The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Mayan binary multiplier is an architecture to simplify and optimize the multiplication implemented in FPGAs. This architecture is based on the Maya multiplication method or Tzeltal. The architecture takes advantage of the parallelism of FPGAs grouping multipliers for generating the partial products. The multiplication is accelerated by decreasing the number of sums to be performed. This new approach...
An ultra-broadband 16-channel mode division (de)multiplexer (MDM) based on densely packed bent waveguide arrays (DPBWAs) is experimentally demonstrated. The scheme is realized by using bent waveguides with different radius. The fabricated device, which consists of a multiplexer, DPBWAs, and a demultiplexer, exhibits insertion losses that are < 1 dB and crosstalk that is < −20 dB over an ∼ 80...
In this paper, we propose a segmentation method based on normalized cut and superpixels. The method relies on color and texture cues for fast computation and efficient use of memory. The method is used for food image segmentation as part of a mobile food record system we have developed for dietary assessment and management. The accurate estimate of nutrients relies on correctly labelled food items...
In this work, we propose a multi-view temporal video segmentation approach that employs a Gaussian scoring process for determining the best segmentation positions. By exploiting the semantic action information that the dense trajectories video description offers, this method can detect intra-shot actions as well, unlike shot boundary detection approaches. We compare the temporal segmentation results...
Over recent years, many Private Information Retrieval (PIR) schemes have been designed aiming for computational efficiency and overall real-world practicality. In particular, some preprocessing techniques have been studied to reach those goals. Our main contribution is a new preprocessing technique that reduces overall computation and communication and allows the client and server to share some of...
Although shock index, as the ratio between heart rate and systolic blood pressure, is a well-recognized predictor for adverse outcomes, it is seldom integrated into clinical evaluation procedures as it requires on-the-fly evaluation of multiple terms. In this paper, we investigate the prevalence of elevated shock index in emergency department patients through an analysis of automatic heart rate and...
The fault rate of offshore wind turbines is so high that it is necessary to build a reliable condition monitoring system to improve the maintenance efficiency. To adapt to the harsh operating environment of offshore wind turbine, the condition monitoring system should have good self-healing ability. In this paper, the condition monitoring system of offshore wind turbine is built based on wireless...
Clustering is part of data mining. Clustering is used to group objects so that one group has the same characteristics. K-means widely used because it is relatively easy to use. However K-means has shortcomings. K-means depends on the initial centroid. Selection of initial centroid done randomly so that the cluster formed is often not optimal. The clustering results are sometimes good and sometimes...
Numerous security incidents caused by malwaresand hackers have recently utilized anti-forensic techniquesto bypass analysis and detection. It is critical to build aknowledge base that would help understand such anti-forensictechniques. In this paper, we present a forensic analysis methodto detect an anti-forensic technique which leverages timestampmanipulation in NTFS file system. Our approach analyzeshow...
Graphene field-effect transistor (FET) has been successfully demonstrated for terahertz (THz) detection at room temperature. This graphene FET has a differential feeding structure and a high output impedance up to several thousand Ohms. These characteristics significantly challenge the antenna design, especially a high-performance antenna. To alleviate this issue, this paper presents a circularly...
This paper proposes a new approach for finding the minimum number of post-contingency corrections to relieve overload. The security-constrained optimal power flow (SCOPF) problem with AC power flow constraints can be formulated as mixed integer nonlinear programming (MINLP), which is an NP-hard problem. A two-stage approach—screening and detailed analysis—is utilized to solve the non-convex MINLP...
Nowadays there are more than 10 billion sensors in the Internet of Things. These sensors will produce a mass of historical data as time goes on. And these data are useful in data mining and may create great value for human. However, historical sensor data are hard to archive because they have the characteristics of mass, complexity, isomerism and dynamic nature. Therefore, how to archive historical...
Mining spatial co-location pattern is one of the most important researches in the field of spatial data mining. In the past researches, many spatial co-location pattern mining algorithms and the expansions about these algorithms have been proposed. However, some of these methods often produce a large number of patterns which are difficult to use. If we want to use the subset of the prevalent co-location...
We analyze a model of learning and belief formation in networks where agents attempt to maximize their state-dependent utilities by their choice of actions, while being unaware of the true state. They do so by making rational inferences about their observations which include a sequence of independent and identically distributed private signals as well as the decisions of their neighboring agents at...
IP lookup plays a significant role in networking. The rapid development of the Internet brings new challenges to IP lookup in recent years. To deal with these challenges, we propose the first algorithm that we are aware of to use Minimal Perfect Hash (MPH) filters in IP lookup. It achieves the information theoretic optimum on-chip memory storage and O(1) worst case on-chip lookup speed. To overcome...
Electricity grids around the world are undergoing a fundamental transformation, thanks to the modernization of electricity distribution systems including smart meter deployment and applications. Data generated by smart meters provides a wealth of information that can help better understand and optimize the operation of electricity networks. This paper proposes a novel Hybrid Load Profile Clustering...
This paper investigates how to improve the performance of Human-Machine Interface systems using surface electromyogram (sEMG) signals to detect human intention in the forearm muscles. Our goal is to make a robust bionic interface that can interact with computers or robots with human motion. Since recognition performance is highly sensitive to the number and the types of target motions to classify,...
The electrical properties of polysilicon on insulator thin films (with a thickness 30–100 nm), which define a wide range of applications in electronic devices, were studied. Polysilicon thin film transistors are manufactured by a standard cheap technology that makes possible a mass production of semiconductor devices. The effective carrier mobility and state density in polysilicon thin film grown...
Perfect corporate governance structure has a positive effect to the accounting information disclosure, accounting information disclosure is helpful to improve corporate governance and the transparency of the operation and management. By the Shenzhen manufacturing industry in 2005–2014 sample firms Logistic regression analysis, the results showed that the proportion of the first big shareholders, shares...
Previously, queries on spatial data involves, finding nearest neighbor from the current location and also finding locations in given range, so called range queries involves condition or predicate on geometric objects. Many applications today, call a new form of queries which comes with a condition on their spatial data, i.e. location and also conditions on their text attached to locations. Instead...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.