The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the fundamental derandomization problem of deterministically finding a satisfying assignment to a CNF formula that has many satisfying assignments. We give a deterministic algorithm which, given an n-variable \poly(n)-clause CNF formula F that has at least ≥ 2^n satisfying assignments, runs in time \[ n^{\tilde{O}(\log\log n)^2} \] for ≥ \ge 1/\polylog(n) and outputs...
The design of electrical systems with renewable and conventional in-house generation involves economic, environmental and technical aspects. Often these instances are conflicting: conventional sources have lower Capex and good controllability, while renewable sources have lower Opex and are environmentally friendly but often present erratic behaviors. For these reasons, the best design solution is...
We introduce scGAN, a novel extension of conditional Generative Adversarial Networks (GAN) tailored for the challenging problem of shadow detection in images. Previous methods for shadow detection focus on learning the local appearance of shadow regions, while using limited local context reasoning in the form of pairwise potentials in a Conditional Random Field. In contrast, the proposed adversarial...
In this paper we present a new method for creating polynomial solvers for problems where a (possibly infinite) subset of the solutions are undesirable or uninteresting. These solutions typically arise from simplifications made during modeling, but can also come from degeneracies which are inherent to the geometry of the original problem. The proposed approach extends the standard action matrix method...
This work introduces a general formulation of the reconfiguration problem for untimed discrete-event systems (DES), which can be treated directly by supervisory control theory (SCT). To model the reconfiguration requirements we introduce the concept of reconfiguration specification (RS); here reconfiguration events (RE) are introduced to force a transition from one system configuration to another...
Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and...
A weight-t halfspace} is a Boolean function f(x)=\sign(w_1 x_1 + … + w_n x_n - θ) where each w_i is an integer in \{-t,\dots,t\}. We give an explicit pseudorandom generator that δ-fools any intersection of k weight-t halfspaces with seed length \poly(\log n, \log k,t,1/δ). In particular, our result gives an explicit PRG that fools any intersection of any...
The generation of pseudorandom number sequences can be achieved in a variety of ways, with the most secure methods generally requiring substantial processing to generate. Other pseudorandom number generation (PRNG) methods accept a compromise between processing power and security by mixing two independent, but less secure, PRNG outputs with each other. This paper presents a generalized mixing method...
Microgrids using renewable energy generators and energy storage are being suggested as a solution to rural electrification for many developing countries, even those with existing transmission / distribution networks. This is being driven by the rapidly falling costs of both solar and energy storage. However, the technology is changing rapidly in this area and existing technical standards often do...
Introducing more Distributed Generation (DG) into power grid infrastructure drives more attention to understand how large scale DG affects grid operation. Islanding is an important concern in this area. Islanding refers to the condition that DGs within a microgrid continue energizing while the microgrid has been disconnected from the main grid. Considering the adverse effects of Islanding, it should...
Extremum seeking control (ESC) can be utilized as a maximum power point tracking (MPPT) method that optimizes the operating point of a wind energy system by adjusting the wind turbine's rotor speed according to the change in the wind speed. Although ESC has a tracking ability and quick response capability that is better than those of the conventional MPPT methods, it increases the mechanical vibration...
Under today's global market requirements, products may be manufactured in a different country than where they are used, and may thus be manufactured to a different standard than that which is required for its intended use. It is important to understand different requirements in order to determine if the product can be used. Considerable alignment between the National Electrical Manufacturers Association...
The reproducibility of the Absorber Lined Shielded Enclosure (ALSE) radiated emission test method, defined in the standard CISPR 25, is evaluated through an interlaboratory comparison (ILC). The ILC started on September 2016 and concluded on February 2017. Nineteen data sets have been received. The investigated frequency range is from 1 MHz to 1000 MHz. The most critical (worst reproducibility) frequency...
A three phase synchronous machine is one of the critical and important equipment of power generating unit used in captive, co-generation and indipendent power plants(IPPs) in verious ratings. To protect the generator against power system abnormilities or fault within itself, it needs quick isolation from rest of the system for maintaining stability in power system. As generators are associated to...
In this work, a new technique for an efficient, simple and fast equivalent circuit and full wave numerical modeling of the electrostatic discharge (ESD) generator is presented. A novel circuit model of the NoiseKen ESD simulator is proposed based on the frequency domain measurement of the standard waveform calibration setup. The simple full wave electromagnetic (EM) model of the same generator, which...
Humans possess an extraordinary ability to learn new skills and new knowledge for problem solving. Such learning ability is also required by an automatic model to deal with arbitrary, open-ended questions in the visual world. We propose a neural-based approach to acquiring task-driven information for visual question answering (VQA). Our model proposes queries to actively acquire relevant information...
We present a new insight into the systematic generation of minimal solvers in computer vision, which leads to smaller and faster solvers. Many minimal problem formulations are coupled sets of linear and polynomial equations where image measurements enter the linear equations only. We show that it is useful to solve such systems by first eliminating all the unknowns that do not appear in the linear...
We present our recent work on sampling on shift-invariant spaces generated by a totally positive function of Gaussian type [9], discuss the main techniques, provide context for the results, and derive some new consequences. The main result is a sharp density condition for sampling that parallels Beurling's theory for bandlimited functions. As an application, we completely characterize the Gabor frame...
We present the recent theory of structured Banach frame decompositions for decomposition spaces, which helps understand the sparsity properties of a wealth of different types of frames, in particular of Gabor, wavelet and shearlet frames.
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high entropy physical processes, but this is difficult so pseudorandomness is usually substituted for randomness. We introduce improved complexity randomness tests and use them to judge three pseudorandom bit generators; the AES block cipher (standard, strongly believed to be secure), the Dragon stream cipher...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.