The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes the use of parameterised FPGA configurations for a new test set generation approach. The time-consuming problem of test set generation aims at finding the right input values to fully test an ASIC design. Since well-known methods for test set generation such as fault simulation techniques have become impractical to use due to their speed limitations, FPGAs have been used in order...
This work presents a Java platform capable to emulate sound propagation in a controlled 2D environment (obstacles and sound sources selected by the user) based on a cellular automata model. The platform is expandable and so far includes a feature preprocessor for the echo waves and a neural classifier. The proposed virtual environment allows performing various virtual experiments with relevance in...
The prevalent use of Online Social Networks (OSN) and the anonymity and lack of accountability they inherent from being online give rise to many problems related to finding the connection between the massive amount of text data on OSN and the people who actually wrote them. Analyzing text data for such purposes is called authorship analysis. This work is focused on one specific type of authorship...
In recent years, progress in the field of artificial neural networks provides a very important tool for complex problems in pattern recognition, data mining and medical diagnosis. The training algorithms of neural networks play an important role for adjustment the network parameters. Different algorithms have been presented for training neural networks; the most common one is the use of gradient descent...
Dataflow modeling offers a myriad of tools in designing and optimizing signal processing systems. A designer is able to take advantage of dataflow properties to effectively tune the system in connection with functionality and different performance metrics. However, a disparity in the specification of dataflow properties and the final implementation can lead to incorrect behavior that is difficult...
We consider the problem of testing whether an unknown Boolean function f : { -- 1, 1}n ⇆ { -- 1, 1} is monotone versus ε-far from every monotone function. The two main results of this paper are a new lower bound and a new algorithm for this well-studied problem. Lower bound: We prove an Ω(n1/5) lower bound on the query complexity of any non-adaptive two-sided...
We consider the problem of verifying the identity of a distribution: Given the description of a distribution over a discrete support p = (p1, p2,, pn) how many samples (independent draws) must one obtain from an unknown distribution, q, to distinguish, with high probability, the case that p = q from the case that the total variation distance (L1 distance) ||p -- q|| 1≥ ε?...
This paper proposes a novel approach for automatic estimation of four important traits of speakers, namely age, height, weight and smoking habit, from speech signals. In this method, each utterance is modeled using the i-vector framework which is based on the factor analysis on Gaussian Mixture Model (GMM) mean supervectors, and the Non-negative Factor Analysis (NFA) framework which is based on a...
We introduce a technique for applying quantum expanders in a distributed fashion, and use it to solve two basic questions: testing whether a bipartite quantum state shared by two parties is the maximally entangled state and disproving a generalized area law. In the process these two questions which appear completely unrelated turn out to be two sides of the same coin. Strikingly in both cases a constant...
This paper developed the common transmissibility to a quaternion form. The quaternion transmissibility was calculated based on the time-domain sequences of spatial vibration signals by using technique of quaternion Fourier transforms (DQFT). The quaternion transmissibility is superior to the common one because it can be used to deal with the spatial vibrations that are composed from three directional...
In this article, we consider the problem of detecting multiple targets in MIMO radar. MIMO ambiguity functions generally present strong range/angle coupling or high sidelobe levels so that weak targets will often be buried in the sidelobes of stronger targets. We propose to solve this problem by iteratively building an approximation of the multitarget matched filter through an Orthogonal Matching...
We consider a cloud as a cluster of processors holding each a large XML tree. We present a statistical representation which can be built online on each processor and allows to approximate boolean, unary and Aggregation queries. The main result of the paper shows how these statistics can be efficiently Reduced to a master node of the cloud. We obtain an approximation of the global tree structure built...
The problem of coherent multi-polarization SAR change detection assuming the availability of image pairs, collected from N multiple polarimetric channels, is addressed in this paper. At the design stage, it is assumed that the reference and test images from the same polarimetric channel may exhibit a power mismatch. The change detection problem is formulated as a binary hypothesis testing problem,...
Traditional text classification technology based on machine learning and data mining techniques has made a big progress. However, it is still a big problem on how to draw an exact decision boundary between relevant and irrelevant objects in binary classification due to much uncertainty produced in the process of the traditional algorithms. The proposed model CTTC (Centroid Training for Text Classification)...
Cross-Site Scripting (XSS) is a common attack technique that lets attackers insert the code in the output application of web page which is referred to the web browser of visitor and then the inserted code executes automatically and steals the sensitive information. In order to prevent the users from XSS attack, many client- side solutions have been implemented; most of them being used are the filters...
As signature continues to play a crucial part in personal identification for number of applications including financial transaction, an efficient signature authentication system becomes more and more important. Various researches in the field of signature authentication has been dynamically pursued for many years and its extent is still being explored. Signature verification is the process which is...
This paper presents a novel locally linear KNN method with an improved marginal Fisher analysis for image classification. First, the discriminating color space (DCS), which is derived by discriminant analysis of the red, green, and blue primary colors, is integrated into the proposed method. Second, an improved marginal Fisher analysis (IMFA) applies an eigenvalue spectrum analysis to improve the...
Availability of a single training sample (STS) or degraded set (DS) of training and testing samples restricts the success of face recognition in real-world applications. We propose a unified framework for handling both these challenges simultaneously by using a data dictionary, which is a combination of training dictionary and intra-class variation dictionary. The training dictionary is assembled...
Agglutinative languages, such as Hungarian, use inflection to modify the meaning of words. Inflection is a string transformation which describe how can a word converted into its inflected form. The transformation can be described by a transformational string. The words can be classified by their transformational string, so inflection is considered as a classification. Linear separability of clusters...
Hashtags are useful for categorizing and discovering content and conversations in online social networks. However, assigning hashtags requires additional user effort, hampering their widespread adoption. Therefore, in this paper, we introduce a novel approach for hashtag recommendation, targeting English language tweets on Twitter. First, we make use of a skip-gram model to learn distributed word...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.