The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Motivated by the constantly growing interest and real-world applicability shown in complex networks, we model and analyze the network formed by road networks in cities from an innovative perspective. Inspired by similar approaches of comparing networks, we create a methodology that proposes the assessment of city road networks based on their motif distributions. To the best of our knowledge, we are...
When data are retrieved from a file storage system or the Internet, is there information about their provenance (i.e., their origin or history)? It is possible that data could have been copied from another source and then transformed. Often, provenance is not readily available for data sets created in the past. Solving such a problem is the motivation behind the 2014 Provenance Reconstruction Challenge...
Multiple Instance Learning (MIL) has been an interesting topic in the machine learning community. Since proposed, it has been widely used in content-based image retrieval and classification. In the MIL setting, the samples are bags, which are made of instances. In positive bags, at least one instance is positive. Whereas negative bags have all negative instances. This makes it different from the supervised...
Non-negative matrix factorization (NMF) is an efficient dimension reduction method and plays an important role in many pattern recognition and computer vision tasks. However, conventional NMF methods are not robust since the objective functions are sensitive to outliers and do not consider the geometric structure in datasets. In this paper, we proposed a correntropy graph regularized NMF (CGNMF) to...
Recent research in texture-based ear recognition also indicates that ear detection and texture-based ear recognition are robust against signal degradation and encoding artefacts. Based on these findings, we further investigate and compare the performance of texture descriptors for ear recognition and seek to explore possibilities to complement texture descriptors with depth information. On the basis...
Fault-based attacks against cryptographic circuits must be addressed by techniques that are different from approaches designed for random transient faults. We systematically investigate robust error-detecting codes that specifically target malicious attacks and guarantee minimal bounds on detection probability. Our study is based on FPGA-supported fault-injection campaigns on the circuit implementation...
Recent studies have shown that cache partitioning is an efficient technique to improve throughput in multi-core processors. The existing cache partitioning algorithms assume Least Recently Used (LRU) as underlying replacement policy. We propose old Tree-based PLRU on two-level caches with higher speed up or performance matching of LRU at GPUs. The algorithm is based on Pseudo LRU that uses binary...
The list demapper has been widely implemented in a coded multiple-input multiple-output (MIMO) receiver, where only a part of total signal vectors are examined in the calculation of likelihood ratio for low complexity. Generally, the list is generated either in the original or the lattice-reduced domain. In the latter, thanks to the operation of lattice reduction (LR), a better-conditioned MIMO channel...
This paper presents an intelligent E-commerce recommendation algorithm with collaborative filtering algorithm. Firstly, a novel user interest model is given, which is an important module in the E-commerce recommendation system. Particularly, to effectively integrate the user interest model with collaborative filtering algorithm, we assume that if two users have similar interest vector, they may want...
Evaluating and measuring the pedagogical quality of Learning Objects is essential for achieving a successful web-based education. On one hand, teachers need some assurance of quality of the teaching resources before making them part of the curriculum. On the other hand, Learning Object Repositories need to include quality information into the ranking metrics used by the search engines in order to...
For spatially multiplexed MIMO systems, conventional detection methods such as MLD and QRD-M requires high computational complexity when the number of antennas or modulation level increases. This paper presents a method for reducing the computational complexity with the aid of parity information sent through one of the transmitted symbols. The method utilizes QR decomposition of the channel matrix...
The propositional interval logic of temporal neighborhood (PNL for short) features two modalities that make it possible to access intervals adjacent to the right (modality xAy) and to the left (modality xAy) of the current interval. PNL stands at a central position in the realm of interval temporal logics, as it is expressive enough to encode meaningful temporal conditions and decidable (undecidability...
To develop efficient software system, reliability plays major role. Many methods and words have been developed for reliability evaluation. But few of them took consideration of object oriented features. In this paper, fuzzy approach is used to measure the reliability of object oriented software system. It also incorporates CK metrics as input metrics to evaluate the reliability. The result shows that...
Individual image quality metrics that focus on a particular form of image degradation have the virtue of being readily decipherable but also the drawback of not relating directly to the purpose for which the image is used. We describe here a method for learning the quality of iris images from the output of iris matching algorithms. We extract a large number of image quality features forming a high...
Biometric key generation techniques are used to reliably generate cryptographic material from biometric signals. Existing constructions require users to perform a particular activity (e.g., type or say a password, or provide a handwritten signature), and are therefore not suitable for generating keys continuously. In this paper we present a new technique for biometric key generation from free-text...
In the framework of the angular metric, robust stability margin is used to characterize the stability robustness of the closed-loop system. The mixed H2/H8 robust controller with degree constraint is designed, whose degree is not larger than that of the plant. The characteristics of mixed H2/H8 controller with degree constraint are discussed, and the form of the controller is parameterized. After...
Soft vector processors can augment and extend the capability of embedded hard vector processors in FPGA-based SoCs such as the Xilinx Zynq. We develop a compiler framework and an auto-tuning runtime that optimizes and executes data-parallel computation either on the scalar ARM processor, the embedded NEON engine or the Vectorblox MXP soft vector processor as appropriate. We consider computational...
Author name disambiguation has been one of the hardest problems faced by digital libraries since their early days. Historically, supervised solutions have empirically outperformed those based on heuristics, but with the burden of having to rely on manually labelled training sets for the learning process. Moreover, most supervised solutions just apply some type of generic machine learning solution...
Multi-user multiple input and multiple output (MU-MIMO) is one of the key techniques in 3GPP Long-Term Evolution (LTE), which enhances the overall system capacity in the downlink. In order to reduce the effect of inter-user-interference in this system, it is necessary to utilize an efficient detection method at the user equipment (UE) that besides its feasibility at high data rate transmission systems...
The degree distribution is an important characteristic in complex networks. In many applications, quantification of degree distribution in the form of a fixed-length feature vector is a necessary step. Additionally, we often need to compare the degree distribution of two given networks and extract the amount of similarity between the two distributions. In this paper, we propose a novel method for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.