The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Process mining techniques have been used to discover and analyze workflows in various fields, ranging from business management to healthcare. Much of this research, however, has overlooked the potential of hidden Markov models (HMMs) for workflow discovery. We present a novel alignment-guided state-splitting HMM inference algorithm (AGSS) for discovering workflow models based on observed traces of...
Two different types of tunable dual-band bandpass filters (BPFs) based on a pair of open-/short-circuited stub-loaded quarter-wavelength resonators, which share a common short-circuited via hole as a K-inverter, have been presented. Additionally, a source/load cross coupled-line configuration is introduced to improve the frequency selectivity of the proposed filters. These two dual-band BPFs have...
With the dense deployment of low power node such as Internet of Things (IoT), indoor localization is growing rapidly, has gained a lot of interests in commercial applications. This paper proposes an Iterative Weighted KNN (IW-KNN) indoor localization method based on RSSI (Receive Signal Strength indicator) of the BLE (Bluetooth Low Energy), which has a low power consumption, a long life expectancy...
The low-frequency oscillation (LFO) has been observed a positive or negative pike around 0.1 Hz, which is related to the specified brain function activities. Functional near-infrared spectroscopy (fNIRS) was used to simultaneously and noninvasively detect LFOs of multiple cerebral hemodynamics parameters. Based on local Fourier transform (LFT), we extract the amplitude of deoxy-Hb concentration signal...
Understanding the spatial traffic patterns of wireless cellular system could facilitate the performance analysis and system design. In this paper, a novel method based on base stations social network (BSSN) is proposed for the prediction of spatial traffic in wireless cellular system. Firstly a BSSN, which can describe the spatial traffic relationship between base stations (BSs), is established with...
Wireless trace data play an important role in wireless network researches. However, publishing the raw WLAN traces poses potential privacy risks of network users. Therefore, it is necessary to sanitize users' sensitive information before these traces are published, and provide high data utility for wireless network researches as well. Although some existing works based on various anonymization methods...
Risk evaluation of distribution system with microgrids is studied in this paper. Traditional state sampling method combined with state transition is used to select the component states. The process of analyzing the consequences of system with microgrids are described in detail. New risk indexes are defined to evaluate the risk of power-loss and interruption cost.
This manuscript considers the design of an optimal FP (i.e., fixed-point) smoother for descriptor systems corrupted by delayed measurement and multiplicative noise. The observation equations and delayed measurement are both corrupted by multiplicative and additive noises. The optimal FP smoother is presented in terms of recursive mathematical equations based on standard singular value decomposition...
The correlation analysis of telemetry data plays a significant role in satellite performance analysis. However, the existing methods cannot be well applied, because the telemetry data is large and high-dimensional. In this paper, an efficient algorithm named QARC Apriori is proposed. First, to reduce the redundant attributes and lower the problem complexity, grey relational analysis method is applied...
Multidimensional data provides enormous opportunities in a variety of applications. Recent research has indicated the failure of existing sanitization techniques (e.g., k-anonymity) to provide rigorous privacy guarantees. Privacy-preserving multidimensional data publishing currently lacks a solid theoretical foundation. It is urgent to develop new techniques with provable privacy guarantees. ∈-Differential...
Wireless underground sensor networks (WUSNs) have recently been investigated for a wide range of applications. One challenge in wireless underground communications is its high bit error rate, especially at long distances. In WUSNs, the communication quality is substantially affected by the environment, especially the soil moisture. Thus, the underground channel quality can be effectively estimated...
Data sharing in the cloud, fueled by favorable cloud technology trends, has emerging as a promising pattern in regard to enabling data more accessible to users in a convenient manner. To achieve data sharing, enterprises and customers in increasing numbers keep their data stored into cloud server. In this paper, we focus on seeking a solution that allows secure and effective access to the cloud data...
Wireless underground communications is mainly characterized by the effects of soil moisture on antenna return loss and bandwidth as well as path loss. In this paper, the impacts of soil moisture, especially on underground channel capacity, are analyzed for underground wireless communications. It is shown that for a given antenna and soil moisture level, there exits an optimal operation frequency that...
Cloud storage services enable users to remotely store their data and eliminate excessive local installation of software and hardware. One critical issue is how to enable a secure data collaboration service including data access and update in cloud computing. A data collaboration service is to support the availability and consistency of the shared data among multi-users. In this paper, we propose a...
Wireless underground sensor networks (WUSNs) consist of sensors that are buried in and communicate through soil. The channel quality of WUSNs is strongly impacted by environmental parameters such soil moisture. Thus, the communication range of the nodes and the network connectivity vary over time. To address the challenges in underground communication, above ground nodes are deployed to maintain connectivity...
In this paper, we focus on data privacy of searchable symmetric encryption (SSE) in cloud computing. For the first time, we formulate the privacy issue from the aspect of similarity relevance and scheme robustness and then prove server-side ranking based on order-preserving encryption (OPE) inevitably leaks data privacy. In order to solve this problem, we propose a two round searchable encryption...
Basd on the panel data of China's 36 industrial sectors in 2000-2009, this paper analyzes the energy relationship of different sectors by grey relational theory. Results show that China's industry is strongly dependent on fossil fuels, and China needs optimize its industrial energy consumption structure. To do that, this paper finds out the industrial sub-sectors which should reduce fossil energy...
Quality of hardware implementation is an important factor in selecting the NIST SHA-3 competition finalists. As a third-round candidate algorithm of SHA-3, BLAKE algorithm achieved excellent performance in software implementation. In order to adapt to the resource-limited and high-speed system, this paper carried out a [4G] hardware architecture based on BLAKE-32 algorithm. To complete the calculation,...
A high bandwidth, lo w power consumption, low noise front-end amplifier is designed based on standard 0. 18um SiGe BiCMOS process. This front-end amplifier consists of a high performance differential RGC TIA, a 3 stage post amplifier and a buffer. The single stage of post amplifier is Cherry-Hooper amplifier. The entire circuit is simulated by a commercial software Cadence. The bandwidth and the differential...
Wireless Underground Sensor Networks (WUSNs) can be widely adopted to monitor the environment in agricultural, security and ecological applications. In most applications, besides underground sensor motes, aboveground motes are deployed to gather information. However, due to the different communication ranges of the channels, hidden terminal problem occurs when multiple underground motes send data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.