The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The nonlinear effect of satellite's high power amplifiers causes the navigation signal distortion of limited bandwidth, which would affect signals in the power spectrum characteristic. This paper gave a signal model based on delay-multiplexing, improved fitting of nonlinear analyzing model (SAM model) on navigation signal. A new method of evaluating nonlinear distortion was presented, which was based...
This paper deals with model comparison based on the Jeffrey's divergence (JD). More particularly, after providing the JD between the joint distributions of k consecutive values of a white noise and the ones of a real moving-average or autoregressive model, the JD between real 1st-order MA and real 1st-order AR models is studied. Except when the 1st MA parameter is equal to 1, we show that, after a...
Many data-driven approaches exist to extract neural representations of functional magnetic resonance imaging (fMRI) data, but most of them lack a proper probabilistic formulation. We propose a scalable group level probabilistic sparse factor analysis (psFA) allowing spatially sparse maps, component pruning using automatic relevance determination (ARD) and subject specific heteroscedastic spatial noise...
Functional magnetic resonance imaging (fMRI) is a powerful tool to analyze brain development and neuronal activity. Identifying discriminative brain regions between various groups within a population has generated great interest in recent years. In this work, we consider the problem of estimating multiple sparse, co-activated brain regions from fMRI observations belonging to different classes. More...
There are several analysis models and corresponding temporal analysis techniques for checking whether applications executed on multiprocessor systems meet their real-time constraints. However, currently there does not exist an exact end-to-end latency analysis technique for Homogeneous Synchronous Dataflow with auto-concurrency (HSDFa) models that takes the correlation between the firing durations...
In this paper, a novel Asymptotic Probability Estimation (APE) method is proposed to estimate the probability of correlated rare failure events for complex integrated systems containing a large number of replicated cells. The key idea is to approximate the failure rate of the entire system by solving a set of nonlinear equations derived from a general analytical model. An error refinement method based...
Vehicle safety airbags can protect occupants from vehicle collisions, but there are still some shortcomings, thus need to be constantly improved. In occupant restraint system simulation, the establishment of a reasonable airbag model determines whether the simulation results are consistent with the actual test results. The aim of this study is to establish a precise airbag model for vehicle occupant...
The efficiency of communication system is the key factor for the operational capability of naval ship. Through analyzing the evaluation index of naval fleet's communication system, a satisfactory-degree based on efficiency evaluation model is founded by applying the grey relational analysis. The steps of the model include gathering index data based on index tree, constituting the reference sequence...
This study proves that as the height of a person increases, his/her sense of power also increases. Moreover, in a population with heavy weight and high socioeconomic status, the height of a person significantly affects his/her sense of power. Findings have confirmed the concept emphasized by embodied cognition theory, i.e., genitive dependence on one's body, which indicates that the psychological...
The modularization strategy can dramatically shorten the lead time and reduce the cost of complex products development, and module partition is the basis of the modularization. In this paper, a complex network module is built to represent the complex product structure, and using interval-valued intuitionistic fuzzy sets to calculate the weights of the edges of the network model are brought to illustrate...
the purpose of this paper is to identify variables important to the acceptance and use of Internet of things by retail employees and to recommend management strategies for effective IoT integration in the retail stores. This study aims to extend the basic technology acceptance model (TAM) by analyzing the impact of trust, perceived behavior control and subjective norm on employee's attitude and behavioral...
With no limit on time and location [1], the number of users attracted by massive open online course (MOOC) has increased rapidly, and many platforms have been built to provide a variety of courses. All of these trigger an explosive growth in data volume. As we known, people have met big data in many areas and proposed many techniques and methods to deal with them. However, people still have no sense...
In this paper, we propose a interactive constrained independent topic analysis in text mining. Independent Topic Analysis (ITA) is a method for extracting the independent topics from the document data by using the independent component analysis. In the independent topic analysis, it is possible to extract the most independent topics between each topic. By extracting the independent topic, it is easy...
We introduce a novel dynamic model for discrete time-series data, in which the temporal sampling may be nonuniform. The model is specified by constructing a hierarchy of Poisson factor analysis blocks, one for the transitions between latent states and the other for the emissions between latent states and observations. Latent variables are binary and linked to Poisson factor analysis via Bernoulli-Poisson...
Link prediction in complex network often focuses on the single network in many fields and develops a lot of methods. However, the relationship between two dependent networks with specific global structure has hardly caught attention, but only the local topology analysis. In this paper, we aim to infer the correlation of two high dimensional dependent networks based on the similar nodes' attributes...
SQL injection is the most common web application vulnerability. The vulnerability can be generated unintentionally by software developer during the development phase. To ensure that all secure coding practices are adopted to prevent the vulnerability. The framework of SQL injection prevention using compiler platform and machine learning is proposed. The machine learning part will be described primarily...
The correlation of interference has been well quantified in Poisson networks where the interferers are independent of each other. However, there exists dependence among the base stations (BSs) in wireless networks. In view of this, we study the interference correlation in non-Poisson networks where the interferers are distributed as a Matern cluster process (MCP) and a second-order cluster process...
Computationally expensive problems pose a serious challenge to the successful application of evolutionary algorithms to complex engineering optimization. To address this challenge, surrogate models, also known as metamodels, are commonly used in lieu of the expensive fitness function for the computational cost of optimization. However, it is nontrivial to choose an appropriate metamodel for properly...
Measures of complex network analysis, such as vertex centrality, have the potential to unveil existing network patterns and behaviors. They contribute to the understanding of networks and their components by analyzing their structural properties, which makes them useful in several computer science domains and applications. Unfortunately, there is a large number of distinct centrality measures and...
Content Delivery Networks (CDN) and their globally dispersed caches host a myriad of User Generated Videos (UGV) to meet end-user requests with quality of service. To efficiently utilize the limited storage of the caches, it is imperative to improve the hit ratio of UGVs. In contrast to the traditional static content, UGV popularity is highly dynamic and dependent on end-user behavior. Therefore,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.