Search
Search Results
-
Introduction to Control Reconfiguration
Controlled technological systems are used in many fields. They provide essential services such as the regulation of water pressure, the control of... -
Direct Reconfiguration Using a Static Block
This chapter employs a static reconfiguration block in order to solve the direct reconfiguration problem. It is shown that this approach gives... -
Solvability of Disturbance Decoupling
The strong reconfiguration problem leads to a disturbance decoupling problem as stated in Sect. 10.4. There are known structural tests for the... -
Running Example: the 2-Tank System
A simple system will be used as a running example throughout the manuscript. It serves to illustrate typical faults and the resulting reconfiguration... -
Componentwise Least Squares Support Vector Machines
This chapter describes componentwise Least Squares Support Vector Machines (LS-SVMs) for the estimation of additive models consisting of a sum of... -
Fuzzy Support Vector Machines with Automatic Membership Setting
Support vector machines like other classification approaches aim to learn the decision surface from the input points for classification problems or... -
Adaptive Discriminant and Quasiconformal Kernel Nearest Neighbor Classification
Nearest neighbor classification assumes locally constant class conditional probabilities. This assumption becomes invalid in high dimensions due to... -
Memory Modules and the Innate Structure
As the philosopher Miguel de Umamuno (1864-1936) once said, “We live in memory and memory, and our spiritual life is at bottom simply the effort of... -
The Artificial Mind System (AMS), Modules, and Their Interactions
The previous two chapters have been devoted to establishing the novel artificial neural network concept, namely the kernel memory concept, for the... -
Web Mining – Concepts, Applications and Research Directions
From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data... -
Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets
We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to... -
Reconfiguration of a Helicopter Model
A two-degrees-of-freedom helicopter experiment (see Fig. 17.1) is used as a more complex reconfiguration example. As demonstrated by Lunze et al.... -
Conclusion
This chapter mentions the main results of the manuscript. The motivation was to find methods for autonomous control reconfiguration after faults.... -
Reconfiguration Using a Virtual Sensor
This chapter develops the concept of a virtual sensor: when a sensor is at fault, an observer is used to calculate a replacement value. This approach... -
SYNESTHETIC ANALYSIS OF AUDIO-VISUAL DATA
Interaction between two perceptual modalities, seeing and hearing, their interaction and mutual reinforcement in a complex relationship was a subject... -
CONCLUDING REMARKS
The choice of problems presented in this study is intended to emphasize that in some cases even the classical problems of acoustics can be addressed... -
A Comparative Investigation on Model Selection in Binary Factor Analysis
Binary factor analysis has been widely used in data analysis with various applications. Most studies assume a known hidden factors number k or... -
Extraction of Generalized Rules with Automated Attribute Abstraction
We propose a novel method for mining generalized rules with high support and confidence. Using our method, we can obtain generalized rules in which... -
A Careful Look at the Use of Statistical Methodology in Data Mining
Knowledge discovery in databases (KDD) is an inherently statistical activity, with a considerable literature drawing upon statistical science.... -
Improved Knowledge Mining with the Multimethod Approach
Automatic induction from examples has a long tradition and represents an important technique used in data mining. Trough induction a method builds a...