The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presently, the nature of action potential propagation deep within myocardial tissue is unclear. As a result, a complete understanding of cardiac dynamics remains elusive. Here we present a technique using ultrasound and electromechanical modeling that has the potential to unlock this mystery. We also present information suggesting tension in the heart behaves as a long-range force incapable of being...
In this paper a new fuzzy linear support vector machine formulation for regression problems is proposed and solved by the active set computational strategy. In this model, to each input data a fuzzy membership value is associated so that the input data can contribute proportionally to the learning of the decision surface. The proposed method has the advantage that its solution is obtained by solving...
Modern networks provide QoS model to go beyond best-effort services, but current QoS models are oriented towards low level network parameters (e.g. bandwidth, latency, jitter) application developers on the other hand are interested in quality models that are meaningful to the end-user and therefore struggle to bridge the gap between networks and application QoS models. Network-aware applications are...
This paper presents a novel formulation of multiclass support vector machine by integrating the concepts of soft labels and granular computing. The proposed multiclass mv-granular soft support vector machine uses soft labels to address the issues due to noisy and incorrectly labeled data, and granular computing to make it adaptable to data distributions both globally and locally. The proposed multiclass...
Probe design is the most important step for any microarray based assay. Accurate and efficient probe design and selection for the target sequence is critical in generating reliable and useful results. Several different approaches for probe design are reported in literature and an increasing number of bioinformatics tools are available for the same. However, based on the reported low accuracy, determining...
A Directory Harvest Attack or DHA is a technique used by spammers in an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. Directory Harvest Attackers send the blank mail to the server to collect the valid user-id. They do this by observing the server's reply. Traditionally attackers use single IP address to send mails. Recently...
The ion cyclotron resonance frequency (ICRF) system is one of the most important ITER heating and current drive systems. Total 20 MW of RF power is required to be dumped on the ITER plasma using 8 nos. of RF sources, each capable of delivering 2.5 MW at VSWR 2 in the frequency range 35 - 65 MHz. RF power to the antenna should remain constant to its required value, even if source experiences VSWR of...
Directional couplers are used to monitor forward and reflected high RF powers. At Mega Hertz range of frequencies, normally loop type directional couplers are used. The loop samples electric or magnetic fields. The penetration and orientation of the loops are adjusted in such a way that the magnitude of electric and magnetic current is same in the two arms of the loop. In this configuration one arm...
The azomethines1-[(2-hydroxyphenyl)-1-N-phenylamino] hydrazine-carboxamide (HOcapNcapOH) and 2-hydroxy-N-phenyl benzamide benzothiazoline (HOcapNcapSH) have been synthesized by the condensation of 2-hydroxy-N-phenylbenzamide with semicarbazide hydrochloride and 2-aminothiophenol, respectively. The new derivatives have been prepared by the reactions with hydrated lanthanide chlorides. Elemental analysis...
This paper presents a load flow solution for radial and weakly meshed distribution system. The problem is formulated as an optimization problem based on minimization of L1 norm of a vector consisting of power mismatch at every node in a distribution system. The optimization problem is solved using interior point (IP) method. The advantage of interior point method is that it converges in polynomial...
The measurands from the remote location are gathered at central control room (CCR) for processing, taking corrective action and presenting to higher hierarchy in a presentable format and it requires remote terminal unit to communicate between them. The pre-processing of current has been done using fuzzy logic algorithm for pre-processing the measurands at RTU for further action. It is noted that the...
Automatic fingerprint identification systems use level-1 and level-2 features for fingerprint identification. However, forensic examiners utilize inherent level-3 details along with level-2 features. Existing level-3 feature extraction algorithms are computationally expensive to be used for identification. This paper presents a novel algorithm for fast level-3 feature extraction and identification...
Traffic Validation Architecture (TVA) is a capability based network architecture that tries to limit Distributed Denial of Service Attacks (DDoS). It considers only the victimpsilas approval in the capability granting process. We propose an extension to the approach by involving two new parameters, the bottleneck linkpsilas status and message type, in the capability granting mechanism. Both these...
This paper describes an approach to implementing technology-assisted problem solving (TAPS) package using desktop virtual reality interface that brings together a 3-D model of an engineering mechanics problem in an interactive manner. It provides the user with a self-study environment in which to solve an engineering mechanics problem in mechanical engineering course. The package guides the user to...
The performance of score-level fusion algorithms is often affected by conflicting decisions generated by the constituent matchers/classifiers. This paper describes a fusion algorithm that incorporates the likelihood ratio test statistic in a support vector machine (SVM) framework in order to classify match scores originating from multiple matchers. The proposed approach also takes into account the...
Using idle compute resources is cost-effective and systems like Condor have successfully exploited such resources in limited contexts (e.g. bag of tasks problems). Increasingly, networks in large organizations are becoming more capable and, when combined with latency tolerance mechanisms, can now provide an attractive platform for running some cluster-based parallel programs. In environments where...
Warping is fundamental to multiple algorithms in computer vision and medical imaging such as image and volume registration. Warping is performed by determining a continuous deformation map and applying it to a given image or volume. In registration the deformation map is determined based on correspondence between two images. It is often the case that the deformation map can only be determined at discrete...
Rising demands of energy in emerging economies coupled with the green house gas emissions related problems around the globe have provided a unique opportunity of exploiting the advantages offered by solid state devices (photovoltaic devices, thermoelectric devices, light emitting devices etc.) for green energy conversion. Similar to cell phones, power generation by photovoltaics (PV) can reach over...
Large enterprise systems need continuous monitoring at infrastructure, application and business levels to detect and prevent problem situations. Traditionally, automated monitoring solutions are programmed once at setup based on a set of well-defined monitoring objectives and handed over to the operations team. Such solutions have underlying data models that are often complex and semantically rich...
We introduce a method for comparing protein structures using the notion of residue contexts based on protein Calpha-atom backbones. The residue context is derived from the set of vectors from a given Calpha-atom to each other Calpha-atom in the molecule. A three-dimensional histogram is generated from these vectors, containing a relative distribution of the other Calpha-atoms for each Calpha-atom...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.