Computer Vision Pattern Recognition

Advances in Expert Systems by Petrica Vizureanu

By Petrica Vizureanu

Clever platforms, referred to as professional structures, serve to this objective within the quantity that they have got signed as facilitators during this approach. those are platforms which are in response to professional wisdom, on any topic, with a view to emulate human services within the particular box. to procure this information, the data engineers, also known as software program engineers, have to enhance methodologies for clever structures. during this sector there's nonetheless no unified method that gives powerful tools, notations and instruments to assist in improvement.

Show description

Read or Download Advances in Expert Systems PDF

Best computer vision & pattern recognition books

Robot Motion Planning

One of many final ambitions in Robotics is to create self sustaining robots. Such robots will settle for high-level descriptions of projects and should execute them with no additional human intervention. The enter descriptions will specify what the person wishes performed instead of tips to do it. The robots might be any form of flexible machine built with actuators and sensors less than the regulate of a computing method.

Advanced Technologies in Ad Hoc and Sensor Networks: Proceedings of the 7th China Conference on Wireless Sensor Networks

Complex applied sciences in advert Hoc and Sensor Networks collects chosen papers from the seventh China convention on instant Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The publication beneficial properties cutting-edge reports on Sensor Networks in China with the subject matter of “Advances in instant sensor networks of China”.

Advances in Biometrics for Secure Human Authentication and Recognition

''Supplying a high-level assessment of ways to guard your company's actual and intangible resources, Asset safety via protection expertise explains the simplest how one can enlist the help of your staff because the first defensive line in safeguarding corporation resources and mitigating safety dangers. It experiences key issues surrounding computing device security--including privateness, entry controls, and chance management--to assist you fill the gaps that will exist among administration and the technicians securing your community structures.

Additional info for Advances in Expert Systems

Example text

B) Data for detecting the occurrence type - The data stored in the Database 2 provide the alarm type and corresponding classification of the disruptions through several codes which are in‐ serted on the restoring map of operating substation. The classification of the types of occur‐ rences, together with the risk analysis signal PESPAL2v the activation of the flowchart corresponding to the restoring map of the area affected by the contingency. Figure 15 shows the signal flow where Database 1 and 2 are related with the modules of risk analysis, previewing and diagnosis.

The buses that interconnect the several equipments installed at a substation such as trans‐ formers, electric keys and breakers of the sub-transmission system are points where voltage and current can be measured for each one of the loads interconnected by the breakers. In an operating substation a sub-voltage evidence degree and an overcurrent evidence degree are extracted from each breaker which activate loads at an operating substation. Based on these values, the modules composed by the algorithms of the PAL2v verify the state of that point with respect to tension decreasing and excess of current intensity which together contributes to the increase of the overload risk at the point measured.

Because of that there is the need of an efficient protection in which the sector responsible for the energy transmission and distribution as well as the generating sector are controlled in a quick and efficient way in order to keep the power generated according to the charges required. That said so, energy generation must be kept according to the conditions established by the load and comply with the conditions in which the protection systems are capable of prevent failures of the generation equipment due to possible overloads [3][7].

Download PDF sample

Rated 4.82 of 5 – based on 13 votes