The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advances of wireless technologies, moving objects or users equipped with sensors are located and tracked by wireless sensor networks. Recommendations for the direction and route in exhibition by analyzing and mining the user's movement behavior can be conducted. In this paper, we study how to mine the data of historical trajectories and develop an approach which can guide the users. When...
When information sources are unreliable, information networks have been used in data mining literature to uncover facts from large numbers of complex relations between noisy variables. The approach relies on topology analysis of graphs, where nodes represent pieces of (unreliable) information and links represent abstract relations. Such topology analysis was often empirically shown to be quite powerful...
This paper propose a biometric personal identification method based on a pair of right and left sole pressure distribution change. We acquire the sole pressure distribution change by load distribution sensor and use it for a personal identification. We employ twelve features based on shape of footprint, and twenty seven features based on movement of weight during walking for each sole pressure data...
The manner of organizing the sensors in the wireless sensor network for increasing the capability and optimized using of the sensors is of great importance. Hence considering coverage parameter in every Wireless Sensor Network (WSN) is extremely essential and critical. The matter of overlapping covered area by sensors in 2D space had been considered until now. This paper is suggested a pattern in...
A vast majority of control systems require the use of networks for the communication between the different agents: sensors, controllers, and actuators. The existing paradigm regards the messages, between sensors and controllers and between controllers and actuators, as periodic. Although this strategy facilitates the analysis and implementation, it leads to a conservative usage of the communication...
Anomaly detection in sensor network seems a challenge when encountering the limitation of the energy requirement and dynamics environments. It is to rapidly analyze and identify the abnormal events among the extreme volume data. Using correlation graph representation to correlate the events generated by sensor networks is capable to find the intentional dependency behavior's insight for detecting...
This paper proposes out a variation of particle swarm optimization with best neighbor and worst particle (BNWPPSO). In BNWPPSO, some particles will be constructed as new neighbors of each particle and the best one of them will have influence on the behavior of the particle. The update formula of position is modified also to balance the local search ability and global search ability more efficiency...
This paper presents a mathematical basis for judging the quality of camera and projector placement in 3D for structured light systems. Two important quality metrics are considered: visibility, which measures how much of the target object is visible; and scale, which measures the error in detecting the visible portions. A novel method for computing each of these metrics is presented. An example is...
This paper shows how to use an ideal rubber string, which is clamped down at both ends, as a memory device. The information is stored on the string by giving it an initial shape, where the Fourier coefficients of this shape represent the code bits. Once the string is let go, the wave equation governs the oscillatory movements of the string, but it retains the information in the Fourier coefficients...
This paper presents a framework for fault detection and diagnosis of batch processes based on the information directly gathered from sensors. First, a statistical model of the process is build using multiway principal component analysis (MPCA) for dimensionality reduction and fault detection tasks. Afterwards, a case-based reasoning (CBR) approach is used for fault diagnosis and for false alarm and...
Cognitive radio has become an effective theory to solve the inefficiency of the spectrum usage, especially the energy detection in spectrum sensing technique. Recently several researches have focused on the performances of sensing using Gaussian approximation instead of real chi-square distribution based on central limit theory. In this paper, we specifically investigated the errors caused by approximation...
This paper analyzes the effect of replay attacks on a control system. We assume an attacker wishes to disrupt the operation of a control system in steady state. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. This is a very...
This paper discusses the problem of joint location and orientation estimation of a receiver using only angle of arrival (AOA) information. Conventional formulations of the problem consist of a number of nonlinear equations where the number of unknowns exceeds the number of equations. However, formulations presented in this paper simplifies the problem in a way that leads of efficient solutions. Two...
This paper proposes a biometric personal authentication based on the pressure distribution while one step walking. We extract one step from a walk on a mat type load distribution sensor and use it to personal authentication. With this method, features which are based on weight movement and foot shape during walking are calculated, then a classifier is developed on the basis of fuzzy inference. We...
Controlling the first few order acoustic radiation modes of a plate has been previously shown to reduce efficiently its total sound radiation at low frequency. In this paper, a new sensing strategy based on acoustic radiation modes for active structural acoustic control (ASAC) approach is proposed for the minimization of the acoustic radiation from a vibrating plate. Measuring a few points velocity...
This paper describes how a system, consisting of a discrete controller (e.g. a PLC) that controls a physical plant/process, can be formally verified. The physical process is assumed to be modeled using SensorGraphs, a discrete event modeling language directed at physical systems with binary and identity sensors (e.g. RFID). The formal and graphical syntaxes of Sensor Graphs are presented and exemplified...
We analyze routing algorithm for wireless sensor networks called power aware differentiated routing (PADR), which is proposed for collaborative routing of real-time (RT) and non-real time (NRT) traffic in a sensor field in order to prolong the otherwise shorter life time of RT sensor network. PADR uses nodes in the non-real time network as backup for routing RT traffic. It involves swapping a forwarding...
Energy efficiency is a critical consideration in the design of low cost sensor networks. This paper studies the problem of extending the lifetime of the sensor networks as far as possible while maintaining the quality of network coverage. A systematical analysis on the relationship between the network lifetime and cover sets alternation is given, and by introducing the concept of time weight factor,...
This paper presents kinematic analysis of a vertical type 6 DOF reticle stage for lithography process and a novel mapping method using a ratio of input-output relationship. The vertical type reticle stage system was designed for installing masks in photo-lithography process, and controlled using six precise gap sensors. As the stage is directly actuated by voice coil motors (VCM) and supported by...
The TransLucid programming language is a low-level intensional language, designed to be sufficiently rich for it to be the target language for translating the common programming paradigms into it, while still being fully declarative. The objects manipulated by TransLucid, called hyperdatons, are arbitrary-dimensional infinite arrays, indexed by multidimensional tuples of arbitrary types. We present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.