The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This keynote presentation covers the chronological development of power electronics, few applications of power electronics, the importance of power electronics, the trends in power electronics, the trends in power semiconductor devices and the challenges in power electronics
A sufficient data length can play an important role in a proper estimation drought index, leading to a better appraisal for drought risk reduction. The South Central Region of Vietnam is one of drought prone areas but it has poor data conditions. A collection of meteorological data in the study area during a period of 38 years 1977–2014 found out a fact that there existed missing values in 10 out...
Despite a decade of active research, there has been a marked lack in clone detection techniques that scale to large repositories for detecting near-miss clones. In this paper, we present a token-based clone detector, SourcererCC, that can detect both exact and near-miss clones from large inter-project repositories using a standard workstation. It exploits an optimized inverted-index to quickly query...
Given the availability of large source-code repositories, there has been a large number of applications for large-scale clone detection. Unfortunately, despite a decade of active research, there is a marked lack in clone detectors that scale to big software systems or large repositories, specifically for detecting near-miss (Type 3) clones where significant editing activities may take place in the...
Aiming at the problem of expert weighting in group decision making, an expert weighting method based on D-S evidence theory is studied. Three ways such as the distance, grey correlation and the combination of these two methods are used to measure the deviation degree of the experts' opinions on the scheme, construct mass function based on this, and uses the D-S synthesis rule to carry on the information...
The second generation Audio-video Coding Standard (AVS2) is the latest video standard currently under the development of Audio-video Coding Standard (AVS) Workgroup of China for achieving higher coding efficiency than previous (AVS1). In intra luminance prediction of AVS2, the AVS2 video encoder has to compute the rate-distortion optimization (RDO) of 9 selected candidate prediction modes in order...
The ionospheric irregularities on St. Patrick's day (17 March 2015) at Chiang Mai and Chumphon stations are affected by the strongest of the 24th solar storm cycle. The ionogram data in this research is obtained from the frequency modulated/carrier waves (FM/CW) ionosonde at Chiang Mai station and near the magnetic equator, namely, Chumphon station. The parameters in this research include the critical...
In order to comprehensively and quantitatively evaluate the cooling performance of the refrigerator, a model for evaluating refrigerator cooling performance was designed. The model selected several key parameters of the refrigerator cooling process as the evaluation index, and assigned its set value, base deviation and weight coefficient, calculated the deviation proportion of each evaluation index,...
Unknown global permutation of the separated sources, time-varying source activity and under determination are common problems affecting on-line Independent Vector Analysis when applied to real-world speech enhancement. In this work we propose to extend the signal model of IVA by introducing additional supervising components. Pilot signals, which are dependent on the sources, are injected in the multidimensional...
We address the learning problem for infinite state Hidden Markov Models (HMMs) with preferential attachment dynamics. Preferential attachment describes a “rich get richer” process causing the HMM self transition probabilities to be proportional to the number of previous self transitions. Furthermore, the length of stay of the process in a particular state follows the Yule-Simon distribution. In describing...
Phaseless super-resolution refers to the problem of super-resolving a signal from only its low-frequency Fourier magnitude measurements. In this paper, we consider the phaseless super-resolution problem of recovering a sum of sparse Dirac delta functions which can be located anywhere in the continuous time-domain. For such signals in the continuous domain, we propose a novel Semidefinite Programming...
This paper considers the problem of estimating an unknown high dimensional signal from (typically low-dimensional) noisy linear measurements, where the desired unknown signal is assumed to possess a group-sparse structure, i.e. given a (pre-defined) partition of its entries into groups, only a small number of such groups are non-zero. Assuming the unknown group-sparse signal is generated according...
For the fast and exact computation of spherical harmonic transform (SHT) of a band-limited signal defined on the sphere from its samples, the Gauss-Legendre (GL) and equiangular sampling schemes on the sphere require asymptotically least number of samples. In comparison to the equiangular scheme, the GL scheme has larger spatial dimensionality, defined as the number of the samples required for the...
The paper presented a systematic evaluation of the weight sparsity regularization schemes for the deep neural networks applied to the whole brain resting-state functional magnetic resonance imaging data. The weight sparsity regularization was deployed between the visible and hidden layers of the Gaussian-Bernoulli restricted Boltzmann machine (GB-RBM), in which the L0-norm based non-zero value ratio...
In this paper, different indicators are employed for modeling the propagation and estimating different wireless channel profiles. The measurements are accomplished in a modern laboratory/office building in which different line-of-sight (LOS) and non LOS (NLOS) are accomplished. The comparison between different wireless indicators is made in terms of standard error (Se). This analysis is focused on...
In PKC 2014, Langlois et al. proposed the first lattice-based group signature scheme with the verifier-local revocability. The security of their scheme is selfless anonymity, which is weaker than the security model defined by Bellare, Micciancio and Warinschi (EUROCRYPT 2003). By using the technique in the group signature scheme proposed by Ling et al. (PKC 2015), we propose a group signature scheme...
This paper studies the current evaluation methods for Machine Translation (MT), and reveals their core evaluation techniques. Through the comparative analysis on the differences of MT evaluation methods, this paper points out the present MT research difficulties and hotspots, and makes a qualitative review on the future MT evaluation research direction. In general, there are still some shortcomings...
FACTS devices can enable a line to carry its flow close to rating capacity and consequently can improve the power system security even in contingency and over loaded network. An opposition-based modified differential evolution algorithm is proposed to solve the OPF problem under different operating conditions for enhancement of power system performance with a SSSC device. The best location of SSSC...
This study proposes an innovative method to measure the variation of cell leakage current. Extreme cell leakage determines DRAM refresh time (tREF). Although the average leakage current from the test element group (TEG) has been the only index for determining cell leakage, it does not provide the distribution of unit cell leakage. We find that cell leakage distribution can be calculated from the slope...
The recent growing interest on highly-available data-intensive applications sparked the need for flexible and portable storage technologies, e.g., NoSQL databases. Unfortunately, the lack of standard interfaces and architectures for NoSQLs makes it difficult and expensive to create portable applications, which results in vendor lock-in. Building on previous work, we aim at providing guaranteed fault-tolerant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.