The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The cosine similarity measure is widely used in big data analysis to compare vectors. In this article a new set of vector similarity measures are proposed. New vector similarity measures are based on a multiplication-free operator which requires only additions and sign operations. A vector ‘product’ using the multiplication-free operator is also defined. The new vector product induces the ℓ1-norm...
In this work we address the problem of static state estimation (SE) in distribution grids by leveraging historical meter data (pseudo-measurements) with real-time measurements from synchrophasors (PMU data). We present a Bayesian linear estimator based on a linear approximation of the power flow equations for distribution networks, which is computationally more efficient than standard nonlinear weighted...
Now a day, the massive amount of data and information (recently termed as “Big Data”) causes accessibility and retrieval problems if poorly managed. This is due to their relational structure which is more complicate, unexplainable, and unanalyzable with simple or traditional methods. The uniform display of these data and information is also difficult due to their diversified formats. Bag of Words...
In embedded systems, many numerical algorithms are implemented with fixed-point arithmetic to meet area cost and power constraints. Fixed-point encoding decisions can significantly affect cost and performance. To evaluate their impact on accuracy, designers resort to simulations. Their high running-time prevents thorough exploration of the design-space. To address this issue, analytical modeling techniques...
With the discontinuity of Selective Availability (SA) by U.S government, obtaining accuracies upto tens of meters by GPS system became simpler. Though the performance level reached to millimeter level accuracy, it is only restricted to military domains and is provided under Precise Positioning Service (PPS) standards. The two different GPS services include PPS and Standard Positioning Service (SPS)...
A novel switched-capacitor algorithmic digital-to-analog converter (D/A) is described. It is formed of one sample/hold and divider. Since no integrator is used, error caused by open loop gain of operational amplifier can easily be compensated. Required components are only two operational amplifiers, three unit capacitors and nine analog switches. Accuracy estimation shows that 12 bit resolution is...
Classification process is one of the most important operations implemented on the huge data warehouses in order to classify the data. Availability of huge amounts of data increased the need for effective techniques to analyze and classify data accurately. Many algorithms in the field of swarm intelligence are able to contribute to improve the classification accuracy using the optimal algorithm methods...
Estimation of human activities using regression techniques has been performed in this paper. The activities considered for investigation are sitting, standing and walking. As the number of independent variable considered in the proposed work is more than two, Multiple Variate Regression (MVR) technique is applied to estimate the activities. From the performance analysis, it is found that this technique...
Finding good paragraph structure or text segmentation is important in computational linguistic research mainly in areas such as information retrieval, question answering and summarization. We proposed text segmentation by subtopic movement detection based on lexical and named entity distribution. Main contributions of this research are the usage of named entity (with reference resolution) and voting...
Low Altitude Remote Sensing (LARS) images from the unmanned radio-controlled quadcopter platform has been utilized in assessing relationship between paddy production and paddy spectral by using Normalized Difference Vegetation Index (NDVI) classification method. Sampling result from six well distributed area were the main feeder in establishing the relationship of paddy growth parameters (paddy age...
The inherent randomness of turbulence makes it one of the most difficult phenomena to model. The need to accurately describe turbulence gave rise to the development of empirical turbulence models. Accurate prediction of the onset of turbulence and flow separation is critical in estimating the lift and drag force on a rotating cylinder immersed in a fluid stream. The objective of this study is to narrow...
Collaborative Filtering (CF) is one of the most successful recommendation techniques. Regardless of its success, it still suffers from some weaknesses such as data sparsity and user cold-start problems, resulting in poor recommendation accuracy and reduced coverage. Trust-based recommendation methods incorporate the additional information from the user's social trust network into collaborative filtering...
Selecting accurate and simple association rules that efficiently cover all data samples is very important in knowledge discovery. There are several measures to assess accuracy and relations in a rule. This poses a challenge for researchers to select effective measures. Combining different measures via multi-objective evolutionary algorithms is an effective method to select suitable association rules...
In this paper1, we propose an aerospace relay-based positioning scheme for regional positioning in the battlefield where a global navigation satellite system (GNSS) is not available because of signal jamming or blocking. In the proposed scheme, aeronautical nodes and satellites, called aerospace nodes, are used to relay a navigation signal broadcast from ground reference stations. The user receives...
This paper proposes a new framework for rule induction methods based on incremental sampling scheme and rule layers constrained by inequalities of accuracy and coverage. Incremental sampling scheme shows that the number of patterns of updates of accuracy and coverage is four, which give two important inequalities of accuracy and coverage for induction of probabilistic rules. By using these two inequalities,...
Wireless Sensor Networks (WSNs) typically aggregate sensed events into a sink by Continuous Monitoring (CM) or Event-Detection (ED). Cluster heads receiving and sending aggregated data have a difficulty in maintaining traditional cluster-based WSNs due to the energy hole problem, which leads to faster energy depletion around the sink. This paper shows how reporting frequency to the sink can be controlled...
A novel hardware Gaussian noise generator based on the Box-Muller method and the Coordinate Rotation Digital Computer (CORDIC) Algorithm is presented. The main novelties of this work are using Modified CORDIC Algorithm with Domain Folding (MDF-CORDIC) algorithm and expanding the range of convergence of the CORDIC algorithm to improve the operation accuracy for the elementary functions involved in...
There is an urgent need for a biometric that can be used for reliable identification of very young children (0 – 4 years of age), to fight child trafficking and improve vaccination uptake in the developing world. It remains unclear if the most common adult biometrics, such as face, fingerprint and iris, are stable during the first few years of life.
Alteration of user's speed and direction to the base station cause Carrier Frequency Offset (CFO). CFO is able to damage orthogonality among subcarriers and decrease system performance significantly. There are several researches already focused on ICI mitigation, however most of them only employed restricted inputs for CFO in order to generate Inter Carrier Interference (ICI). This research proposes...
Wireless Sensor Network as an important technology of Internet of things' development, is more and more widely used in various research fields. This paper mainly researches the part of localization application based on wireless sensor network, focuses on DV-Hop localization algorithm, and gives its algorithm simulation and analysis of the simulation results. Also this paper improves the algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.