The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Refinery hydrogen consumers (i.e. hydrocracker, hydro-treater) are operated in high pressure. The makeup hydrogen and recycle hydrogen compressors are placed to increase the pressure of hydrogen streams. It leads to a large contribution on compression work and operating cost. Therefore, except for the minimizing the flowrate of hydrogen utility, it is extremely important to reduce the compression...
Independent vector analysis (IVA) has exhibited promising applications to complex-valued fMRI data, however model order effects on complex-valued IVA have not yet been studied. As such, we investigate model order effects on IVA using 16 task-based complex-valued fMRI data sets. A noncircular fixed-point complex-valued IVA (non-FIVA) algorithm was utilized. The model orders were varied from 10 to 160...
In this paper, we designed and implemented a fuzzy logic control-based digital controller for a four-wheel automobile model. The automobile model is directed by the two front wheels, and is driven by the two rear wheels. The automobile model is designed to complete its racing smoothly and quickly on the specified racing road. The road is in several kinds of shapes such as straight lines, arcs, s-curves,...
In this paper, we present a fast approach for fall recognition. This approach according to human-body skeleton information which was obtained from Kinect sensor. First, following the falls defined by FICSIT, head and center joints, and their relative distance are considered as feature to describe the behavior. Second, applying the slide-window method and threshold for behavior action stage, motion...
As people are spending more time to shop and view reviews on line, some reviewer write fake reviews to earn credit and to promote (demote) the sales of product and stores. Detecting fake reviews and spammers becomes more important when the spamming behavior is becoming damaging. This paper proposes three types of new features which include review density, semantic and emotion and gives the model and...
In this paper, we design a social-relations-based routing algorithm (SRBRA). Firstly, by analyzing the real-time data from mobile nodes in the network, we summarize and extract factors that affect social relations between these mobile nodes. Then make inference and evaluation for the complexity and dynamic of these factors from multiple angles, calculate the social-relations values between each sensor...
In recent years, the data mining technology has been developed rapidly. New efficient algorithms are emerging. Association data mining plays an important role in data mining, and the frequent item sets are the highest and the most costly. This paper is based on the association rules data mining technology. The advantages and disadvantages of Apriori algorithm and FP-growth algorithm are deeply analyzed...
In digital communication systems, due to multipath transmission and the bandwidth of cable, there are some ISI(inter-symbol-interference) in the signals. Blind equalization that does not require a pilot sequence can transmit adaptive equalizer tap coefficients and can effectively remove inter-symbol interference. This paper introduces the principle of blind equalization technique that focus on the...
The ZigBee wireless sensor network is an important supporting technology of IoT (Internet of Things). For the reason that various applications of IoT may incur heavy traffic on the network of ZigBee, and the existing methods of constructing ZigBee topology routing tree fail to consider both the link configuration and the busy-degree of the node, so the existing routing algorithm should be optimized...
This paper presents a novel signal analysis method by combining ICA and EEMD algorithms, which can be used for decomposition and feature extraction of non-stationary random signals. The features of ICA and EEMD algorithm were analyzed. Simulations verified the feasibility of combining the two algorithms. The ICA and EEMD combined algorithm has good validity and practicality in the impact acceleration...
A flexible and efficient ECC processor is presented in this paper. We design an application-specific instruction set for the processor. The proposed parallel architecture ECC processor provides the lowest level finite-field operations and supports arbitrary elliptic curves and various ECC algorithms over general prime filed. Based on 130 nm standard-cell technology, the processor requires 184μs for...
In the experiments of the transmission fault diagnosis, acquiring vibration signals from three measurement locations by multi-sensors. Using improved fastICA algorithm to de-nosing and order analysis algorithm to get the order spectrum, the paper proposed two evaluation indexes. According to the experiment result by using evaluation indexes, the fault characteristics contained in the vibration signals...
Penetration acceleration signal is a typical non-stationary signal, which cannot be effectively and accurately analyzed by traditional time-frequency analysis methods. EEMD algorithm improved based on the core algorithm EMD of Hilbert-Huang transform, effectively solved the mode aliasing problem of EMD algorithm and adaptive analyze the non-stationary random signals. However, EEMD algorithm also has...
To reduce the number of candidate itemsets and the times of scanning database, and to fast generate candidate itemsets and compute support, this paper proposes an algorithm of association rules mining based on attribute vector, which is suitable for mining any frequent itemsets. The algorithm generates candidate itemsets by computing nonvoid proper subset of attributes items, it uses ascending value...
Although the virtualization technology brings many benefits to cloud computing environments, as the virtual machines provide more features, the middleware layer has become bloated, introducing a high overhead. Our ultimate goal is to provide hardware-assisted solutions to improve the middleware performance in cloud computing environments. As a starting point, in this paper, we design, implement, and...
Service Oriented Architecture enable a multitude of service providers to provide loosely, coupled and interoperable services at different Quality of Service (QoS), As more and more Web services become available, QoS is becoming a decisive factor to distinguishing composite Web services. Composite Web service selection with global QoS constraints is clearly a NP-Hard problem, in this paper, a new optimization...
This paper deals with a hybrid optimization method for solving the optimization problems with inequality constraints and equality constraints, in which an adaptive penalty strategy is firstly adopted to convert the optimization problem with both equality constraints and inequality constraints to one only with lower and upper bound constraint of decision variables, then an adaptive real-coded genetic...
Network-on-chip (NoC) has been proposed as a solution for the global communication challenges of system-on-chip (SoC) design in the nanoscale technologies. In this paper, a methodology is presented to develop an efficient routing algorithm for network-on-chip platforms that are specialized for an application or a set of concurrent applications. The proposed routing methodology, based on the hybrid...
The fundamental challenge of garbage collector (GC) design is to maximize the recycled space with minimal time overhead. For efficient memory management, in many GC designs the heap is divided into large object space (LOS) and non-large object space (non-LOS). When one of the spaces is full, garbage collection is triggered even though the other space may still have a lot of free room, thus leading...
To increase the capacity of mobile communications, it is important to accurately estimate the power and the directions of arrival (DOA) of sources. An efficient algorithm is proposed for this purpose with Davidon Fletcher Powell (DFP) and Broyden Fletcher Goldfarb Shanno (BFGS) algorithm. To estimate DOA and power of sources, the method optimizes the DOA and power parameters of a cost function simultaneously...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.