The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In typical applications, chromatic indices are calculated as linear combinations of the normalized r-, g- and b-channels and used as features for a later classification based on chromatic appearance. But the variety of indices used in the literature is very limited. Furthermore is the choice of which index to use justified either empirically, based on false mathematical assumptions or not justified...
With the enhancement of informatization and automation, the capacity and efficiency of CBTC systems are increasing. However, the wide application of information technologies brings serious security threats on CBTC systems. Due to inherent characteristics of railway services, obtaining the security situation of CBTC systems is necessary. The methodlogy in this paper to evaluate the vulnerability of...
This paper presents a research on using Google's Word2Vec model for intertextuality detection in literary texts. Word2Vec is considered a new and powerful Natural Language Processing semantic tool, used for computing text cohesion and similarity between documents. This article analyzes intertextuality in terms of semantic relations between words in novels. A similarity is calculated as a score: the...
This paper proposes an approach to construct effectiveness evaluation model semi-automatically based on system architecture such as Department of Defense Architecture Framework (DoDAF). The effectiveness evaluation index system is firstly generated based on architecture models including Capability Dependencies (CV-4), Capability to Operational Activities Mapping (CV-6), Operational Activity to Systems...
Recently we developed a magnetically driven pumping system with two spherical NdFeB plugs in a circular housing. The gap between the plugs and the channel wall is influencing the blood cell damage as well as the pump performance. We are using a computational and experimental sensor platform to analyze the stress on the blood cells in the device. The sensor platform can be used to reduce cell activation...
Random numbers are useful for a variety of purposes. A discrete representation of them can be obtained from pseudorandom numbers generators. This paper presents PseudoRandom, a prototype of a hypermedial educational material, which approaches the subject from a multidisciplinary and constructivist perspective.
The use of technologies to support educational processes, is a point that has been working for several years with the purpose of strengthening teaching and learning processes. The personalization of educational environments is one of its main characteristics, however it has not been completely achieved to difficulties both in modeling and implementation. In addition, it is fundamental to offer accessible...
The paper presents an effective identification method for DDoS attacks and flash crowd in the source-end network. As DDoS attack and flash crowd behavior dramatically increase the number of new (or forged) source IP addresses, the method firstly construct a time series by counting the number of new (or forged) IP addresses in the monitored local area network, and use VTP (variance-time plots) method...
Based on the analysis and summary of the features of existing STL (Stereolithography) model slicing algorithms, the STL model slicing algorithm that based on dynamic adjacent edge is proposed. According to the Z-max and Z-min of the Z-coordinate projection in the slice direction and the thickness of the every layer, achieving slicing the whole STL model, and the topological relation of the adjacent...
Broadcast television is one of the most important telecommunication systems in Brazil. Such relevance requires that an assessment of the coverage and quality of the Digital TV signal must be extensively performed in the pursuit of technical excellence. The study of coverage prediction models would allow broadcasters to project their stations in a way to distribute their respective signals harmoniously...
In 2013, Tams et al. proposed a method to determine directed reference points in fingerprints based on a mathematical model of typical orientation fields of tented arch type fingerprints. Although this Tented Arch Reference Point (TARP) method has been used successfully for pre-alignment in biometric cryptosystems, its accuracy does not yet ensure satisfactory error rates for single finger systems...
Traditional machine learning algorithms often require computations on centralized data, but modern datasets are collected and stored in a distributed way. In addition to the cost of moving data to centralized locations, increasing concerns about privacy and security warrant distributed approaches. We propose keybin, a distributed key-based binning clustering algorithm for high-dimensional spaces....
Stock market prediction has attracted a lot of attention from both business and academia. In this paper, we implement a model based on Recurrent Neural Networks (RNN) with Gated Recurrent Units (GRU) to predict the stock volatility in the Chinese stock market. We also propose many price related features which are used as inputs for our model. Apart from that, we carefully select official accounts...
A newly-invented, distributed, high-performance graphical processing framework that simulates complex radio frequency (RF) propagation has been developed and demonstrated. The approach uses an advanced computer architecture and intensive multi-core system to enable highperformance data analysis at the fidelity necessary to design and develop modern sensor systems. This widely applicable simulation...
Lateral load transfer ratio (LTR) is a criterion that is often used for designing ground vehicle rollover warning technologies to indicate the vehicles rollover status. Generally, LTR index depends on road geometry and vehicle characteristics. However, crosswind loads have the potential to influence the roll stability and therefore the safety of road vehicles particularly large commercial units. This...
The paper introduces methods that decrease the computational and memory burden of discretisation based affine tensor product model transformation. Their importance comes from the fact, that the computational cost of multi-variate functions' orthonormalization and the amount of accessible memory bound the applicable discretisation density and the number of parameters. The proposed methods can overwhelm...
This paper proposes a real-time identification method for auto-regressive with exogenous inputs and state-dependent parameters (ARX-SDP). This model is always non-linear. We conveniently adapt Young's off-line approach to an real-time approach with reduced computational cost. Young's approach focuses on discovering state-parameter dependence. This implies to unveil the nonlinear structure of the system...
Semi-symbolic simulation is becoming popular for inclusion of parameter uncertainties in the system design analysis. For robust control system design optimization, computational methods enabling fast semi-symbolic simulations are necessary. We propose an operational computation method based on orthogonal signals that is faster than step integration methods and allows the direct evaluation of system...
In this paper, the Hegselmann-Krause type model with leadership is considered. We look for optimal control strategies for the system to attain a consensus in such a way that the control mechanism is included in the leader dynamics. Necessary optimality conditions are obtained by the use of the weak maximum principle for control problems on time scales. The validity of the proposed control strategy...
Granger causality approaches have been widely used to estimate effective connectivity in complex dynamic systems. These techniques are based on the building of predictive models which not only depend on a proper selection of the predictive vectors size but also on the chosen class of regression functions. The question addressed in this paper is the estimation of the model order in the computation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.