We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Introduction to Control Reconfiguration

    Controlled technological systems are used in many fields. They provide essential services such as the regulation of water pressure, the control of...
    Chapter
  2. Direct Reconfiguration Using a Static Block

    This chapter employs a static reconfiguration block in order to solve the direct reconfiguration problem. It is shown that this approach gives...
    Chapter
  3. Solvability of Disturbance Decoupling

    The strong reconfiguration problem leads to a disturbance decoupling problem as stated in Sect. 10.4. There are known structural tests for the...
    Chapter
  4. Running Example: the 2-Tank System

    A simple system will be used as a running example throughout the manuscript. It serves to illustrate typical faults and the resulting reconfiguration...
    Chapter
  5. Componentwise Least Squares Support Vector Machines

    This chapter describes componentwise Least Squares Support Vector Machines (LS-SVMs) for the estimation of additive models consisting of a sum of...
    K. Pelckmans, I. Goethals, ... B.D. Moor in Support Vector Machines: Theory and Applications
    Chapter
  6. Fuzzy Support Vector Machines with Automatic Membership Setting

    Support vector machines like other classification approaches aim to learn the decision surface from the input points for classification problems or...
    Chapter
  7. Adaptive Discriminant and Quasiconformal Kernel Nearest Neighbor Classification

    Nearest neighbor classification assumes locally constant class conditional probabilities. This assumption becomes invalid in high dimensions due to...
    J. Peng, D.R. Heisterkamp, H.K. Dai in Support Vector Machines: Theory and Applications
    Chapter
  8. Memory Modules and the Innate Structure

    As the philosopher Miguel de Umamuno (1864-1936) once said, “We live in memory and memory, and our spiritual life is at bottom simply the effort of...
    Chapter
  9. The Artificial Mind System (AMS), Modules, and Their Interactions

    The previous two chapters have been devoted to establishing the novel artificial neural network concept, namely the kernel memory concept, for the...
    Chapter
  10. Web Mining – Concepts, Applications and Research Directions

    From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data...
    T. Srivastava, P. Desikan, V. Kumar in Foundations and Advances in Data Mining
    Chapter
  11. Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets

    We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to...
    Q. Zou, Y. Chen, ... X. Lu in Foundations and Advances in Data Mining
    Chapter
  12. Reconfiguration of a Helicopter Model

    A two-degrees-of-freedom helicopter experiment (see Fig. 17.1) is used as a more complex reconfiguration example. As demonstrated by Lunze et al....
    Chapter
  13. Conclusion

    This chapter mentions the main results of the manuscript. The motivation was to find methods for autonomous control reconfiguration after faults....
    Chapter
  14. Reconfiguration Using a Virtual Sensor

    This chapter develops the concept of a virtual sensor: when a sensor is at fault, an observer is used to calculate a replacement value. This approach...
    Chapter
  15. SYNESTHETIC ANALYSIS OF AUDIO-VISUAL DATA

    Interaction between two perceptual modalities, seeing and hearing, their interaction and mutual reinforcement in a complex relationship was a subject...
    Chapter
  16. CONCLUDING REMARKS

    The choice of problems presented in this study is intended to emphasize that in some cases even the classical problems of acoustics can be addressed...
    Chapter
  17. A Comparative Investigation on Model Selection in Binary Factor Analysis

    Binary factor analysis has been widely used in data analysis with various applications. Most studies assume a known hidden factors number k or...
    Chapter
  18. Extraction of Generalized Rules with Automated Attribute Abstraction

    We propose a novel method for mining generalized rules with high support and confidence. Using our method, we can obtain generalized rules in which...
    Yohji Shidara, Mineichi Kudo, Atsuyoshi Nakamura in Foundations of Data Mining and knowledge Discovery
    Chapter
  19. A Careful Look at the Use of Statistical Methodology in Data Mining

    Knowledge discovery in databases (KDD) is an inherently statistical activity, with a considerable literature drawing upon statistical science....
    Chapter
  20. Improved Knowledge Mining with the Multimethod Approach

    Automatic induction from examples has a long tradition and represents an important technique used in data mining. Trough induction a method builds a...
    Mitja Lenič, Peter Kokol, ... Ryuichi Yamamoto in Foundations of Data Mining and knowledge Discovery
    Chapter
Did you find what you were looking for? Share feedback.