The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
External knowledge sources are commonly used in processing large amounts of data. Large external knowledge sources, such as ontologies, often contain hundreds of thousands of concepts and relationships, making comprehension and navigation difficult. Abstraction networks enhance the usability and comprehensibility of these resources by providing a higher level of abstraction. In this paper, we develop...
The deceleration of transistor feature size scaling has motivated growing adoption of specialized accelerators implemented as GPUs, FPGAs, ASICs, and more recently new types of computing such as neuromorphic, bio-inspired, ultra low energy, reversible, stochastic, optical, quantum, combinations, and others unforeseen. There is a tension between specialization and generalization, with the current state...
In this work, we present an interactive musical game for children, developed using the Unreal Engine 4, with gestural control using the Leap Motion device. To each musical note is assigned a specific gesture to be played with the hand and fingers, so that a virtual puppet can dance according to the music, stimulating the improvement of motor control of children while playing, as well as the learning...
In this paper, we propose intuitionistic linguistic vector (ILV) as a tuple of intuitionistic linguistic numbers (ILNs). ILV can describe information which involves multiple linguistic terms according to different intuitionistic fuzzy values. Similarity measures for ILNs and ILVs are also given. The novel concepts are used to construct a classification algorithm (Intuitionistic Fuzzy Linguistic Vector...
Context: A growing number of software organizations have been adopting Continuous DElivery (CDE) and Continuous Deployment (CD) practices. Researchers have started investing significant efforts in studying different aspects of CDE and CD. Many studies refer to CDE (i.e., where an application is potentially capable of being deployed) and CD (i.e., where an application is automatically deployed to production...
Pairwise surface rigid registration aims to find the rigid transformation that best register two surfaces represented by point clouds. This work presents a comparison between seven algorithms, with different strategies to tackle rigid registration tasks. We focus on the frame-to-frame problem by using both point clouds and a RGB-D video stream in the experimental results. The former, is considered...
This paper investigates the H2 control problem for a class of periodic Markov jump systems with repeated scalar nonlinearities. Under the assumption on the nonlinear function and the framework of positive definite diagonally dominant Lyapunov function method, a sufficient condition is given to ensure the stochastic stability of the closed loop system with a prescribed H2 performance index. By the...
This paper studies the static output-feedback control in a class of linear networked control systems and an improved adaptive event-triggered strategy is designed to save the limited network bandwidth. Different from the existent methods, the proposed event-triggered strategy can relax the assumption of the prior works that the threshold of event-triggered communication scheme is a preselected constant...
This paper addresses the robust non-fragile leader-following consensus problem for multi-agent systems against state-dependent uncertainties and controller coefficient variations. Without the requirement of knowledge of uncertainties of agents and controllers, adaptive distributed controllers are constructed to guarantee the follower agents tracking the leader agent. Asymptotic consensus results of...
This paper investigates the semi-global practical stabilization for second-order nonlinear systems subject to unknown control coefficients and completely unknown nonlinear function. In order to achieve the control objective, a state feedback controller is firstly constructed to ensure that systems under consideration satisfy uniform Lyapunov property. Then, based on output feedback domination method,...
Computational methods for post-translational modification (PTM) site prediction play important roles in protein function studies and experimental design. Most existing methods are based on feature extraction, which may result in incomplete or biased features. Deep learning as the cutting-edge machine learning method has the ability to automatically discover complex representations of PTM patterns...
Objective: To investigate the neuroprotection effect of the combination of astragalus membranaceus and ligustrazine on thrombolysis after ischemic stroke and explore its mechanism basing on the Notch signaling pathway. Materials and methods: Focal cerebral ischemia models were induced by autologous thrombus of middle cerebral artery occlusion (MCAO). Male Sprague-Dawley (SD) rats were randomly divided...
The hashtag recommendation problem addresses recommending (suggesting) one or more hashtags to explicitly tag a post made on a given social network platform, based upon the content and context of the post. In this work, we propose a novel methodology for hashtag recommendation for microblog posts, specifically Twitter. The methodology, EmTaggeR, is built upon a training-testing framework that builds...
Recommender systems take inputs from user history, use an internal ranking algorithm to generate results and possibly optimize this ranking based on feedback. However, often the recommender system is unaware of the actual intent of the user and simply provides recommendations dynamically without properly understanding the thought process of the user. An intelligent recommender system is not only useful...
The blooming availability of traces for social, biological, and communication networks opens up unprecedented opportunities in analyzing diffusion processes in networks. However, the sheer sizes of the nowadays networks raise serious challenges in computational efficiency and scalability. In this paper, we propose a new hyper-graph sketching framework for influence dynamics in networks. The core of...
Background: Software security has drawn immense importance in the recent years. While efforts are expected in minimizing security vulnerabilities in source code, the developers' practice of code cloning often causes multiplication of such vulnerabilities and program faults. Although previous studies examined the bug-proneness, stability, and changeability of clones against non-cloned code, the security...
Context: Free/Libre Open Source Software (FLOSS) communities consist of different types of contributors. Core contributors and peripheral contributors work together to create a successful project, each playing a different role. One-Time Contributors (OTCs), who are on the very fringe of the peripheral developers, are largely unstudied despite offering unique insights into the development process....
Environmental monitoring and management are activities of global importance. The digital data from sensors in real time that plays important role in order to provide effective ecological monitoring.
In recent years, recommender systems are widely applied in e-commerce system to help users locating their interested information. However, the "all good reputation" problem brings down the accuracy of recommender systems. In addition, users' social network can benefit the recommendation especially when dealing with cold-start scenarios. In this paper, a novel trust-aware recommendation approach...
The Internet of Things is one of the trending technologies wherein connecting any device to the Internet and control power to any appliance and in addition possess capability of connecting those appliances to each other in creating a network. In this work, a WiFi enabled micro-controller is interfaced with few sensors like ADXL335, a 3-axis accelerometer for sensing tilt of the object, motion, vibration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.