The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The energy consumption of software is an increasing concern as the use of mobile applications, embedded systems, and data center-based services expands. While research in green software engineering is correspondingly increasing, little is known about the current practices and perspectives of software engineers in the field. This paper describes the first empirical study of how practitioners think...
As an important mode of urban transportation, taxi is of considerable significance for the commuters. The taxi service stations are important for the efficient operations of taxis. Current approaches for the location optimization of taxi service stations are not well aligned with the actual demand. The present study uses the taxi GPS data to identify and extract actual service needs. Then based on...
In order to simulate the whole process of ballistic missile flight, and make the observation of the ballistic target flight better, a multi-target flight scene simulation system is designed using MATLAB and STK in this paper. The related concepts of STK software and the method of multi-target trajectory simulation are introduced. At the same time, the micro-motion characteristics of the ballistic...
WiFi communication is widely used in home automation. In order to identify home automation device suites from the complex network environment, we employ Bi-flow model based on WiFi traffic model and combine the analysis of clustering algorithm with application-oriented algorithm of traffic identification to do the research in this paper. And then we develop a combined identification method of port...
Two-dimensional principal component analysis (2DPCA) serves as an efficient approach for both dimensionality reduction and high-quality reconstruction. However, conventional 2DPCA method is sensitive to the outliers such that associated results could be compromised. To strengthen the robustness of conventional 2DPCA method, we try to propose a novel robust two-dimensional principal component analysis...
In this paper, a novel embedded clustering (EC) method is derived from the perspective of extending the supervised orthogonal least square discriminant analysis (OLSDA) method to the unsupervised case, which proves to be closely related to k-means. To achieve more statistical and structural properties, the robust learning of unsupervised OLSDA is investigated to further derive the unsupervised robust...
As for the semi-supervised learning, both label and side information serve as pretty significant indicators for the classification. However, majority of the associated works only focus on one side of the road. In other words, either the label information or the side information is utilized instead of taking both of them into consideration simultaneously. To address the referred defect, we propose...
This paper presents an algorithm based on the Robust Extended Kalman filter (REKF) for non-line-of-sight (NLOS) mitigation and sensor data fusion. The aim is to locate an off-the-shelf smartphone using only its speaker and its inertial measurement unit (IMU). The target emits inaudible sound signals which are detected by static receivers on the ceiling. Then, its position can be estimated using time...
In this paper we developed a novel indoor localization system based on Ultra-wideband (UWB) landmarks and inertial sensor as a guidance system for emergency responders. The wake-up technology is also equipped in the system to extend the lifetime of landmarks. While in sleep mode our landmarks have an overall power consumption of 66µW making them ready-to-use in case of an emergency for up to 5 years...
Distributed machine learning algorithms play a significant role in processing massive data sets over large networks. However, the increasing reliance on machine learning on information and communication technologies makes it inherently vulnerable to cyber threats. This work aims to develop secure distributed algorithms to protect the learning from adversaries. We establish a game-theoretic framework...
Collaborative filtering has become one of the most widely used methods for providing recommendations in various online environments. Its recommendation accuracy highly relies on the selection of appropriate neighbors for the target user/item based on a user-item matrix. However, existing neighbor selection schemes have inevitable inadequacies, especially when handling a very sparse user-item matrix...
A strain of Lactobacillus S21.1 was screened to produce conjugated linoleic acid from traditional northeastern fermented sauerkraut juice. Fermentation was performed by adding linoleic acid (0.4 mg/mL) into the culture medium, and the culture medium was fermented for 24 h at 37°C. Then, UV spectrophotometry was used to measure the linoleic acid content, which was measured as 10.082 µg/mL. Strain morphological...
Contextual aware matrix factorization has been widely used in recommender systems by learning latent feature vectors of users and items along with contextual information. While most of them add identical bias for each type of side information to represent systematic tendencies in users' rating behaviors, they are not able to capture the preference unique to users or items. In this paper, we propose...
This paper studies a novel mobile relaying technique, where relays of high mobility are employed to assist the communications from source to destination. By exploiting the predictable channel variations introduced by relay mobility, we study the throughput maximization problem in a mobile relaying system via dynamic rate and power allocations at the source and relay. An optimization problem is formulated...
The misuse of wireless communications by malicious users imposes new threats on the public security, and authorized parities need to intervene in the malicious communication links over the air. This paper investigates this emerging wireless communication intervention problem at the physical layer. Unlike prior studies using jamming to disrupt or disable the targeted wireless communications, we propose...
This paper studies a full-duplex filter-and-forward (FD-FF) relay system in frequency-selective channels. Conventionally, the loop-back signal at the FD relay is treated as harmful self- interference and needs to be significantly suppressed via both analog- and digital-domain cancellation. However, the performance of the conventional self-interference cancellation approach is fundamentally limited...
Cloud radio access network (CRAN) is a promising candidate for the next-generation wireless communication systems. In CRAN, remote radio heads (RRHs) are deployed to serve users in a target area, which are connected to a central processor (CP) via limited-capacity links termed the fronthaul. In practice, the large amount of information transferred between each RRH and the CP for centralized processing...
In this paper, we study wireless power transfer in a multiuser multiple-input single-output (MISO) system, where a base station equipped with N antennas wirelessly transfers power to distributed single-antenna users. To reduce the implementation cost, we propose a constant-envelope analog beamforming scheme to simultaneously transfer power to multiple users which requires only a single radio frequency...
If the volume is too loud for a PA system, it will suffer howling problems which is caused by positive feedback sound. In current traditional howling sound suppressing projects, largely damage of the sound quality and operational difficulties of these issues have yet to be improved. Wavelet packet algorithm is used to suppress howling in this paper, it can evenly divide the audio signal band according...
A control system which can analog the external input and output characteristics of the diesel engine is aimed to be designed in this paper. Proposed a scheme that using the method named "Adaptive neural network based on model reference" to control asynchronous motor in order to simulate the external characteristics of the diesel engine. The simulation model of diesel engines, asynchronous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.