The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a character-level ground-truth for an Arabic dataset of 8,640 character-shapes along with an evaluation metric that is adapted from image segmentation. These tools together constitute a benchmark for character-segmentation. We demonstrate the use of this benchmark on some segmentation algorithms and report their quantitative results in bits. Our approach can be extended to...
While mining software repositories is a field which has greatly grown over the last ten years, Large Scale Integrated circuit (LSI) design repository mining has yet to reach the momentum of software's. We felt that it represents untouched potential especially for defect prediction. In an LSI, referred to as hardware later on, verification has a high cost compared to design. After studying existing...
This paper presents a full reference quality assessment metric for stereoscopic images based on perceptual binocular characteristics. To ensure that the predicted 3D quality of experience is as reliable and close as possible to 3D human perception, the proposed stereoscopic image quality assessment (SIQA) method is relying on the cyclopean image. Our approach is motivated by the fact that in case...
The change of entropy ΔS is a distinctive characteristic of the thermal behavior of a lithium-ion cell. Usually, the change of entropy ΔS in an individual cell type or electrode material is determined by potentiometric measurements which, although precise, are time-consuming. Measurement times could be shortened by as much as a factor of 100 by using the method presented in this paper; “electrothermal...
In the contemporary era, the importance of information is undisputed, but there has never been a common understanding of information, nor a unanimous conclusion to the researches on information metrics. Based on the previous studies, this paper analyzes the important achievements in the researches of the properties and metrics of information as well as their main insufficiencies, and discusses the...
Invasion by Distributed Denial of Service (DDoS) is a serious threat to services offered on the Internet. A low-rate DDoS attack allows legitimate network traffic to pass and consumes low bandwidth. So, detection of this type of attacks is very difficult in high speed networks. Information theory is popular because it allows quantifications of the difference between malicious traffic and legitimate...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks management. In this paper we propose a novel anomaly detection system, based on a combined use of sketches and of a novel bivariate non-parametric detection method. The latter allows us to simultaneously analyse two different traffic features so as to improve the performance of the "classical" detection...
This paper proposes a shot-based key frame selection technique, aiming at generating a condensed set of frames representing the essential content of a video sequence. Inspired by the successful utilization of Jensen-Shannon Divergence (JSD) and Jensen-Rényi Divergence (JRD) for key frame selection [1] [2], we investigate several popularly accepted f-divergences for calculating the frame-by-frame distance...
In this paper, we propose a no reference image quality assessment (NR-IQA) algorithm based on distortion identification (DI) and multi-channel label transfer (LT). First, the distortion type classification is used to obtain the query image's probabilities of belonging to each distortion type. Then, the distortion specific label transfer is implemented in multiple distortion category channels. Based...
Heterogeneous multi-agent systems have previously been studied and deployed to solve a number of different tasks. Despite this, we still lack a basic understanding of just what “heterogeneity” really is. For example, what makes one team of agents more heterogeneous than another? In this paper, we address this issue by proposing a measure of heterogeneity. This measure takes both the complexity and...
This paper summarizes work that investigates human interactions in terms of communication through motion in cooperative control. We are interested in multi-agent distributed control models with a shared goal and with the agents being required to accomplish secondary objectives. The study presented here extends the earlier work on the analysis of leader-follower interactions in salsa. The move transitions...
To allow users to access networks and services ubiquitously, more and more user equipments (UEs) are equipped with multiple radio transceivers. However, due to the proximity of transmit and receive frequencies of in-device wireless technologies, the transmitter (TX) of one in-device wireless technology can interfere with the reception of another wireless technology within the same device, and the...
Plug-in hybrid electric vehicles (PHEVs) are receiving growing attention to achieve a sustainable transport system and society. Due to the limited vehicle battery capacity, PHEVs perform charging and re-charging from time to time. It is visioned that the charging load with high PHEVs penetration will pose a considerable impact on the residential distribution network. Therefore, implementation of coordinated...
We study achievable information rates for nonlinear channels with memory, in the context of satellite communication with QAM modulation. The complete channel model can be described by a Volterra expansion, but large alphabet size and/or large channel memory length may prohibit optimal soft-output demodulator processing, say with the BCJR algorithm. Thus we focus on reduced-state receivers and their...
Instrumentation of an environment with sensors can provide an effective and scalable localization solution for robots. Where GPS is not available, beacons that provide position estimates to a robot must be placed effectively in order to maximize a robots navigation accuracy and robustness. Sonar range-based beacons are reasonable candidates for low cost position estimate sensors. In this paper we...
Recommender Systems (RSs) cope with the problem of information overload, by providing to users content that fit with what they prefer. Generally, RSs work much better for those users on which they have more information about. Satisfying the new users becomes a challenge, as ensuring for them recommendations of quality is vital for the growth of the RS. Coping with this issue can be made by ensuring...
Split-fabrication has been proposed as an approach for secure and trusted access to advanced microelectronics manufacturing capability using un-trusted sources. Each wafer to be manufactured is processed by two semiconductor foundries, combining the front-end capabilities of an advanced but untrusted semiconductor foundry with the back-end capabilities a trusted semiconductor foundry. Since the security...
We give single-operations characterizations for submodular and supermodular functions on lattices that have monotonicity properties. We associate to such functions metrics on lattices and we investigate corresponding metrics on the sets of partitions.
For several applications, robots and other computer systems must provide route descriptions to humans. These descriptions should be natural and intuitive for the human users. In this paper, we present an algorithm that learns how to provide good route descriptions from a corpus of human-written directions. Using inverse reinforcement learning, our algorithm learns how to select the information for...
Incentive strategy is important in participatory sensing, especially when the budget is limited, to decide how much and where the samples should be collected. Current auction-based incentive strategies purchase sensing data with lowest price requirements to maximize the amount of samples. However, such methods may lead to inaccurate sensing result after data interpolation, particularly for participants...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.