Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper combines FMEA and n2 approaches in order to create a methodology to determine risks associated with the components of an underwater system. This methodology is based on defining the risk level related to each one of the components and interfaces that belong to a complex underwater system. As far as the authors know, this approach has not been reported before. The resulting information from...
In recent years, various approaches have been investigated towards blind image quality assessment (IQA) with high accuracy and low complexity. In this paper we develop a pre-saliency map based blind IQA method, which takes advantage of saliency information in prior of quality prediction for performance enhancement by two steps. 1) We split the image into patches and design a convolution neural network...
Given the significant industrial growth of demand for virtual reality (VR), 360º video streaming is one of the most important VR applications that require cost-optimal solutions to achieve widespread proliferation of VR technology. Because of its inherent variability of data-intensive content types and its tiled-based encoding and streaming, 360º video requires new encoding ladders in adaptive streaming...
With the recent proliferation of the Internet-of-Things (IoT) devices, coupled with the expected massive growth in the deployment of such devices, the 3GPP Specifications continued to evolve to address the performance needs and the cost/complexity reduction requirements of these IoT devices, achieved through the introduction of new features and new User Equipment (UE) categories. These features will...
A non-orthogonal multicarrier signal, termed spectrally efficient frequency division multiplexing (SEFDM), is investigated in this work. It improves spectral efficiency by compressing sub-carrier spacing below the symbol rate at the cost of self-created inter carrier interference (ICI). Sphere decoding (SD) is an efficient method to recover signals approaching maximum likelihood (ML) performance....
Quite often we come across data which is large in size such as the identification numbers of employees working in a multinational firm or climate records of a place over a period of time or the memory addresses of the storage device. These types of relatively large data are often hard to handle and organize. The paper puts forward a new data model aiming to provide efficient organization in storing...
This paper proposed a Boolean expression simplification method with reduced complexity. To avoid bulky size of the truth table for multiple input combinational circuits, a reduced truth table is proposed here and this methodology is able to reduce its present size. This paper discusses about the generation of minterms from the SOP form of the Boolean expression. Here any input system is described...
In this paper, we propose a novel multilevel NER framework, for addressing the challenges of clinical name entity recognition, based on different machine learning and text mining algorithms. The proposed framework, with multiple levels, allows models for increasingly complex NER tasks to be built. The experimental evaluation on two different publicly available datasets, corresponding to different...
We introduce a novel algorithm for mining temporal intervals from real-time system traces with linear complexity using passive, black-box learning. Our interest is in mining nfer specifications from spacecraft telemetry to improve human and machine comprehension. Nfer is a recently proposed formalism for inferring event stream abstractions with a rule notation based on Allen Logic. The problem of...
Narrow passages in the configuration space pose challenge for sampling-based planners. In this paper, the conventional wisdom of ”divide and conquer” is adopted to design a hierarchical strategy to address this challenging problem. Rapidly-exploring random tree (RRT) is taken as an example to illustrate the proposed strategy. A hybrid map which consists of a topological map and a set of metric maps...
Mid-Infrared (MIR) spectroscopy has emerged as the most economically viable technology to determine milk values as well as to identify a set of animal phenotypes related to health, feeding, well-being and environment. However, Fourier transform-MIR spectra incurs a significant amount of redundant data. This creates critical issues such as increased learning complexity while performing Fog and Cloud...
Information diffusion models typically assume a discrete timeline in which an information token spreads in the network. Since users in real-world networks vary significantly in their intensity and periods of activity, our objective in this work is to answer: How to determine a temporal scale that best agrees with the observed information propagation within a network? A key limitation of existing approaches...
In the age of big data, many graph algorithms are now required to operate in external memory and deliver performance that does not significantly degrade with the scale of the problem. One particular area that frequently deals with graphs larger than RAM is triangle listing, where the algorithms must carefully piece together edges from multiple partitions to detect cycles. In recent literature, two...
The predominance of conventional polymer processes (CPP) is undoubtedly formidable regarding monetary benefits gained in lieu of mass production in the global market. In this research, profitable commercial status of CPP is critically questioned in case of a specific large-scale application in low quantities, considering the following three factors: cost, time, and complexity. This research paper...
[Background] Security risk assessment methods in industry mostly use a tabular notation to represent the assessment results whilst academic works advocate graphical methods. Experiments with MSc students showed that the tabular notation is better than an iconic graphical notation for the comprehension of security risks. [Aim] We investigate whether the availability of textual labels and terse UML-style...
In this paper, we present a graph search approach for identifying arbitrarily complex structural genomic variation. Our method leverages the ability of long reads (e.g. from Pacific Biosciences platforms) to span multiple breakpoints of complicated local rearrangements, allowing us to resolve small-scale complexities that may be overlooked by other tools. We applied our method to a subset of NA12878...
The problem of completing low-tubal-rank tensors from incomplete noisy observations is studied. To recover the underlying tensor, an iterative singular tube thresholding (ISTT) algorithm is proposed. To explore the statistical performance of the proposed algorithm, the estimation error in terms of the Frobenius norm is upper bounded non-asymptotically. The minimax optimal lower bound of the estimation...
Linear Discriminant Analysis (LDA) is widely-used for supervised dimension reduction and linear classification. Classical LDA, however, suffers from the ill-posed estimation problem on data with high dimension and low sample size (HDLSS). To cope with this problem, in this paper, we propose an Adaptive Wishart Discriminant Analysis (AWDA) for classification, that makes predictions in an ensemble way...
Convolutional Neural Networks are being studied to provide features such as real time image recognition. One of the key operations to support HW implementations of this type of network is the multiplication. Despite the high number of operations required by Convolutional Neural Networks, they became feasible in the past years due the high availability of computing power, present on devices such as...
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.