Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
It is a grand challenge to reveal the causal effects of DNA variants in complex phenotypes. Although statistical techniques can establish correlations between genotypes and phenotypes in Genome-Wide Association Studies (GWAS), they often fail when the variant is rare. The emerging Network-based Association Studies aim to address this shortcoming in statistical analysis, but are mainly applied to coding...
Adverse drug reactions (ADRs) represent one of the main health and economic problems in the world. With increasing data on ADRs, there is an increased need for software tools capable of organizing and storing the information on drug-ADR associations in a form that is easy to use and understand. Here we present a step by step computational procedure capable of extracting drug-ADR frequency data from...
In this paper, we investigate the resource allocation for the video streaming service in the cognitive radio network (CRN) based on orthogonal frequency division multiple access (OFDMA). Considering the channel estimation error between secondary transmitters (STx) and primary receivers (PRx), we address the probabilistic interference constraint model. With imperfect CSI between STx and secondary receivers...
Distributed detection without fusion center (FC) allows each sensor node to exchange measurements with its neighbors and to reach agreement on the existence of the target using the consensus algorithm. Comparing with the centralized system, the decentralized system has better performance, in terms of robustness, scalability and invulnerability. Due to the decentralized and open properties, the security...
Traditional CMOS technology and its continuous down-scaling have been the driving force to improve performance of existing computer architectures. Today, however, both technology and computer architectures are facing challenges that make them incapable of delivering the growing computing performance requirement at pre-defined constraints. This forces the exploration of both novel architectures and...
In this paper, we propose 3DLoc, which performs 3-dimensional localization on the tagged objects by using the RFID tag arrays. 3DLoc deploys three arrays of RFID tags on three mutually orthogonal surfaces of each object. When performing 3D localization, 3DLoc continuously moves the RFID antenna and scans the tagged objects in a 2-dimensional space right in front of the tagged objects. It then estimates...
Monitoring of dynamic industrial process has been increasingly important due to more and more strict safety and reliability requirements. Popular methods like time lagged arrangement-based and subspace-based approaches exhibit good performance in fault detection, however, they suffer from difficulty in accurately isolating faulty variables and diagnosing fault types. To alleviate this difficulty,...
In order to settle the problem of obstacle recognition for Unmanned Surface Vessel (USV), a novel method is presented to distinguish between vessels and coastlines based on point cloud data (PCD) from ship borne laser radar. Primarily, echo data of inland river targets and noise is analyzed and filtered. Furthermore, targets are extracted from PCD based on distance. Subsequently, three robust target...
The Euclid distance based K-means clustering is among the hard classification algorithms. When dealing with deterministic remote sensing data, it is difficult to gain satisfactory classification results using K-means algorithm. The traditional K-means clustering algorithm is faced with several shortcomings such as locally converged optimization, being sensitive to initial clustering centers, etc....
Memristor technology is a promising alternative to CMOS due to its high integration density, near-zero standby power, and ability to implement novel resistive computing. One of the major limitations of these architectures is the limited endurance of memristor devices, especially when a logic gate requires multiple steps/switching to execute the logic operations. To alleviate the endurance requirement...
The optimal detector based on matched-field processing with a large-aperture vertical linear array (VLA) suffers from the so called “snapshot deficient problem”, which leads to an inaccurate estimate of the noise covariance matrix and hence a degraded detection performance. In this paper, to improve the detection performance with deficient snapshots, a two-step sub-array detector (SAD) is proposed...
Because of specific characteristics of underwater acoustic channel and real acoustic modems, it is challenging to design an appropriate medium access control (MAC) protocol for the underwater acoustic sensor network (UWASN). In this paper, we propose a pre-scheduling-based MAC protocol for the UWASN. In our proposed MAC protocol, the nodes with data packets to be transmitted reserve the channel in...
Due to the specific characteristics in terms of long propagation delay, high bit-error-rate and limited available bandwidth in the underwater environment, designing the medium access control (MAC) protocol in underwater acoustic sensor networks (UWASNs) is a challenging issue. Considering a UWASN for data collection, data generated at sensor nodes are transmitted to the sink node hop by hop. Since...
Vertical directionality is an important property of wind-generated noise. In this paper, we extend the vertical directionality model of wind-generated noise in [12] from shallow water to deep ocean. In order to treat the overhead and distant noise simultaneously, we propose to use Pekeris-branch-cut-based normal modes to represent the Green's functions from noise sources to receivers. Comparing with...
While the mobile users enjoy the anytime anywhere Internet access by connecting their mobile devices through Wi-Fi services, the increasing deployment of access points (APs) have raised a number of privacy concerns. This paper explores the potential of smartphone privacy leakage caused by surrounding APs. In particular, we study to what extent the users' personal information such as social relationships...
Nowadays, 3D reconstruction has been introduced in monitoring the package placement in logistic industry-related applications. Existing 3D econstruction methods are mainly based on computer vision or sensor-based approaches, which are limited by the line-of-sight or battery life constraint. In this paper, we propose RF-3DScan to perform 3D reconstruction on tagged packages via passive RFID, by attaching...
This paper focus on radio spectrum utilization evaluation data analysis and processing work, firstly gives the evaluation object and content description, and then for variety architecture features' mass storage, real-time streaming and high-speed operation, designs a big data processing analysis framework, finally provides main link and details ideas of cleaning, conversion and storage, analysis,...
Activity sensing has become a key technology for many ubiquitous applications, such as exercise monitoring and elder care. Most traditional approaches track the human motions and perform activity recognition based on the waveform matching schemes in the raw data representation level. In regard to the complex activities with relatively large moving range, they usually fail to accurately recognize these...
Potential well type selection is critical for the convergence of the QPSO (Quantum-behaved Particle Swarm Optimization) algorithm. This paper analyzed the motion pattern of particles in square potential well, given the position equation of the particles by solving the Schrödinger equation and proposed the Ternary Correlation QPSO Algorithm Based on Square Potential Well (TC-QSPSO). In this...
In semiconductor manufacturing, as some of the variables in processes cannot be easily measured during or after the production, virtual metrology (VM) is employed to predict metrology outputs using ancillary process variables. However, because of changeable processes and high-dimensional inputs, VM can be expensive or difficult to implement. In this work, just-in-time (JIT) modeling is used to cope...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.