The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Complex systems are prevalent in many fields such as finance, security and industry. A fundamental problem in system management is to perform diagnosis in case of system failure such that the causal anomalies, i.e., root causes, can be identified for system debugging and repair. Recently, invariant network has proven a powerful tool in characterizing complex system behaviors. In an invariant network,...
Linear Discriminant Analysis (LDA) is widely-used for supervised dimension reduction and linear classification. Classical LDA, however, suffers from the ill-posed estimation problem on data with high dimension and low sample size (HDLSS). To cope with this problem, in this paper, we propose an Adaptive Wishart Discriminant Analysis (AWDA) for classification, that makes predictions in an ensemble way...
Sparse Discriminant Analysis (SDA) has been widely used to improve the performance of classical Fisher's Linear Discriminant Analysis in supervised metric learning, feature selection and classification. With the increasing needs of distributed data collection, storage and processing, enabling the Sparse Discriminant Learning to embrace the Multi-Party distributed computing environments becomes an...
Local community detection (or local clustering) is of fundamental importance in large network analysis. Random walk based methods have been routinely used in this task. Most existing random walk methods are based on the single-walker model. However, without any guidance, a single-walker may not be adequate to effectively capture the local cluster. In this paper, we study a multi-walker chain (MWC)...
Stretchable label-like random laser can be easily transferred on any unconventional substrates, and function stably under 100% strain with many cycles. We believe our device can serve as advanced photonics modules.
The reciprocity of the wireless and the randomness of channel characteristic is the basis of physical layer key generation technology based on the channel. The complete key generation technologies include five steps that channel probing, channel feature extraction, quantification, reconciliation and privacy application. There are many theories and simulation prove the feasibility of key extraction...
This paper presents the FPGA implementation of neuron block units based on a sigmoid activation function for artificial neural networks (ANNs) applications. The Coordinate Rotation Digital Computer (CORDIC) algorithm has been employed for the approximation of sigmoid activation function. The proposed design was simulated using ModelSim XE II and synthesized using Altera's Quartus II with a Cyclone...
In this paper we propose a scheme that unconditional secure transmission is used to implement information reconciliation in key generation. Unconditional secure transmission achieved by associating MIMO beamforming with security code can be safe and reliable. Theoretically, the reconciliation and privacy amplification phase can take advantage of the unconditional communication security to reconciling...
This paper proposes an architecture where each agent maintains a cooperative tendency table (CTT). In the process of learning, agents need not communicate with each other but observe partners' actions while taking actions. If one of the agents meets a bad situation, such as bumping onto obstacles after taking an action. In such a case, agents will receive a bad reward from the environment. Similarly,...
Intelligent transportation systems (ITS) are becoming more and more effective, benefiting from big data. Despite this, missing data is a problem that prevents many prediction algorithms in ITS from working effectively. Much work has been done to impute those missing data. Among different imputation methods, k-nearest neighbours (kNN) has shown excellent accuracy and efficiency. However, the general...
The nonlinear response of silver nanoparticles filled epoxy resin composites under increasing applied voltage is investigated. The influence factors of applied high voltage on the conductivity of composites are measured by the collection of the electric current passing through the sample. With the increase of applied voltage, the composite has a nonlinear conductive characteristic. The contributing...
In this paper, the main objective is to design a gain controller for a robot arm based on reinforcement learning methods. The controller is applied in image base visual servoing. The image feature error is used to form the state space. When the robot perceives a state by using a camera, the controller based on Q-Learning will output a control gain to the robot arm. Because Q-Learning does not have...
This project investigates a discrete wavelet transform (DWT) module design as part of a CCSDS compliant image data compression system. The system is developed for the applications of satellite based optical remote sensing and can admit a push broom type image scanning with variable widths. The DWT design performs 3 levels of decomposition using 9/7 filters and supports both float and integer type...
Since home appliances have computational capabilities and network connectivity, most of these devices support wireless remote control. Unfortunately, these devices usually require separate remote controls with incompatible communication protocols, which raises the issues of management, maintenance, and pollution due to greater waste when such remotes are disposed of. This paper proposes an open NFC...
Kernel Samepage Merging (KSM) is a Linux kernel module for improving memory utilization by searching and merging the redundant memory pages. When working with the hypervisors, such as Kernel-based Virtual Machine, KSM helps share identical memory pages of the hosted virtual servers so as to increase the server density. Nevertheless, while KSM improves the efficiency of the host system, it hurts the...
Terahertz imaging sensing provides numerous attractive applications in different areas, for example, biology and medicine. CMOS technology benefits an imaging system in low cost and a small form factor. The technology advance is technically viable for circuit design in such high frequencies. Lossy silicon substrate, however, still degrades system performance. We will discuss the techniques of performance...
To facilitate apps to collaborate in finish complex jobs, Android allows isolated apps to communicate through explicit interfaces. However, the communication mechanisms often give additional privilege to apps, which can be exploited by attackers. The Android Task Structure is a widely-used mechanism to facilitate apps' collaboration. Recent research has identified attacks to the mechanism, allowing...
In Location Based Services (LBSs), service providers can obtain mobile users' locations or traces while receiving their service requests. K-anonymity, which is the most commonly used location privacy protection method, needs the cooperation among mobile users to form a k-anonymous group. Though several incentive mechanisms have been proposed to motivate mobile users to participate in the k-anonymous...
The objective of protecting privacy while transparently accessing general database is important. We propose PaJDBC, which achieves the objective by utilizing JDBC standard to provide transparency for applications and employing User Defined Function (UDF) in database management system to check the privacy policy conformity of database access. Views are used to invoke UDF when privacy-sensitive data...
Robust and accurate traffic prediction is critical in modern intelligent transportation systems (ITS). One widely used method for short-term traffic prediction is k-nearest neighbours (kNN). However, choosing the right parameter values for kNN is problematic. Although many studies have investigated this problem, they did not consider all parameters of kNN at the same time. This paper aims to improve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.