The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An efficient and easily implementable method is proposed for finding complete solution sets of piecewise-linear resistive circuits. In this method, a piecewise-linear resistive circuit is first described by a generalized linear complementarity problem, and then it is formulated as an integer programming problem. Then, it is solved by the integer programming solver CPLEX. The proposed method can be...
Emerging resistive non-volatile memory technology (RRAM) is fast gaining importance as a possible successor of Flash memory. Very few experimental studies exist on emerging RRAM that analyze the impact of soft-techniques or purely algorithm driven performance enhancement for such memory devices. In this paper, we study in detail four different soft techniques optimized for bit-flip minimization, mainly...
Online reviews play a crucial role in helping consumers to make purchase decisions. However, a severe problem Internet Water Army (a large amount of paid posters who write inauthentic reviews) emerge in many E-commerce websites recently which dramatically undermines the value of user reviews. Although the word Internet Water Army originated from China, some other countries also suffered from this...
In Shingled Magnetic Recording (SMR) drives, sequential write, indirect address mapping and garbage collection (GC) are three main unique features. To plenarily utilize these properties, there are many new specific algorithms designed to improve the performance, e.g., batch write policies and active GC algorithms. To analyze those designs, a simulation model is developed to estimate the performance...
The research presented is the first working step towards the goal of developing a domain-independent method for sentiment analysis of German customer feedback in social media. The approach proposes to apply the concept of natural language processing (NLP) to customer language processing (CLP). In this context we hypothesize an indifference in annotator ability in assigning customer reviews of tangible...
Flowchart-based programming languages are useful because they are easy to interpret on the user end, and have recently become more popular in implementation in certain fields. In this framework, a program is recognized as a flowchart. In this flowchart, different parts of the program can be executed concurrently or in an optimized order using scheduling algorithms. However, more complex equations,...
Most parallel SystemC approaches have two limitations: (a) the user must manually separate all parallel threads to avoid data corruption due to race conditions, and (b) available hardware vector units are not utilized. In this paper, we present an advanced compiler infrastructure for automatic parallelization of SystemC models at the thread-level. In addition, our infrastructure exploits opportunities...
Handwriting can be used to predict or analyze a person's behavioral or personality traits. Characteristics of a handwriting are studied for that. In this work various characteristics like size, spacing, slant, skew, pressure, etc are studied. Since signature reflects important characteristics of human being, we analyze them also. As our objective is to build an automated or computerized handwriting...
Existing image steganographic methods lack in the complexity, which can be utilized by the radical to decode the images and neutralize the operations. Several methods have been proposed in order to combat this. Perhaps the most efficient method is Block-based Edge Adaptive based on Least-Significant-bit Matched Revisited (LSBMR) approach. It is a famous type of steganographic methods in the spatial...
To enable low-rank tensor completion and factorization, this paper puts forth a novel tensor rank regularization method based on the ℓ1,2-norm of the tensor's parallel factor analysis (PARAFAC) factors. Specifically, for an N-way tensor, upon collecting the magnitudes of its rank-1 components in a vector, the proposed regularizer controls the tensor's rank by inducing sparsity in the vector of magnitudes...
We propose a novel parallel asynchronous lock-free algorithmic framework for the minimization of the sum of a smooth nonconvex function and a convex nonsmooth regularizer. This class of problems arises in many big-data applications, including deep learning, matrix completions, and tensor factorization. Key features of the proposed algorithm are: i) it deals with nonconvex objective functions; ii)...
Individuality of handwriting is the reason why it is used as a common base element for detecting character traits of the writer. It is believed that dynamic information improve the accuracy of the analysis, but they are not contained in an offline handwritten text. In order to recover dynamic information, a novel approach for handwriting trajectory recovery is proposed in this paper. The procedure...
To increase the capacity of hard disk drive (HDD) with no significant cost, Seagate announced the world's first Shingled Write Disk (SWD) that employs Shingled Magnetic Recording (SMR) technology in 2014. The main drawback of SMR is that non-sequential write access to the disk is restricted due to overlap in the layout of data tracks. Seagate SWD mitigates these access restrictions by using an internal...
Existing image steganographic methods lack in the complexity, which can be utilized by the radical to decode the images and neutralize the operations. Several methods have been proposed in order to combat this. Perhaps the most efficient method is Least-Significant-bit Matched Revisited (LSBMR)-based approach. It is a famous type of steganogrsphic methods in the spatial domain. In this paper we are...
IC3 and k-induction are commonly used in automated analysis of infinite-state systems. We present a reformulation of IC3 that separates reachability checking from induction reasoning. This makes the algorithm more modular, and allows us to integrate IC3 and k-induction. We call this new method property-directed k-induction (PD-KIND). We show that k-induction is more powerful than regular induction,...
In this paper we proposed a writer adaptation system based on an adaptation module that is a plug-in for any writer-independent handwriting recognition systems. The adaptation module is a radial basis function neural network (RBF-NN) that is built using an incremental learning algorithm named GALTM-AM algorithm (Growing-Adjustment with Long-Term Memory). GALTM-AM train a new given data with some LTM...
A simple and efficient method is proposed for finding all characteristic curves of piecewise-linear resistive circuits using the integer programming solver CPLEX. It is proved that all characteristic curves can be obtained by this method using the manual of CPLEX and the original paper where the algorithm used in CPLEX is proposed. Our method can be implemented easily without writing complex programs,...
A simple method is proposed for finding all solutions of piecewise-linear resistive circuits using integer programming. In this method, the problem of finding all solutions is formulated as a mixed integer programming problem, and it is solved by the Microsoft Excel solver, which is included in the most widely distributed and widely used spreadsheet Microsoft Excel. The proposed method can be implemented...
Line segmentation is very crucial in handwritten text recognition/analysis task. A new text line extraction scheme based on a data clustering algorithm is proposed. Our approach starts by determining the number of lines and setting up text line mid points' initial positions using a modified piece-wise projection profile technique. We apply afterwards competitive learning algorithm to adaptively move...
Google BigTable's scale-out design for distributed key-value storage inspired a generation of NoSQL databases. Recently the NewSQL paradigm emerged in response to analytic workloads that demand distributed computation local to data storage. Many such analytics take the form of graph algorithms, a trend that motivated the GraphBLAS initiative to standardize a set of matrix math kernels for building...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.