power, by providing improved results, with respect to the number
of compartments involved. We illustrate the expressive power of these devices by modelling
several problems, such as producer/consumer, work
ow patterns, broadcasting problem and
comparative operations. We also present some relationships between generalised communicating P systems and P colonies, tissue-like P systems with very simple components. / MG and FI were supported by a grant of the Romanian National Authority for Scientific Research, CNCS-UEFISCDI, project number PN-II-ID-PCE-2011-3-0688, CSVE by grant No. 120558 of the National Research, Development, and Innovation Office, Hungary.
|
4 |
Improving Time Management in the PDA : A Design SuggestionGlenne, Jonas, Gustavsson, Hanna January 2002 (has links)
Many of those who buy a PDA today do it for the purpose of time management. The PDA is meant to replace other artifacts like paper diaries and notebooks but in practice the PDA cannot be used as the sole resource for time management. We think that to succeed in making time management with a PDA more useful the design has to be grounded in an understanding of the existing technology and how it is used in practice. We achieved this understanding of the time management with a PDA by conducting an ethnographical study to find out how the PDA is used in practice, making a technical investigation of the PDA and cooperated with the PDA users throughout the design process. In this thesis we describe our design suggestion that improves the applications for time management in the PDA and take it a step closer to be the replacement for other time management artifacts that the users wanted.
|
5 |
The Virtual Learning Environment : Patterns for Structuring Web based TeachingGustavsson, Hanna, Karlsson, Hanna January 2003 (has links)
Online education creates new demands on organization and structure in order to make use of its advantages with the technology for learning. Research in this area elucidates new possibilities with the computer as a medium, to individualize and make the learning more flexible. Meanwhile, the empirical study shows practical limitations, which affects the design of web-based teaching. As a result, we have started to develop a guideline, which describes these new possibilities and common problems with the new learning environment. We have structured the guideline by first defining the problem area and then giving recommendation or in some cases proposal of improving the technique. The purpose with the guideline is to illustrate and support teachers with knowledge and inspiration to make the design of this new form of education suitable in its practice.
|
6 |
Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice / Analysis and Optimization of Data Communication for Telemetric Systems in EnergyFujdiak, Radek January 2017 (has links)
Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation.
|
Page generated in 0.1036 seconds