The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Indoor positioning is a hot topic in current research. Most of the existing indoor positioning technologies based on time-difference-of-arrival (TDOA) require the time synchronization between base stations. In this paper, a high-precision multiple-antenna indoor positioning system based on chirp signal is proposed, in which each base station extracts TDOA information independently, so there is no...
Identifying dependencies between classes is an essential activity when maintaining and evolving software applications. It is also known that JavaScript developers often use classes to structure their projects. This happens even in legacy code, i.e., code implemented in JavaScript versions that do not provide syntactical support to classes. However, identifying associations and other dependencies between...
This paper focuses on detection of potential fraud that occurs in the procurement process via the Indonesian E-Procurement System (SPSE). Potential frauds in procurement take very diverse forms such as corruption, collusion and tender fixation and more importantly, they are found in various stages ranging from the budgeting to the utilization stages.
With the development of intelligent manufacturing technology, it can be foreseen that time series data generated by smart devices will raise to an unprecedented level. For time series with high amount, high dimension and renewal speed characteristics, resulting in difficult data mining and presentation on the original time series data. This paper presented a piecewise linear representation based on...
With the growth of services in IP networks, network operators are required to perform proactive operation that quickly detects the signs of critical failures and prevents future problems. Network log data, including router syslog, are rich sources for such operations. However, it has become impossible to find genuinely important logs that lead to serious problems due to the large volume and complexity...
A great deal of research efforts has been invested in temporal aspects of big data management during last years, with alternate fortune. This line of research aims at capturing, formally modeling and successfully exploiting all the time-dependent characteristics of the fundamental big data model ranging from state model to query model. Temporal big data management thus poses novel research challenges...
Is there a bias in paper selection processes for conferences? This work addresses one aspect of this question, and empirically examines if there is a bias in favor of the collaborators of the technical program committee members. Specifically, we check whether a paper written by a past collaborator of a program committee member is more likely to be accepted to the conference. If so, one might say that...
Recently, there has been rapid growth in the volume of digital data from semi-structured and unstructured sources, such as web pages, images, videos, tweets, blog posts, and emails. The volume of data increases daily, making it difficult to access the data efficiently. To tackle the problems, we can represent the data in a summarised form using fuzzy formal concept lattices. In a situation where data...
This paper proposes a two-phase feature selection method specific for bioinformatics domain from classification perspective in data mining. In the first phase, Bhattacharyya distance measurement is used for filtering the majority of irrelevant genes. Upon the basis, we apply floating sequential search method (FSSM) to further select informative gene set using kernel distance as measurement of class...
In recent years, the problem of high utility pattern mining become one of the most important research area in data mining. The problem is challenging, due to non applicability of anti-monotone property. The existing high utility mining algorithm generates large number of candidate itemsets, which takes much time to find utility value of all candidate itemsets, especially for dense datasets. In this...
Time of arrival (TOA) based techniques are widely used in many ranging and localization problems. But because their performance highly depends on the accuracy of the TOA estimation of direct-paths, it's challenging to achieve accurate position estimations under dense multipath or Non-Line-of-Sight (NLOS) condition. In this paper, an algorithm which combines Time difference of arrival (TDOA) technique...
When data mining techniques are applied to uncertain data, their uncertainty has to be considered to obtain high quality results. Usually, an uncertain object is described by a probability density function, a probability density function is approximated by a large amount of sample points, and the distance between two uncertain objects is expressed by the expected distance. Computing the expected distance...
Introspection is the prerequisite of an autonomic behavior, the first step towards a performance improvement and a resource-usage optimization for large-scale distributed systems. In grid environments, the task of observing the application behavior is assigned to monitoring systems. However, most of them are designed to provide general resource information and do not consider specific information...
The mobile robot which accomplishes a work in explored region does not know location information of surroundings. Traditionally, simultaneous localization and mapping(SLAM) algorithms solve the localization and mapping problem in explored regions. Among the several SLAM algorithms, the EKF (Extended Kalman Filter) based SLAM is the scheme most widely used. The EKF is the optimal sensor fusion method...
Efficiency is quite important for an algorithm to find frequent patterns from a large database. A new algorithm called LogECLAT algorithm which is enlightened by ECLAT algorithm uses special candidates to find frequent patterns from a continually updating database containing essential information about frequent patterns. LogECLAT algorithm can find several k-itemsets in one time of scanning database...
An effective similarity measure approach on specific data sets is becoming the focus in time series data mining. To solve the problem that financial time series are lacking dynamic information of trend after they are deal with dimension reduction with SAX, in this work we propose a novel similarity measure function, Composite-Distance-Function which joins point-distance advantages and trend-distance...
We present novel exploration algorithms and a control law that enable the construction of Voronoi diagrams over unknown areas using a single autonomous vehicle equipped with range sensors. Our control law and exploration algorithms are provably complete. The control law uses range measurements to enable tracking Voronoi edges between two obstacles. Exploration algorithms make decisions at vertices...
Collisions often occur because the area behind a car is not clearly visible in the dark. In this paper, we propose a system to measure the distance between the rear of the car and a target behind it in order to reduce the number of these accidents. Because it is expensive and time-consuming to develop new devices, this system uses a factory-installed monocular camera, brake light, and tail light that...
Few studies have attempted to examine the justice-creativity relation, yet the mechanism of how justice affects creativity deserves further investigation. We hypothesized that leader-member exchange mediated the relationship between justice climate and team member creativity. A survey conducted in 84 work teams in China found support for our predictions. Specifically, using a team leader-team member...
It is a basic application-supported technique to realize dynamic location. In order to make the precise locating method which is rather susceptible to the precise of the clock by the electromagnetic ranging ways only fit the continuous changing of the neighbor anchor nodes especially in the anchor-node-deficiency situation in which all the nodes move randomly in the environment where the electromagnetic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.