The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Precise localization has attracted considerable traction in the area of cooperative assignments for robots in indoor applications. When dealing with indoor applications we are limited to the type of signals that can be used for precise localization which is our prime goal. There are limitations to the well known GPS and also vision-based modality where the non-line-of-sight (NLOS) conditions can significantly...
Compared with the global positioning system (GPS), the digital television (DTV) broadcasting signal is a promising candidate for position location due to low implementation cost and strong signal reception. Without changing the current infrastructure of the Chinese DTV broadcasting network, this paper proposes a novel positioning scheme using the multi-carrier pseudo-noise (PN-MC) training sequence...
Performance bounds provide a solid theoretical ground for comparing different localization methods. Similarly to the actual performance, they depend on two factors, namely the accuracy of the available data that are used for localization and the geometry of the network. While the impact of the accuracy of the available data has been studied extensively, the literature on the impact of network geometry...
Due to the severe resource constraints of sensor hardware, energy efficiency is one of critical factors for monitoring the movement of the large-scale phenomena such as wild fire and hazardous bio-chemical material, denoted by continuous objects. In order to save energy, most of existing research on tracking the continuous objects focuses on finding the ways to minimize the communication cost through...
In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has not been much research into mining these behaviors. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that give us useful insights into how users email one another. Engaging users...
Network analysis methods have been applied in many areas such as computer science, social science, biology and physics. In this paper, we apply network analysis methods to the linguistic domain for classifying subjective documents. Particularly, we view that subjective documents are related to one another according to some common subjective words and build a subjective document network of which nodes...
Gesture input interfaces for mobile devices with a touch screen have become widespread. Although gesture interfaces in common use are limited to the small screens of these mobile devices, pointing interfaces for large screens using handheld devices or attachments are common. However, these devices increase the user's cognitive load because they are unable to cancel the effect of spatial cognition...
Human-computer interaction is moving towards giving computers the ability to adapt and give feedback in accordance to a user's emotion. Studies on emotion recognition show that combining face and voice signals produce higher recognition rates compared to using either one individually. In addition, majority of the emotion corpus used on these systems were modeled based on acted data with actors who...
As the number of pages on the web is permanently increasing, there is a need to classify pages into categories to facilitate indexing or searching them. In the method proposed here, we use both textual and visual information to find a suitable representation of web page content. In this paper, several term weights, based on TF or TF-IDF weighting are proposed. Modification is based on visual areas,...
According to expressway traffic features, heavy traffic, network fees, closed-end management, the author proposed one method which used to transportation volume Statistical projections by the data from toll station weight charging system. Secondly, the expressway traffic statistics information system is designed using the three core modules which are data cleaning, data projection and map showing...
Within this paper we introduce a framework for semi- to full-automatic discovery and acquisition of bag-of-words style interest profiles from openly accessible Social Web communities. To do such, we construct a semantic taxonomy search tree from target domain (domain towards which we're acquiring profiles for), starting with generic concepts at root down to specific-level instances at leaves, then...
The project management theory and methods were used in the construction of enterprise information based on the life cycle theory. In the implementation process of ERP project, planning, organization, management and monitoring were executed to achieve the desired objectives and effects, and create greater benefits for the enterprise depending on the principles of the overall planning and implemented...
Identification of social relationships in social networks, especially cell phone networks, has attracted a lot of attention recently. Mobile phones continue to be one of the main methods of communication. Their voice and SMS logs are accessible in network switches and/or telecommunication centers. However, relationships like friendship have been mined from several features that are hard or impossible...
Centrality measures are crucial in quantifying the roles and positions of vertices in networks. An important measure is betweenness, which is based on the number of shortest paths that vertices fall on. However, betweenness is computationally expensive to derive, resulting in much research on efficient techniques. We note that in many applications, the key interest is on the high-betweenness vertices...
Advancement in ambient intelligence is driving the trend towards innovative interaction with computing systems. In this paper, we present our efforts towards the development of the ambient intelligent space TALA, which has the concept of empathy in cognitive science as its architecture's backbone to guide its human-system interactions. We envision TALA to be capable of automatically identifying its...
The development of the Web engendered the emergence of virtual communities. Analyzing information flows and discovering leaders through these communities becomes thus, a major challenge in different application areas. In this paper, we present an algorithm that aims at detecting leaders in the context of behavioral networks. This algorithm considers the high connectivity and the potentiality of propagating...
The goal of semi-supervised learning (SSL) methods is to reduce the amount of labeled training data required by learning from both labeled and unlabeled instances. Macskassy and Provost (2007) proposed the weighted-vote relational neighbor classifier (wvRN) as a simple yet effective baseline for semi-supervised learning on network data. It is similar to many recent graph-based SSL methods and is shown...
Recently, a huge wave of social media has generated significant impact in people's perceptions about technological domains. They are captured in several blogs/forums, where the themes relate to products of several companies. One of the companies can be interested to track them as resources for customer perceptions and detect user sentiments. The keyword-based approaches for identifying such themes...
Aiming at the shortages of the existing data-mining model for classification of customer's credit sale risk, a new classification model based on rough sets and support vector machine presents is put forward in this paper. First, the theory of rough set is applied to pick up and reduce the index attributes. Then, the training samples are sent to the support vector machine to train and learn. After...
Serial communication is widely used in digital communications and control systems. It will be introduced into the control system of in-line multipoint initiation in this paper. Using the software Quartus II and the hardware descriptive language VHDL in line with the top-down method, a hardware platform of in-line multipoint initiation control system was designed. The system integrated the main serial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.