The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers an orthogonal frequency division multiplexing system where the Effective Exponential SNR Mapping (EESM) is applied. We first present an approximate model in which the subcarriers grouped into one block are assumed to have the same channel coefficient and, subcarriers in different blocks have independent and identically distributed channel coefficients. Then, we present an algorithm...
In this work we propose an imputation method that leverages repeating structures in audio, which are a common element in music. This work is inspired by the REpeating Pattern Extraction Technique (REPET), which is a blind audio source separation algorithm designed to separate repeating “background” elements from nonrepeating “foreground” elements. Here, as in REPET, we construct a model of the repeating...
The advance of deep learning has made huge changes in computer vision and produced various off-the-shelf trained models. Particularly, Convolutional Neural Network (CNN) has been widely used to build image classification model which allow researchers transfer the pre-trained learning model for other classifications. We propose a transfer learning method to detect breast cancer using histopathology...
The rapid and irregular motion of semen cells makes the counting process of semen difficult in the visual assessment. Therefore, computer based techniques are necessary to evaluate the tests with more accurately. In this paper, an alternative way to the visual assessment technique in spermiogram tests is presented. Analyses are performed on the recorded microscope video images by computer, automatically...
Vehicles have become a daily needs for all of us and it is normal that every family is having at least one vehicle at their home. This leads to the increased of accidents and vehicular ad hoc network (VANET) is an approach invented to tackle with this problem. In order to study the algorithm in VANET, a mobility simulator is needed for simulation. SUMO is proved to be a good simulation tool for VANET...
The division of the Association of Southeast Asian Nations (ASEAN) member states in South China Sea disputes brings up the question of how state coalitions form. Analysis of this issue often delves into specific factors such as the legality of territorial claims and each state's military and economic power. Generalized predictions of coalitions, however, require analysis of a variety of factors that...
Collective adaptive systems are an emerging class of networked and situated computational systems with a wide range of applications, such as in the Internet of Things, wireless sensor networks, and smart cities. Engineering such systems poses a number of challenges, and in particular many approaches, based upon designing the machine-to-machine interaction directly, suffer from a local-to-global abstraction...
Applications in computer network security, social media analysis, and other areas rely on analyzing a changing environment. The data is rich in relationships and lends itself to graph analysis. Traditional static graph analysis cannot keep pace with network security applications analyzing nearly one million events per second and social networks like Facebook collecting 500 thousand comments per second...
Compute-intensive simulations typically chargesubstantial workloads on an online simulation platform backedby limited computing clusters and storage resources. Some (ormost) of the simulations initiated by users may accompany inputparameters/files that have been already provided by other (orsame) users in the past. Unfortunately, these duplicatesimulations may aggravate the performance of the platform...
The understanding and learning of how an unknown system behaves is crucial to the self-improving system integration challenge of continually integrating and optimising a collection of self-aware and adaptive systems. We aim to design an algorithm that can discover, learn the behaviour of, and interact with these systems of interest. We seek to exploit the latest models of neocortical architectures...
Dragonfly network is widely used in modern high-performance computing systems. On this network, however, interference caused by network sharing can lead to significant network congestion and degraded performance. In this work, we present a comparative analysis of intra-application interference on applications with nearest neighbor communication, considering various placement strategies. Our results...
Dynamical technical networks and dynamic network objects (DNO) as a special case of them are considered in many subject areas as objects of research, design, quality assurance, automatization, monitoring and control. In this paper we focus on the simulation of the mine air networks (MAN) as an example of dynamic network objects with distributed parameters. To improve the simulation process, we propose...
There are many techniques used in moving objects detection. Post processing steps including setting an appropriate threshold to differentiate between the foreground and background have a big effect in increasing the detection rate accuracy of these techniques. However, up till now finding an appropriate threshold that is able to adapt itself particularly in scenes with poor visibility has not been...
The paper presents an approach to the synthesis of MV control systems with respect to minimum-energy of the control inputs. Due to the reason, a recently introduced polynomial matrix σ-inverse is applied to LTI nonsquare systems described by discrete-time state-space framework. It is shown that classical minimum-norm right inverse is not sufficient to obtain the minimum-energy of control runs. Thus,...
Recently, there has been much interest in real-time game AI but it has suffered from short response time with uncountable game complexity. If a forward model is available, the Monte-Carlo Tree Search (MCTS) can also be used for the real-time video games. For example, MCTS has dominated the winning entries in the Fighting game AI competitions. However, because of the response time limitation, their...
The emergence of mobile games has caused a paradigm shift in the video-game industry. Game developers now have at their disposal a plethora of information on their players, and thus can take advantage of reliable models that can accurately predict player behavior and scale to huge datasets. Churn prediction, a challenge common to a variety of sectors, is particularly relevant for the mobile game industry,...
With the general and universal fact that many people spend a lot of time on their dressing because in any human society, a person's character and worth is judged based on his/her dressing sense at the first look. There are many difficulties in choosing particular apparel with a complete sense of satisfaction. The main idea of this paper is to help the user to find best outfit according to the current...
With the rapid development of informatization and the popularity of computer application, higher requirements are put forward for computer teaching in university. As one of the basic courses in universitie, “Computer Sience” carried out some reforms in the teaching content, but the teaching method is still based on instruction, supplemented by the computer exercises. The paper puts forward the blended...
Program invariant is formal description of properties that should hold at certain program location in every valid execution. It is very useful for program analysis and verification. In this paper, we introduce an abstraction interpretation approach for generating program invariant efficiently and precisely. A polynomial interval domain is proposed for representing abstract state and precise loop effect...
This paper presents rough set model under different granular computing, and compares the model under combined granular with that under single granular, also with rough set model under logical computing of granule. Results show that combination granule and logical computing of granule construct a chain, which will lay a foundation for knowledge acquisition based on information granule and induction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.