The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Identifying emotional polarization in a medical report is important in screening, acquiring and synthesizing knowledge of physicians before making a clinical decision. We consider this as a classification problem whose input is a set of sentences collected from medical articles and output is the polarization of each sentence labeled as a positive, negative or neutral one. In this paper, we propose...
In the cancer research, a number of stratification methods have been successfully applied and have assisted in the treatment process. Currently, various data types related to the cancer patients have been measured and collected. This fact leads to a great need of data integration for obtaining more comprehensive cancer study. Most of the previous work is based on a single data type and employed a...
Biometrics such as ECG provides a convenient and powerful security tool to verify or identify an individual. However, one important drawback of biometrics is that it is irrevocable. In other words, biometrics cannot be re-used practically once it is compromised. Cancelable biometrics has been investigated to overcome this drawback.
Scientific workflows have become a popular computational model in a variety of application domains, such as astronomy, material science, physics, and biology. As scientific applications are moving to the cloud to take advantage of the elasticity and service level agreement of resources, there has been a number of recent research efforts on cloud-based workflow systems that support various types of...
In service supply chains, customers select a service provider with whom value would be maximized through the interaction between the service provider and the customer. This study investigates the link between value co-creation and customers' (re)purchasing intentions in the financial and professional services industry. This research was conducted via a case study of PricewaterhouseCoopers (PwC) and...
Demand side management is often seen as a promising tool for distribution network operators to mitigate network operation limit violations. Many demand side management applications have been proposed, each with their own objectives and methodology. Quite often, these demand side management applications do not have a direct interface with the network monitoring applications of the network operator,...
In this paper, we present a data acquisition and analysis framework for materials-to-devices processes, named 4CeeD, that focuses on the immense potential of capturing, accurately curating, correlating, and coordinating materials-to-devices digital data in a real-time and trusted manner before fully archiving and publishing them for wide access and sharing. In particular, 4CeeD consists of novel services:...
Conventionally, software-based motion controllers are used to execute many automation systems in the industry. Most of these controller reveal several drawbacks such as large accumulated error, does not guarantee real-time characteristics when generating motion profile based on software. In this paper, the implementation of embeded motion controller for many applications is presented. ARM Cortex M4...
In this paper, we propose a new local descriptor for action recognition in depth images. The proposed descriptor relies on surface normals in 4D space of depth, time, spatial coordinates and higher-order partial derivatives of depth values along spatial coordinates. In order to classify actions, we follow the traditional Bag-of-words (BoW) approach, and propose two encoding methods termed Multi-Scale...
This paper aims to study the problem of spoofing attack detection for facial recognition systems. Real faces and falsified faces present in front of a security system (phone's camera in our case) have differences of micro-textures on their surface, which are exploited to discriminate face spoofing images. Our method exploits the statistic behavior of the distribution of noise's local variances, which...
The evolution of distribution networks from passive to active distribution systems puts new requirements on the monitoring and control capabilities of these systems. The development of state estimation algorithms to gain insight in the actual system state of a distribution network has resulted in a wide range of distributed and decentralized algorithms that make use of parallel computing to deal with...
The aim of the paper is presenting an approach to developing a fuzzy rule based expert system shell combin-ing positive and negative knowledge for medical consultations called FuzzRESS. We extend Max-Min inference of CADIAG-2 like systems [3] by replacing Max of MaxMin rules by t-conorm and by including negative knowledge. Based on this approach, we propose a structure of FuzzRESS which consists of...
The expected development of grid monitoring applications and control functionalities in low voltage distribution networks calls for advanced simulation tools for performance assessment of these applications. Power hardware-in-the-loop simulations form a cost effective approach to accurately capture the (dynamic) system behaviour. This paper describes the development of a data acquisition and processing...
In this paper, we propose a new local descriptor for action recognition in depth images. Our proposed descriptor jointly encodes the shape and motion cues using surface normals in 4D space of depth, time, spatial coordinates and higher-order partial derivatives of depth values along spatial coordinates. In a traditional Bag-of-words (BoW) approach, local descriptors extracted from a depth sequence...
Assigning appropriate center pixel weights (CPW) in nonlocal means (NLM) filter is an important issue to affect the quality of filtered images. Using local James-Stein (LJS) type CPW yielded superior peak signal-to-noise ratio (PSNR) over using other existing methods of determining the contribution of center pixels in NLM. However, the original LJS CPW method assumed no upper bound for self-weights...
As more and more information systems are moving to the cloud, there have been efforts to deploy publish-subscribe (or pub/sub) systems in the cloud environment to take advantage of the elasticity of resources. As a result, there is a need to perform resource management for the cloud-based pub/sub systems that support various types of jobs, each consists of a series of tasks, or a workflow. Designing...
This paper introduces a decentralized implicit interaction framework for trading flexibility available from proactive end users (prosumers) in an economically-efficient way. The proposed framework consists of two mechanisms: ahead planning via markets and real-time dispatching. The ahead, market-based planning includes two mechanisms, day-ahead and intra-day, which are operated by a local flexibility...
Memory bandwidth is a critical issue tor a high performance and high resolution video codec. We propose a lossless compression solution to reduce memory bandwidth requirement for a multi-standard video codec. The solution is a combination of 2D-DPCM, Variable Length Coding and 4-way set-associative cache. Experimental results show that the proposed solution can reduce the memory bandwidth requirement...
Wireless sensor networks have found their way into a wide range of applications among which environmental monitoring systems have attracted increasing interests of researchers. The main challenges for the applications are scalability of the network size and energy efficiency of the spatially distributed motes. These devices are mostly battery-powered and spend most of their energy budget on the radio...
Smart environments such as smart grid, smart transportation, smart buildings are upon us because of major advances in sensor, communication, cloud and other cyber-physical system technologies. The collective name for interconnected sensors, placed on "things" within fixed cyber-physical infrastructures, is Internet of Things (IoT). IoT enables cities and rural areas to become smarter and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.