The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mid-Infrared (MIR) spectroscopy has emerged as the most economically viable technology to determine milk values as well as to identify a set of animal phenotypes related to health, feeding, well-being and environment. However, Fourier transform-MIR spectra incurs a significant amount of redundant data. This creates critical issues such as increased learning complexity while performing Fog and Cloud...
The implementation of channel estimation procedures in modern wireless networks exposes them to the risk of pilot contamination attacks. To protect the system from such types of malicious intervention, a recently proposed method, based on legitimate pilots from shifted constellations, can be applied. In this paper, the detection capability of this method is studied in both the presence and absence...
According to the state conversion idea of Markov process, we propose a new chaotic sequence quantization algorithm. The Markov quantization algorithm (MQA) we proposed solves the problem of poor sequence balance which is caused by the asymmetry of probability distribution on both sides of the threshold in binary quantization algorithm (BQA). Both the theoretical and simulation study results show that...
The energy consumption in residential section accounts for over 30% of the world and cost-effective indoor energy management is important. Visible light communication based on variable pulse position modulation (VPPM) is a scheme for efficient and convenient indoor energy management. This paper proposes methods for detecting dimmable packet. First, we describe a method based on correlation bank expanding...
To increase the success in computer programming courses, it is important to understand the learning process and common difficulties faced by students. Although several studies have investigated possible relationships between students performance and self-regulated learning characteristics in computer programming courses, little attention has been given to the source code produced by students in this...
Multi-channel linear prediction (MCLP) has been shown to be a suitable framework for tackling the problem of blind speech dereverberation. In recent years, a number of adaptive MCLP algorithms have been proposed, whereby the majority operates in the short-time Fourier transform (STFT) domain. In this paper, we focus on the STFT-based Kalman filter solution to the adaptive MCLP task. Similarly to all...
Program understanding plays a pivotal role in software maintenance and evolution: a deep understanding of code is the stepping stone for most software-related activities, such as bug fixing or testing. Being able to measure the understandability of a piece of code might help in estimating the effort required for a maintenance activity, in comparing the quality of alternative implementations, or even...
Detecting software security vulnerabilities and distinguishing vulnerable from non-vulnerable code is anything but simple. Most of the time, vulnerabilities remain undisclosed until they are exposed, for instance, by an attack during the software operational phase. Software metrics are widely-used indicators of software quality, but the question is whether they can be used to distinguish vulnerable...
Metric suites to assess Web Service quality attributes have been proposed recently. In particular, services interfaces in WSDL (Web Service Description Language) have distinct intrinsic aspects (e.g., size or complexity) able to be measured. We present an approach to prevent a high complexity on services interfaces (WSDLs), to ease consumers to reason about services' offered functionality. Mostly,...
We propose an efficient meta-algorithm for Bayesian inference problems based on low-degree polynomials, semidefinite programming, and tensor decomposition. The algorithm is inspired by recent lower bound constructions for sum-of-squares and related to the method of moments. Our focus is on sample complexity bounds that are as tight as possible (up to additive lower-order terms) and often achieve statistical...
A disease propagating in a community or a rumor spreading in a social network can be described by a contact network whose nodes are persons or centers of contagion and links heterogeneous relations among them. Suppose that a disease or a rumor originating from a single source among a set of suspects spreads in a network, how to locate this disease/rumor source? This problem is crucial and challenging...
Research into computational jigsaw puzzle solving, an emerging theoretical problem with numerous applications, has focused in recent years on puzzles that constitute square pieces only. In this paper we wish to extend the scientific scope of appearance-based puzzle solving and consider ’’brick wall” jigsaw puzzles – rectangular pieces who may have different sizes, and could be placed next to each...
Bilinear models provide an appealing framework for mixing and merging information in Visual Question Answering (VQA) tasks. They help to learn high level associations between question meaning and visual concepts in the image, but they suffer from huge dimensionality issues.,,We introduce MUTAN, a multimodal tensor-based Tucker decomposition to efficiently parametrize bilinear interactions between...
Correlation clustering is a NP-hard problem, and for large graphs finding even just a good approximation of the optimal solution is a hard task. In previous articles we have suggested a contraction method and its divide and conquer variant. In this article we present several improvements of this method (preprocessing, quasi-parallelism, etc.) and prepare it for parallelism. Based on speed tests we...
Pseudorandom number generators are required to generate pseudorandom numbers which have not only good statistical properties but also unpredictability in cryptography. A geometric sequence is a sequence given by applying a nonlinear feedforward function to an m-sequence. Nogami, Tada and Uehara proposed a geometric sequence whose nonlinear feedforward function is given by the Legendre symbol, and...
Access rates are a key indicator that reflects the popularity of web pages. High access rates are extremely important for web pages, especially for news web pages, online shopping sites, and search engines. We analyzed the influences of visual fluency and cognitive fluency on the access rates of Chinese web pages. First, we conducted an experiment of scoring the web pages. Twenty-five subjects were...
In this paper, we study the 2-adic complexity of Whiteman's generalized cyclotomic sequences of order 4 with length pq, where p, q = 1 (mod 4) are distinct primes. We prove that the 2-adic complexity of this class of sequences is lower bounded by pq − p − q − 1.
The paper studies the process of correlation for SIEM systems based on analyzing the structures of security event types. The approach to automated analysis of security events as input data with dynamic content is proposed. For the automated analysis of events the paper suggests to build a graph of types of events with direct and indirect links between them. Processing of security input data means...
One of the first steps towards the effective Technical Debt (TD) management is the quantification and continuous monitoring of the TD principal. In the current state-ofresearch and practice the most common ways to assess TD principal are the use of: (a) structural proxies—i.e., most commonly through quality metrics; and (b) monetized proxies—i.e., most commonly through the use of the SQALE (Software...
The analysis of biological data is a challenging problem in bioinformatics and data mining field. Given the complexity of the analysis of biological information, several methods have been proposed for analyzing this biological information in databases mostly in the form of genetic sequences and protein structures. Actually, genetic sequences are represented by matrices that indicate the expression...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.