The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Long Running Workflow (LRW) is a particular kind of workflow that lasts for hours, days, or even weeks to complete its execution. The long duration is directly associated to the nature of certain business processes, such as to get a home mortgage or obtain the money related to a car insurance. LRWs are usually deployed in execution environments specially designed to support their inherent characteristics...
Energy transformation from Renewable Energy Systems implies the availability of efficient devices: among these transformers play a central role. An effective model describing their input/output behaviour which takes into account the phenomena involving energy dissipation such as hysteresis, is an aspect that plays a central role. The procedure for modeling nonlinear systems based on the so-called...
In this paper, we propose a generic and efficient method for real-time specular reflections detection in images. The method relies on a new thresholding technique applied in the Hue-Saturation-Value (HSV) color space. A detailed experimental study was conducted in this color space to highlight specular reflections' properties. Current state-of-the-art methods have difficulties with lighting jumps...
In recent years, a number of works have studied methods for computing the Fourier transform in sub linear time if the output is sparse. Most of these have focused on the discrete setting, even though in many applications the input signal is continuous and naive discretization significantly worsens the sparsity level. We present an algorithm for robustly computing sparse Fourier transforms in the continuous...
Computer networks serve as critical infrastructure to services in business, health care, and education. Targeted attacks and random failures may cause link or node removals, which in turn can cause significant disruption to the availability of network services. Designing a network topology to provide acceptable levels of service in the face of these challenges can save both lives and money. A number...
While there are several promising approaches for visual object recognition the application of lightweight devices under varying image conditions and using low quality images still causes lots of problems to be solved. We introduce a new retrieval mechanism including standard orientation sensors helping the visual recognition process. We apply a view based model of the objects and the matching of the...
A local tester for a code probabilistically views a small set of coordinates of a given word and based on this local view accepts code words with probability one while rejecting words far from the code with constant probability. A local tester for a code is said to be "robust" if the local views of the tester are far from acceptable views when the word being tested is far from the code....
Own method of embedding information in still pictures was synthesized. New algorithm used additional blocks of cropping and stability under the previous image processing. This ensured the reliability of the system and increased the probability of correct recognition of embedded data. The complex analysis of the most relevant data hiding methods by multiobjective optimization was done. Also the comparative...
In the area of computer vision, pattern recognition and image processing, image match is a research hotspot with important theoretical significance and practical value. Recently, the image matching algorithm based on SIFT has drown wide attention for its outstanding local feature matching performance. In view of high computation complexity, poor anti-noise ability, and difficulty for practical use...
Class discovery, which aims to identify the underlying category structure, is an important issue in pattern recognition and knowledge discovery. The key task in class discovery is to estimate the number of classes. Classical estimation approaches usually face the problems of low accuracy, high complexity, or difficulty in choosing an appropriate penalty function. In this paper, an effective class...
Either any of the current global or non-local stereo matching algorithms cannot be good enough to show both matching accuracy and calculation efficiency during the matching processing, especially while there are less texture regions or the images are captured from real scene. Therefore, the goal of our research is to break current bottleneck of stereo matching in aspects of the precision and speed,...
Resource allocation, in terms of balancing supply and demand, is a common problem in many mission-critical systems, such as smart grids. If the participants' contribution is subject to inertia, they have to solve the problem for a specific time span in advance, that is, create schedules on the basis of demand predictions. To improve the system's stability, the participants not only have to anticipate...
We consider the problem of recovering a sparse covariance matrix Σ∈ℝn×n from m quadratic measurements yi = aiTΣai+wi, 1 ≤ i ≤ m, where ai ∈ ℓn is a measurement vector and wi is additive noise. We assume that ℝ has K non-zero off-diagonal entries. We first consider the simplified noiseless problem where wi = 0 for all i. We introduce two low complexity algorithms, the first a “message-passing” algorithm...
Modern cellular networks utilizing the long-term evolution (LTE) set of standards face an ever-increasing demand for mobile data from connected devices and header compression is employed to minimize the overhead for IP-based cellular network traffic. In this paper, we evaluate the three implementations of header compressions used by these networks with respect to their potential throughput increase...
Infants are curious learners who drive their own cognitive development by imposing structure on their learning environments as they explore. Understanding the mechanisms underlying this curiosity is therefore critical to our understanding of development. However, very few studies have examined the role of curiosity in infants' learning, and in particular, their categorization; what structure infants...
A number of open cyber-security challenges are arising due to the rapidly evolving scale, complexity, and heterogeneity of modern IT systems and networks. The ease with which copious volumes of operational data can be collected from such systems has produced a strong interest in the use of machine learning (ML) for cyber-security, provided that ML can itself be made sufficiently immune to attack....
A critical step in the control design of industrial processes is the Control Configuration Selection (CCS), where each actuator is grouped with a set of measurements to be used in the computation of its control action.
In this paper, we present framing and multiple-physical layer pipe (PLP) structures for layered division multiplexing (LDM)-based next generation terrestrial broadcasting systems. As a framing structure, single-layer frames and multi-layer frames can be simultaneously transmitted by a time division multiplexing (TDM) approach. In addition to a conventional multiple-PLP strategy, which is basically...
A new methodology for designing robust and efficient state-feedback control laws for a switched-mode boost DC-DC power converter has been recently proposed. This approach has adopted the so-called stabilizing or Lyapunov-based control paradigm which is well-known in the area of energy-based control of DC-DC converters, whereby the control law takes a state-feedback form parameterized by a positive...
The main operation in RSA encryption/decryption is the modular exponentiation, which involves a long sequence of modular squarings and multiplications. In this paper, we propose to improve modular multiplications AB, AC which have a common operand. To reach this goal we modify the Montgomery modular multiplication in order to share common computations in AB and AC. We extend this idea to reduce the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.