The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices like smartphones and tablets hold private and critical data of users. Mobile apps often require access to data on mobile devices, thus data privacy becomes an issue. Most time, mobile systems grant apps with excessive permission to data such as images and location. It allows apps to collect data more than they need without notifying the user again. This study focuses on a new approach...
Real-time prediction of the air contaminant dispersion is an important issue in hazard assessment and emergency management of air pollution. The conventional atmospheric simulation can seldom give the precise prediction results due to inaccurate input parameters. To improve the accuracy of the prediction of atmospheric model, a real-time data driven atmospheric dispersion simulation based on data...
Cloud computing is attracting an increased number of researches in delivering modeling and simulation abilities as a service. Among which, simulation execution as a service (EaaS) is a hot spot. It aims at releasing users from complex running configurations and meanwhile guaranteeing the QoS requirements. Under the motivation, focusing on EaaS for parallel and distributed simulation (PADS) application,...
With the rapid development of inspection techniques, more emphases should be placed on the improvement of the reliability, safety and intelligence of the robot system. In this paper, a framework for the patrol robot that automatically finishes complex task and motion planning in the indoor substation is proposed. To realize real-time response to the environmental changes, the proposed framework keeps...
The identification of online robot is important for managing the internet order, such as forbidding spam, fictitious information, and inductive words published by online robot to mislead the public. We studied the behaviors of the WeChat users to identify online robot, including turning pages, scanning the web, and forwarding posts. In fact, the amount and time interval of information forwarding were...
The robust transceiver design in dual-hop up-link multi-user multiple-input multiple-output (MIMO) system with amplify-and-forward relay is presented in this paper. Different from the most existing works, a complex channel model is adopted, the antenna correlation at both ends of the channel and the channel estimation errors are taken into account. The proposed design method provides a joint iterative...
A surface electromyography (sEMG) signal typically results from the electrical activities of many muscle fibers, and can be utilized as a signal source in prostheses due to its abundance of movement information. This paper proposes an sEMG—detection circuit for the acquisition of the controlling signal in EMG-Bridge (EMGB) systems. The detection circuit mainly comprises a preamplifier, a driven right...
The voluntary participation of the paralyzed patients is crucial for the functional electrical stimulation (FES) therapy. In this study, we developed a strategy called “EMG Bridge” (EMGB) for volitional control of multiple movements using FES technique. The surface electromyography (sEMG) signals of the agonist muscles were transformed to stimulation pulses with various pulse width and frequency to...
WeChat is the largest acquaintance social networking platform in China, which has about 938 million monthly active user accounts. WeChat Moments, known as Friends Circle, serves social networking functions in which users can view information shared by friends. This paper addresses the problem of analyzing the patterns of cascading behavior in WeChat Moments. We obtain 229021 information cascades from...
This paper presents a method for the identification of critical locations of power systems using the measurable variables of the active distribution grids. The critical locations are identified using sensitive sparse principal component analysis (SSPCA) where the loadings of some variable in principal components are restricted to zero. SSPCA is tested on the UK 77-bus system. Furthermore, SSPCA and...
It is a key issue to ensure the safe operation of urban railway vehicle by avoiding the phenomenon of wheel slipping or locking under braking conditions, which can be implemented by looking for and keeping an optimal slip ratio. In this paper, the problem of anti-slip control for urban railway vehicle based on optimal slip ratio is studied. Forgetting factor recursive least-squares (FFRLS) algorithm...
Kernel partial least squares(KPLS) is widely adopted for soft-sensing in nonlinear industrial process. For KPLS method, the determination of central nodes and kernel width in the kernel function will affects generalization ability and predictiability. This paper proposes an entropy-clustering and K-means based KPLS regression method. First of all, it divides the original data into several clusters...
In an [n, k, d] linear code, a code symbol is said to have locality r if it can be repaired by accessing at most r other code symbols. For an (n, k, r) locally repairable code (LRC), the minimum distance satisfies the well-known Singleton-like bound d ≤ n − k − [k/r] + 2. In this paper, we study optimal ternary LRCs meeting this Singleton-like bound by employing a parity-check matrix approach. It...
In distributed storage systems, locally repairable codes (LRCs) are introduced to realize low disk I/O and repair cost. In order to tolerate multiple node failures, the LRCs with (r, δ)-localitty are further proposed. Since hot data is not uncommon in a distributed storage system, both Zeh et al. and Kadhe et al. focus on the LRCs with multiple localities or unequal localities (ML-LRCs) recently,...
Online social networks can detailedly and accurately record the activities of human beings and the trajectories of information dissemination over time, which provides us an opportunity to understand the information diffusion process from a renewed, more realistic, data driven modeling dimensionality. In consideration of two fundamental behaviors (viewing and sharing) involved in information diffusion,...
Recently linear codes with locality properties have attracted a lot of interest due to their desirable applications in distributed storage systems. An [n, k, d] linear code with (r, δ)-locality can enable the local recovery of a failed node in case of more than one node failures. In this paper, we study the theoretical bounds and constructions of linear codes with (r, δ)-locality for all code symbols...
This paper presents a new method for vessel enhancement in retinal fundus images. In the proposed method, two dictionaries are utilized to gain the vessel structures, including Representation Dictionary (RD) which is generated from the original vessel images and Enhancement Dictionary (ED) generated from the corresponding label images. Then sparse coding technology is utilized to represent the target...
To overcome the hidden terminal problem a secondary user (SU) may encounter, cooperative spectrum sensing (CSS) is proposed and gained much attention in the last decades. However, due to the selfish nature, SUs may not cooperate unconditionally as most previous works have assumed. Therefore, how to stimulate SUs to play cooperatively is an important issue. In this paper, we propose a reputation-based...
Recently, partitional clustering approaches based on Evolutionary Algorithms (EAs) have shown promising in solving the data clustering problems. However, with the nearest prototype (NP) rule as the method for decoding, most of them are only suitable for clustering datasets with convex (e.g. hyperspherical) clusters. In this paper, we propose an automatic clustering approach using particle swarm optimization...
A modified hybrid multilevel converter which is a combination of T-type converter and H-bridge is present in this paper. Beside increase output levels, another merit of this topology is larger output range compared with traditional two-level converter. Depending on the value of H-bridge floating capacitor voltage, the converter can produce 5-level, 7-level, or 9-level output voltage. The H-bridge...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.