The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a unified framework OCTracker for tracking overlapping community evolution in online social networks. OCTracker adapts a preliminary community structure towards dynamic changes in social networks using a novel density-based approach for detecting overlapping community structures and automatically detects evolutionary events like birth, growth, contraction, merge, split, and...
Reversible watermarking aims to restore the original data after watermark extraction, which is more suitable for copyright protection of 2D-vector maps. In this paper, we present a reversible watermarking strategy for 2D-vector maps based on iterative embedding. It begins with vertex grouping of each polyline. Then only the highly correlated data sets are selected as the cover data for iterative embedding...
For decentralized control problems with quadratically invariant information constraints, the optimal controller may be found efficiently. In this paper, we show that there are systems which are not quadratically invariant but reduce to systems that are. We call the requisite property internal quadratic invariance. We present an associated reduction procedure, and illustrate our method with examples.
In this paper, we give sufficient conditions which guarantee the existence of a diffeomorphism in an extended state space that allows to transform a multi-output nonlinear dynamical system into a nonlinear normal observable canonical form. In particular, we propose an algorithm that permits to derive such diffeomorphism. The main feature of the canonical form is that it is obtained by allowing a diffeomorphism...
In the analysis of optimal control problems with state constraints, a key step (establishing `metric regularity') is to show that an arbitrary state trajectory can be approximated by a feasible state trajectory, whose distance from the original state trajectory is linearly related to the state constraint violation. It is then possible, for example, to give conditions for the state constraint maximum...
In this note, the novel representation is proposed for a linear periodic continuous-time system with T-periodic real-valued coefficients. We prove that a T-periodic real-valued factor and two real-valued matrix exponential functions can be extracted from a state transition matrix, while, in the well-known Floquet representation theorem, a 2T-periodic real-valued factor and a real-valued matrix exponential...
In this work we investigate the stability of bimodal and bistable (both modes are stable) continuous time linear systems in ??3. Under certain conditions, we first show that all the trajectories which start on the plane separating the two modes are bound to hit the plane again in finite time and go into the other mode. This property yields fixed directions on the separating plane. Eventually, all...
In this paper, the structures and properties of single cycle T-function, which has been lately proposed by Klimov and Shamir, are studied. A new symbol cij is introduced, which is called a carrier, to representing the carrier of the word x on jth position at ith time. By using the carriers, we reveal that the sequence composed of the values of the word x on jth position at all time, whose period...
Having a single numerical value to represent a student's overall level of achievement is useful. At Curtin University of Technology, it is the course weighted average (CWA) - an average of percentage grades received for each course. At Virginia Tech, it is the grade point average (gpa) - an average of values based upon letter grades for courses (letters initially based upon percentage grades). To...
The aim of the present work is to provide a reliable decision-making tool to enterprise managers that helps them to understand the available acquired competence resources network and to take the right decision to promote and ameliorate this network. For that purpose, a novel competence evaluation approach based on a fuzzy linguistic information model, named the 2-tuple linguistic representation model,...
Double inverted pendulum is a nonlinear system, unstable and fast reaction system. Double inverted pendulum is stable when its two pendulums allocated in vertically position and have no oscillation and movement and also insertion force should be zero. The main target of this research is design a controller based on neuro-fuzzy methods by using feedback-error-learning for controlling double inverted...
An expert teacher's assessment of new skills can achieve a suitable total score without having to consider to every sub-item. In addition, while completing a skill assessment there are the formal weighting arrangements of every sub-item. This study proposed two new methods using the technique for fuzzy decomposition analysis, which arranges weightings, quickly and exactly. The maximum solution of...
Creolization is a self-organization process of new language community. Thus far, a simulation study of the emergence of creoles has been reported in a mathematical framework. In this paper we introduce a scale-free network to the framework. We show that local creole communities are organized, regardless of the degree of exposure to non-parental languages, in contrast to the non-spatial model, and...
In this paper, a subspace-based identification algorithm to identify stable linear-time-invariant systems from corrupted phase samples of the frequency response function on nonuniformly spaced grid of frequencies are developed. The algorithm is strongly consistent if the corruptions are zero-mean random variables with a known covariance function. Furthermore, it exactly retrieves finite-dimensional...
In this contribution we present closed-form performance analysis for the problem of blind separation of correlated sources when the separation algorithm is ignorant of the source model, and assumes only scalar sources. Our data model is of one scalar source and one multidimensional source. We obtain a closed-form analytical expression for applying joint diagonalization on correlated sources. The obtained...
In this paper, we present a framework for Bayesian inference in continuous-time diffusion processes. The new method is directly related to the recently proposed variational Gaussian Process approximation (VGPA) approach to Bayesian smoothing of partially observed diffusions. By adopting a basis function expansion (BF-VGPA), both the time-dependent control parameters of the approximate GP process and...
Spoken tutorials are a technique to create powerful documentation on software packages. This approach is especially useful for free or open source software. It is explained through the development of several spoken tutorials on LaTeX. The main advantage of this method is that no special infrastructure is required and hence it lends to collaborative document development.
GRAIN-v1 is a stream cipher that has been selected in the final portfolio of the eSTREAM project. GRAIN-128 is a variant of GRAIN-v1. The best known mathematical attack against GRAIN-128 is the brute force key-search. This paper introduces a fault attack on GRAIN-128 based on a realistic fault model and explores possible improvements of the attack. We also discuss countermeasures to counteract our...
In this paper, a modification of the standard learning algorithm Q-learning is presented: Object Q-learning (OQ-learning). An autonomous agent should be able to decide its own goals and behaviours in order to fulfil these goals. When the agent has no previous knowledge, it must learn what to do in every state (policy of behaviour). If the agent uses Q-learning, this implies that it learns the utility...
Cyber-physical systems denote a new modeling paradigm that promotes a holistic view on complex systems. These systems have been studied before from various particular perspectives using paradigms like ubiquitous and distributed computing or embedded and hybrid systems. In modeling cyber-physical systems one has to consider the interaction between physics, computation and communication (networking),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.