The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most algorithms for identifying multiple rumor or infection sources require prior knowledge of the number of sources, or at least an upper bound on the number of sources. In this paper, we consider a deterministic Susceptible-Infected (SI) spreading model in which infection at different source nodes may start at different times. We introduce the concept of a minimal and linear cover of the infection...
We consider the problem of finding feature correspondences among a collection of feature sets, by using point-wise unary features. This is fundamental in computer vision and pattern recognition, which also relates to areas e.g. operational research. Different from two-set matching which can be transformed to a quadratic assignment programming task that is known NP-hard, inclusion of merely unary attributes...
Blur is a common artifact in video, which adds more complexity to text detection and recognition. To achieve good accuracies for text detection and recognition, this paper suggests a new method for classifying blurred and non-blurred frames in video. We explore quality metrics, namely, BRISQUE, NRIQA, GPC and SI, in a new way for classification. We estimate the values of these metrics with the help...
The properties of random graphs provide insight into the behavior of real-world complex networks. One such property is the Typical Distance, which characterizes the time required to traverse the network. For example, the Typical Distance measures how fast a virus spreads through a population. The probability that the Typical Distance is large is difficult to estimate via crude Monte Carlo. We propose...
Clinical data records a patient's health status, where multi-label type of data exists. For example, a patient suffering from cough and fever should be associated with both two disease labels in the clinical records. Specifically, due to the redundant or irrelevant features in clinical data, the performance of multi-label classification will be limited, therefore selecting effective features from...
The prosperous growth of the Internet-of-Things industry attracts numerous interests in employing edge clouds (a.k.a. cloudlets) to enhance the performance of mobile services and applications. Most existing research has been focused on offloading computational tasks from mobile devices to a single cloudlet or a central location, yet overlooked the issue of jointly coordinating the offloaded tasks...
Physically meaningful and easy-to-use analytical predictive stress models are developed for a through-silicon-via (TSV) design using theory-of-elasticity based approach. Two extreme cases of the TSV height-to-diameter ratios are considered: disc-like vias, with the aspect ratios below 0.25 (plane stress approximation can be employed in this case), and rod-like-vias, with aspect ratios, above 2.5 (plane...
In this paper, we have developed a new heuristic algorithm for three machines flowshop scheduling problem using five parameters together. The parameters, which we have used in this paper, are separate setup times, transportation times, Job block, weight of job and specified rental policy. The main aim to introduce this algorithm is to obtain the optimal sequence to minimize the makespan, utilization...
The ability to share services and information between departments, partners, customers and other stakeholders of the company's ecosystem is one of the major advantages of cloud computing. The effective deployment of a cloud must be built around the secure and efficient management of user access to resources and data protection against unauthorized disclosure. The Privacy element concerned the protection...
In this paper, the generation and control turbulence in a wind tunnel, for design, analysis and testing of wind turbines is proposed. The designed wind turbines will be focused for domestic use. Modifications to the wind tunnel are made in order to generate the turbulences in the test chamber. Specifically, for the turbulence analysis, the reflective symmetry concept is used to group the different...
Experience and observations indicate that students often work on problem sets at hours outside those traditionally scheduled for office hours, tutoring, and supplemental instruction (SI). Moreover, their tendency is to focus their effort the night before the assignment is due. Add to this the complexity of a distributed university where students are taking engineering courses towards their degree...
The article shows the development and evaluation of Learning Styles Fuzzy Questionnaire — FuzzyILS, based on Felder and Silverman Learning Style Model and as an alternative fuzzy to ILS Questionnaire (test) created by Felder and Soloman. The proposal came from author's previous works, where they created a method for developing Learning Objects appropriate to the students' learning styles, and where...
In this paper, we evaluate the quality (Q) factor and the resonance frequency of a double paddle oscillator (DPO) with different thickness using analytical, computational and experimental methods. The study is carried out for the 2nd anti-symmetric resonance mode that provides extremely high experimental Q factors on the order of 105. The results show that both the Q factor and the resonance frequency...
Remaining useful life (RUL) prediction is a key link in prognostics and health management. More accurate RUL prediction results will lead to more reasonable decision making on sequential management activities including maintenance, replacement, spare parts ordering, etc. In engineering practice, many products exhibit more volatile degradation paths when they have high degradation rates. By this observation,...
We investigated why the blocking voltages of a power device are lowered during a durability test through a device simulation called Technology Computer Aided Design (TCAD) and measurements using the optical beam induced current (OBIC) method. We found that the spread of the depletion layer caused by the bonding wire is what decreased the blocking voltage.
In linear programming, the transportation problem is one of the most important and successful applications of quantitative analysis for solving business problems in products distribution. Basically, the aim is to minimize the cost of shipping goods from one location to another, so that the needs of each arrival area are met and every shipping location operates within its capacity. This paper presents...
In this work, we have performed first-principles density functional theory (DFT) based, self-consistent device simulations for Si nanowire field effect transistors (NW FETs) of cross-section up to 3.24 nm. Through mode space transformation, non-orthogonal DFT Hamiltonian and overlap matrices are reduced in size from a few thousands to around one hundred. Ultra-efficient quantum-mechanical transport...
The effects of very high ion flux and very large ion beam current need to be investigated if very high ion flux is to be considered as a method of throughput increase for high-current ion implantation. In this work, Synopsys TCAD Sentaurus was used to simulate As ion implantation in order to obtain silicon amorphization and dopant distribution data. The TEM images are consistent with TCAD simulation...
Quantum-well infrared photodetectors (QWIPs) have become research focus in recent years due to its many inherent properties. However, the measurement of internal parameters is very difficult; instead, computer simulation and device modeling provide a better way to analyze quantum structure devices. In order to solve this issue, the electronics performance and the optical performance of a QWIP fabricated...
Many critical infrastructures are composed of multiple systems of components which are correlated so that disruptions to one may propagate to others. We consider such infrastructures with correlations characterized in two ways: (i) an aggregate failure correlation function specifies the conditional failure probability of the infrastructure given the failure of an individual system, and (ii) a pairwise...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.