The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the Linear Discriminant Analysis (LDA) method has the ability to choose the discriminant low-dimension subspace from the high-dimension feature space, this method has been successfully applied in some research fields. This paper proposes an improved LDA (ILDA) method to overcome the multi-model problem of LDA. In our ILDA method, the between-class scatter matrix and within-class scatter matrix...
In order to investigate the approximate information contained in upper approximation, a mathematical structure called a tree-approximate space is defined, which is an extension of an approximate space in rough set theory. By integrating upper approximation with a tree in the tree-approximate space, approximate reasoning is introduced. It establishes connections between vertices, and can determine...
In this paper we discuss weakly compatible mappings in fuzzy metric spaces, and give some common fixed point theorems for weakly compatible mappings in fuzzy metric spaces. Our main results improve and extend the corresponding result.
A number of novel technology-rich learning spaces have been developed over the last few years in UK. Many claims have been made in terms of how they can support and enhance learning, collaboration, community participation, and creativity. This line of research is investigating whether such learning spaces are living up to such claims. The approach is ethnographic, a number of field studies have been...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Sensor nodes have highly constrained resource like limited battery power, memory, processing capabilities, etc. These limitations make infeasible to apply traditional key management techniques such as public key cryptography in the WSNs. For the existing key pre-distribution...
Competency based learning is seen as a means to make the educational system more adapt to cater for , the learnerspsila professional development and the need to increase their future employability. The ICOPER Best Practice Network is exploring the ways competencies can drive authoring use of educational content. The aim of the ICOPER project is to create a reference model for competency-driven learning...
The management of groups is an essential task in collaborative learning scenarios. In a blended learning situation, in which online activities and face-to-face activities are combined, this group management becomes more complex. Different technological solutions have been proposed for supporting the group management in the CSCL field. However, these approaches fail to consider factors inherent to...
This paper presents 'The Sensitive Tapestry', an interactive installation using body-input as a nontraditional user interface. The technical basis for this kind of media-enabled environment is a thermal imager that captures the activities in public areas at a large scale. The installation has been developed as a prototypical example in architectural education at the ETH Zurich, Science City. The aim...
Fault management for today's space missions is a complex problem, going well beyond the typical safing requirements of simpler missions. Recent missions have experienced technical issues late in the project lifecycle, associated with the development and test of fault management capabilities, resulting in both project schedule delays and cost overruns. Symptoms seem to become exaggerated in the context...
This IEEE Transactions on Geoscience and Remote Sensing (TGRS) special issue is dedicated to the advances in synthetic aperture radar (SAR) techniques and applications presented at the 5th International Symposium on Retrieval of Bio- and Geophysical Parameters from SAR Data for Land Applications (BioGeoSAR), which was organized by Consiglio Nazionale delle Ricerche, with active support from the European...
As scientific work becomes more complex, contextual information is critical to enable its use. We have developed the concept of Knowledge Spaces that manage such information and scope the space of data, metadata, and algorithms relevant to the work of a Virtual Organization. This enables scientists to produce and manage descriptive metadata, process description, data provenance, as well as VO-specific...
This paper introduces the Knowledge Pentagram System or the i-System for knowledge integration and creation and its relation to the new concept of the Creative Space. The five ontological elements of Pentagram System are Intelligence, Involvement, Imagination, Intervention, and Integration correspond to five diverse dimensions of the Creative Space. The paper discusses the meanings and functions of...
The data lifecycle means the process from datapsilas advent to its disappearance; the data management runs through the whole data lifecycle. Data management aims at providing the data which are complete, accurate and conducts time effect for userspsila data retrieval. At each stage of datapsilas life cycle, different demands exist upon data management, among which data store management is the most...
The purpose of TAFT fault tolerance studies conducted at CNES is to prepare the space community for the significant evolution linked to the usage of COTS components for developing spacecraft supercomputers. CNES has patented the DMT and DT2 fault-tolerant architectures with 'light' features. The development of a DMT/DT2 testbench based on a PowerPC7448 microprocessor from e2v is presented in this...
This paper reviews recent experimental confirmations that the intrinsic radiation robustness of commercial CMOS technologies naturally improves with the down-scaling. When additionally using innovative design techniques, it becomes now possible to assure that performance and radiation-hardness are both met. An illustration is given with an original nano-power and radiation-hardened 8 Mb SRAM designed...
To address the limits of capacity and the disadvantages of motional scanning capability of traditional two-dimensional barcodes, a novel 3-D continuous barcode (3-D CoBe) is proposed. It adds color as a third dimension based on our previous research on 2-D continuous barcodes (2-D CoBe). The novel 3-D CoBe is called 2-D continuous color barcode (CCB) as well. Furthermore, we implemented a codec system...
Mining closed frequent itemsets in the sliding window is one of important topics of data streams mining. In this paper, we propose a novel algorithm, FPCFI-DS, which mines closed frequent itemsets in the sliding window of data streams efficiently, and maintains the precise closed frequent itemsets in the current window at any time. The algorithm uses a single-pass lexicographical-order FP-Tree-based...
In this paper we present a system that attempts to facilitate knowledge sharing within and across communities. The system provides communication facilities and implements advanced features such as personalization and recommendations. Users of the system who experienced membership in multiple communities provide connections between the information spaces of those communities.
Soft errors induced by cosmic radiation have become an urgent issue for ultra-deep-sub-micron (UDSM) technologies. In this paper, we propose a new radiation hardened by design latch (RHBDL). RHBDL can improve robustness by masking the soft errors induced by SEU and SET. We evaluate the propagation delay, power dissipation and power delay product of RHBDL using SPICE simulations. Compared with existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.