The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our emotion estimation refers to estimation of a reader's sentiments and feelings after they read a narrative (i.e., post-reading emotion types). The emotion types manifest in a reader's feelings combine to form diverse and various patterns. To elicit this phenomenon, we here attempt to estimate readers' emotional patterns based on their cognitive appraisals of the work. This paper describes our cognitive...
We study a house allocation problem where there are both existing tenants and new applicants. The NH4 mechanism is a real-world allocation mechanism which satisfies individual rationality, fairness and strategy-proofness. But it fails Pareto efficiency. We propose an efficiency-adjusted NH4 mechanism that allows each student to consent a certain priority violation that has no effect on her own assignment...
This paper presents a new approach to C-space exploration and optimal path planning for robotic manipulators and planar scenarios using the structure named bur of free C-space. This structure builds upon the so-called bubble, which is a local volume of free C-space, easily computed using the distance information in the workspace. It is previously shown how burs can be used to form a rapidly exploring...
In this work an unconditionally hiding auditing procedure for distributed (cloud) storage solutions is introduced. There is only one multi-party computation (MPC) scheme providing auditability which computationally protects the inputs of the computations. Building on this, we propose a computationally hiding solution that uses bilinear maps and therefore produces no additional overhead in the online...
In software development application lifecycle management (ALM) systems are used to support the development process. As these products are tailored for best fitting the applied programs and their actual usage is diverse. Often, this means that products of different vendors are applied, which reduce the reachability between different artefacts and the overall consistency of the system. In this paper...
Festinating gait is one of the most commonly seen motor symptoms of Parkinson's Disease patients. In this research, an accelerometer-based sensing system implemented on a vest is used to detect the behavior of festinating gait. The detection algorithm is based on the analysis of gait symmetry from the data measured by accelerometers. Specific indices were proposed to evaluate the severity of festinating...
Grey-incidence decision making approach is proposed to deal with the implementation of brownfield redevelopment project in the remediated sites. The inspiration behind this approach is valuable, because it is suitable to use regardless of the sample size. Whether it is big or small, or whether the data fulfills a particular conventional distribution or not. Above and beyond that, what makes it convenient...
Particle swarm optimization (PSO) has been proven to be a simple yet effective algorithm for searching the optimal solutions of objective functions. The main advantage of PSO is its simplicity, but it easily gets stuck in local optima. In order to remain the original merit and raise its performance, a novel idea is proposed in this paper, which selects the best model of PSO based on the previous performance...
As features in semiconductor technology become extremely scaled down, manufacturability is becoming a great challenge. Owing to the delayed adoption of new lithographic techniques, such as extreme ultraviolet (EUV), e-beam direct-write (EBDW), and directed self-assembly (DSA), in IC volume production, double patterning lithography (DPL) or multiple patterning lithography (MPL) is used to print critical...
SASEBO and SAKURA, boards developed for physical security analysis of cryptographic circuits against side-channel attacks, are FPGAs of different generations. The attacks perform statistical analysis on power or electromagnetic waveforms, and enhance leakage signals caused by a secret key. However, the signal becomes weaker along with the advancing miniaturization and high integration of semiconductor...
We studied the feasibility of the use of iBeacons for position detection. We compared the precision achieved by two well-known algorithms, i.e. nearest neighbor and k-nearest beacon. The nearest neighbor algorithm showed lower average error distance, by 1.0 m, than the k-nearest beacon algorithm. We also found that both indoor position methods are not influenced by the difference in the measured rooms...
By using haptic and olfactory senses as well as visual and auditory senses, it is expected that we are able to play networked games with high sense of presence. Fairness among players is important for the games, but we sometimes cannot use some senses by sickness, injury, and so on. In this paper, we assess the influence of olfactory and auditory senses on fairness for a networked virtual 3D object...
Many practical sensing applications involve multiple sensors simultaneously acquiring measurements of a single object. Conversely, most existing sparse recovery guarantees in compressed sensing concern only single-sensor acquisition scenarios. In this paper, we address the optimal recovery of compressible signals from multi-sensor measurements using compressed sensing techniques. This confirms the...
A recent line of work has established accurate predictions of the mean squared-error (MSE) performance of non-smooth convex optimization methods when used to recover structured signals (e.g. sparse, low-rank) from noisy linear (and possibly compressed) observations. Specifically, in a recent paper [15] we precisely characterized the MSE performance of a general class of regularized M-estimators using...
In series of papers, the authors introduced the concepts of multidimensional intuitionistic fuzzy sets and logic. Here, the concept of a multidimensional intuitionistic fuzzy quantifier is introduced. Three groups of these quantifiers are described and some of their basic properties are studied.
For many industries a key activity in product development is to demonstrate legislative compliance by showing, explicitly, that all relevant requirements from regulatory documents have been identified and addressed. The analysis and interpretation of standards and regulations requires considerable skills and consumes significant effort in product development. Therefore initiating reuse from the analysis...
Regulatory authorities of e.g. the automotive, avionic, or railway domain pose high requirements concerning safety assurance activities. One activity known from requirements engineering (RE) is requirements traceability. We propose a model-based methodology to facilitate trace link visualization over several levels of abstraction and different viewpoints. This intuitive visualization concept allows...
Today's systems are socio-technical, they are composed of social (humans and organizations) and technical components that interact with one another to achieve objectives they cannot achieve on their own. Security is a central issue in socio-technical systems and cannot be tackled through technical mechanisms alone. Instead, it requires enforcing security policies over the procedures that specify how...
In this paper, we improve a computational conceptof logic-based consensus among agents that has been introducedrecently. A consensus is defined as a non-contradictoryfragment of the information conveyed by various agents suchthat this fragment does not logically conflict with any agent. In this study, we introduce an additional requirement to theconcept of consensus to avoid some paradoxical consensuses...
In this paper, we introduce and explore the Frechet metric between the trees. We have used the metric to find similarities between polygons. This approach is used to quantify the quality of image segmentation.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.