Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (426)
  • Open Access

    ABSTRACT

    Risk modeling by CHAID decision tree algorithm

    A.S. Koyuncugil1, N. Ozgulbas2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.11, No.2, pp. 39-46, 2009, DOI:10.3970/icces.2009.011.039

    Abstract In this paper, a data mining model for detecting financial and operational risk indicators by CHAID Decision Tree is presenting. The identification of the risk factors by clarifying the relationship between the variables defines the discovery of knowledge from the financial and operational variables. Automatic and estimation oriented information discovery process coincides the definition of data mining. During the formation of model; an easy to understand, easy to interpret and easy to apply utilitarian model that is far from the requirement of theoretical background is targeted by the discovery of the implicit relationships between the More >

  • Open Access

    ABSTRACT

    Damage localization on hot and curved structures based on ultrasonic propagation imaging technology

    C.C. Chia1, S.G. Jang1, J.R. Lee2, D.J. Yoon2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.11, No.2, pp. 29-30, 2009, DOI:10.3970/icces.2009.011.029

    Abstract An ultrasonic propagation imaging (UPI) system consisted of a Q-switched Nd-YAG pulsed laser with 20 Hz-repetition rate and a motorized tilting mirror system for rapid scanning of target was developed. The system which requires neither reference data nor fixed focal length could be used for health monitoring of curved structures. If combined with a fiber acoustic wave PZT (FAWPZT) sensor, it could be used to perform inspection on hot target structures, which present formidable challenges to the usage of contact piezoelectric transducers mainly due to the Curie temperature limitation of transducers and debonding problem due… More >

  • Open Access

    ARTICLE

    Tracking Features in Image Sequences with Kalman Filtering, Global Optimization, Mahalanobis Distance and a Management Model

    Raquel R. Pinho1, João Manuel R. S. Tavares1

    CMES-Computer Modeling in Engineering & Sciences, Vol.46, No.1, pp. 51-76, 2009, DOI:10.3970/cmes.2009.046.051

    Abstract This work addresses the problem of tracking feature points along image sequences. In order to analyze the undergoing movement, an approach based on the Kalman filtering technique has been used, which basically carries out the estimation and correction of the features' movement in every image frame. So as to integrate the measurements obtained from each image into the Kalman filter, a data optimization process has been adopted to achieve the best global correspondence set. The proposed criterion minimizes the cost of global matching, which is based on the Mahalanobis distance. A management model is employed More >

  • Open Access

    ABSTRACT

    Iris Biometrics Recognition Application in Security Management

    S.S. Chowhan1, G.N. Shinde2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.6, No.1, pp. 1-12, 2008, DOI:10.3970/icces.2008.006.001

    Abstract Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. Biometrics is gaining increasing attention in these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. The use of fingerprints, facial characteristics and other biometrics for identification is becoming more common. This paper overview best of Biometric application for security management. The acquisition of biometric data introduces human research and privacy concerns that must be addressed by the organizations. This More >

  • Open Access

    REVIEW

    Contribution of Biomechanics to Management of Ligament and Tendon Injuries

    Savio L-Y. Woo∗,†, Matthew B. Fisher, Andrew J. Feola

    Molecular & Cellular Biomechanics, Vol.5, No.1, pp. 49-68, 2008, DOI:10.3970/mcb.2008.005.049

    Abstract The contribution of biomechanics to the advancement of management of ligament and tendon injuries has been significant. Thanks to Professor Y.C. Fung's writing and guidance, our field of research has done fundamental work on anatomy and biology of ligaments and tendons, developed methods to accurately determine mechanical properties, identified various experimental factors which could change the outcome measurements as well as examined biological factors that change tissue properties in-vivo. Professor Fung also gave us his quasi-linear viscoelastic theory for soft tissues so that the time and history dependent properties of ligaments and tendons could be More >

  • Open Access

    ARTICLE

    A New Uncertain Optimization Method Based on Intervals and An Approximation Management Model

    C. Jiang1, X. Han1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.22, No.2, pp. 97-118, 2007, DOI:10.3970/cmes.2007.022.097

    Abstract A new uncertain optimization method is developed based on intervals and an approximation management model. A general uncertain optimization problem is considered in which the objective function and constraints are both nonlinear and uncertain, and intervals are used to model the uncertainty existing in the system. Based on a possibility degree of interval,anonlinear interval number programming (NINP) method is proposed. A deterministic objective function is constructed to maximize the possibility degree of the uncertain objective function, and the uncertain constraints are changed into deterministic ones by introducing some possibility degree levels. If the optimal possibility degree More >

Displaying 421-430 on page 43 of 426. Per Page