The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Krylov subspace based information retrieval (IR) approach has been shown to provide comparable accuracy to latent semantic indexing (LSI), while providing some computational advantages. Recently, in the area of numerical linear algebra, attention has been drawn to the block Krylov subspace methods, which are shown to be more efficient than the classic Krylov subspace methods in solving linear...
Networks (i.e., graphs) appears in many high-impact applications. Often these networks are collected from different sources, at different times, at different granularities. In this talk, I will present our recent work on mining such multiple networks. First, we will present several new data models, whose key idea is to leverage networks as context to connect different data sets or different data mining...
In this paper we propose a new method to anonymize (share relevant and detailed information while not naming names) and protect data sets (minimize the utility loss) based on Factor Analysis. The method basically consists of obtaining the factors, which are uncorrelated, protecting them and undoing the transformation in order to get interpretable protected variables. We first show how to proceed when...
Data Jacket (DJ) is a technique for sharing information about data and for considering the potential value of datasets, with the data itself hidden, by describing the summary of data in natural language. In DJs, variables are described by variable labels (VLs), which are the names/meanings of variables. In the previous study, the matrix-based method for inferring VLs in DJs whose VLs are unknown,...
To collect and explicate meaningful knowledge of a community, we propose an Activity Model based on structured knowledge. The following issues arise related to the model development: (a) difficulties in capturing activities; (b) difficulty of acquiring knowledge; and (c) difficulty in optimizing the activities to newly adopted technologies. Therefore, we are developing technologies that use on-site...
In recent years, predicting future hot events in online social networks is becoming increasingly meaningful in marketing, advertisement, and recommendation systems to support companies' strategy making. Currently, most prediction models require long-term observations over the event or depend a lot on other features which are expensive to extract. However, at the early stage of an event, the temporal...
HDBSCAN*, a state-of-the-art density-based hierarchical clustering method, produces a hierarchical organization of clusters in a dataset w.r.t. a parameter mpts. While the performance of HDBSCAN* is robust w.r.t. mpts, choosing a "good" value for it can be challenging: depending on the data distribution, a high or low value for mpts may be more appropriate, and certain data clusters may...
In this paper, we discuss using a game-theoretic approach for Network Slicing (in particular RAN Slicing) that enables fully dynamic allocation of spectrum. The algorithm allows radio resources from across the whole spectrum to be allocated to users from different slices, so avoiding the inefficiencies of fixed slices. By using game theory, we can apply constraints on the resources allocated to individual...
In this paper, it is proposed a robust Second-Order Super-Twisting Sliding Mode Control for a Grid-connected inverter of a PV power plant. The proposed control strategy is able to maximize the energy extracted from the PV while regulating the DC-link voltage and achieving a power factor compensation and the reduction of currents harmonic distortion. Both in balanced or unbalanced condition, the grid...
Lithium-Ion Capacitors (LICs) are a new technology of hybrid supercapacitors that aims to deliver relatively high energy and high power. Therefore, they are known for their constitution inspired from lithium-ion batteries and conventional supercapacitors. Due to their hybrid structure, they have a unique behavior during aging. This paper concerns the effects of high temperatures (60°C and 70°C) and...
In this paper, a new approach for finding the optimal low speed regenerative braking cutoff point for Electric Vehicles (EVs) is proposed. This method is based on real-time sensing of motor current and disabling the regenerative braking at low speeds when the motor current falls below zero. It requires no hardware modifications to the existing architecture and can be implemented by modifying the brake...
In this article, a current control algorithm is conceived for converting solar dc power into ac power of high-quality. This conversion is based only on a dc-ac converter, avoiding the use of two stage converter. The proposed algorithm is founded on tracking the maximum power point which ensures controlling the electrical power exchanged with the grid. To assure a good dynamics and reduce the control...
Differential power processing (DPP) is a promising architecture to solve an issue caused by mismatch among PV modules. PV to non-isolated port bus (or PV to the virtual bus) is one of the topologies studied in DPP architecture that allows each DPP converters can achieve maximum power point tracking (MPPT) independently. The string current value does not have an effect on MPPT but relates to the power...
The deployment of modular virtual network functions (VNFs) in software defined infrastructures (SDI) enables cloud and network providers to deploy integrated network services across different resource domains. It leads to a large interleaving between network configuration through software defined network controllers and VNF deployment within this network. Most of the configuration management tools...
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
Cloud Data Center (DC) service orchestration and resource management are important applications of the Software Defined Networking (SDN) paradigm. In this paper, we introduce a novel dynamic allocation strategy for Virtual Machine (VM) allocation called Enhanced multi-objective Worst Fit (E-WF). E-WF combines the multi-objective Best Fit and Worst Fit allocation strategies, and it exploits the history...
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
Flexibility and extendibility of Software Defined Networks allows development of diverse network management and flow monitoring techniques. Yet, there are inherent tradeoffs between the quality of flow monitoring and the required network resources. In particular, collecting flow statistics, at the level of specific source-destination addresses (and, moreover, specific protocols and ports), requires...
Due to the abstraction of physical resources and heavy use of virtualization in the context of Service Function Chaining (SFC), verification of the processing and that forwarding of traffic is handled correctly is very challenging. Such verification requires explicit support from the physical cloud infrastructure and — more important — relies on correct configuration and operation of the Cloud Management...
This paper presents a low voltage and power efficient 12-bit successive-approximation register (SAR) analog-to-digital converter (ADC). The proposed adaptive time-domain (ATD) comparator automatically adjusts its input-referred noise performance according to the intermediate residual input level (ΔVin) during conversion. Considering the noise requirement of 12-bit SAR ADC, the proposed implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.