The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a model-based testing approach for reactive systems where both test inputs and expected results are generated from ‘restricted’ Event-B specifications. We show that it is possible to automatically build the restricted Event-B specifications from the original ones base on a knowledge base of the system under tests. The restricted models are to reduce the state space of the original Event-B...
This paper presents the design of a Coarse-grained Reconfigurable Architecture (CGRA), called MUSRA (Multimedia Specific Reconfigurable Architecture). The MUSRA is proposed to exploit multi-level parallelism of the computation-intensive loops in multimedia processing applications. To solve the huge bandwidth requirement of parallel processing arrays, the proposed architecture focuses on the exploitation...
With the fast increasingly use of image and video processing in many aspects, the requirements for high performance and high-quality systems lead to the use of reconfigurable computing to accelerate traditional image processing platforms. In this work, an efficient runtime adaptable floating-point Gaussian filtering core is proposed to achieve not only high performance and quality but also kernel...
Histogram of Oriented Gradient (HOG) is a popular feature description for the purpose of object detection. However, HOG algorithm requires a high performance system because of its complex operation set. In HOG algorithm, the cell histogram generation is one of the most complex part, it uses inverse tangent, square, square root, floating point multiplication. In this paper, we propose an accurate and...
Model-based software estimation uses algorithms and past project data to make predictions for new projects. This paper presents a comparative assessment of four modeling approaches, including the original COCOMO, COCOMO calibration, k-Nearest Neighbors, and a combination of COCOMO calibration and k-Nearest Neighbors. Our results indicate that using kNN to select the nearest projects and calibrating...
In residential houses, air conditioners consume a lot of electrical energy. In order to improve energy efficiency for residential houses, short-term prediction of energy consumption of air conditioners is required. In this paper, we propose the use of our thermal simulation to simulate the change of room temperature based on weather forecast information and predict the energy consumption of an air...
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
Recognition of human actions is an intelligent way for human-machine communication and Radial basis function (RBF) models are among the most powerful machines on this task. One prerequisite of using this traditional model is that the movement data must be translated into a vector space via the feature extraction process. Recent development of the convolutional neural networks (CNNs) has been shown...
This paper considers the multi-unit resource allocation problem with a few distinct (indivisible and non-shareable) goods (or items, objects), each has a certain amount of copies. Every agent expresses her preference over multisets of goods by mean of utility function. The goal is to distribute goods among agents in such a way that maximizes either utilitarian social welfare or egalitarian social...
In multi-proxy multi-signature schemes, an original group of signers can authorize another group of proxy signers under the agreement of all singers both in the original group and proxy group. The paper proposes a new multi-proxy multi-signature based on elliptic curve cryptography. This new scheme is secure against the insider attack that is a powerful attack on the multi-signature schemes.
Gender is one of the most useful facial attributes which are detected from human face images. In this work, we introduce a new gender classification system based on features extracted by Local Phase Quantization (LPQ) operators from intensity and Monogenic images. More detailed, the LPQ features are obtained from the input image (the intensity one) and from three other Monogenic components in the...
Mining high utility patterns, the subject of which has attracted many researchers in data mining, is the process of discovering patterns with utility satisfying a minimum predetermined threshold. Many studies have been performed, but finding the suitable minimum utility threshold is problematic, because users cannot predict the appropriate threshold that affects mining performance. To solve this problem,...
Extracting and recognizing mathematical expressions of scientific documents are key steps in the process of mathematical retrieval system, where the documents contain different components such as text, tables, figures, and mathematical expressions. There are several methods proposed to handle the components of documents. Those methods have investigated the feature of components based on the segmented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.