The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information about spatial correlation of the particles in nonideal systems is of great interest in various fields of science and technique. This information is necessary for calculation of various thermodynamic and transport characteristics on a base of known formulas of statistic physics. The pair correlation functions were studied experimentally for quasi-two-dimensional (2D) non-ideal systems....
This paper presents a new method on generating realistic human animation of various styles with given step constraints and a specific skeleton. Given a set of normal walking data captured from different subjects, a hierarchical geostatistical model is automatically learned to encode variety of walking styles by representing human body as a hierarchy of joint groups. For each child hierarchy level,...
A reliability and reliability-based sensitivity analysis on mechanical parts with multiple failure modes is carried out in the proposed paper. Due to the unknown distributions of random variables, the first order second moment method are utilized to calculate the reliability of each failure mode. According to the characteristic that only a few failure modes occur when the parts fail, only the first...
Server consolidation has emerged as an important technique to save on energy costs in virtualized datacenters. The issue of instantiation of a given set of Virtual Machines (VMs) on a set of Physical Machines (PMs) can be thought of as consisting of a provisioning step where we determine the amount of resources to be allocated to a VMand a placement step which decides which VMs can be placed together...
In this paper, a new nonlinear generalization of linear canonical correlation analysis (LCCA) is derived. This framework, called measure transformed canonical correlation analysis (MTCCA), applies LCCA to the considered pair of random vectors after transformation of their joint probability distribution. The proposed transform is structured by a pair of nonnegative functions called the MT-functions...
This paper introduced the extension method and established a danger evaluation matter-element model based on debris flow surveying data of Miyun county. The research indicates that it is reasonable and feasible for using extension method in danger division of valley debris flow. It can reflect each factor's influence on danger of valley debris flow. This paper used simple correlation function to determine...
Extracting and labeling sulcal curves on the human cerebral cortex is important for many neuroscience studies, however manually annotating the sulcal curves is a time-consuming task. In this paper, we present an automatic sulcal curve extraction method by registering a set of dense landmark points representing the sulcal curves to the subject cortical surface. A Markov random field is used to model...
Noise and the weak cross-correlation peaks are two obstacles in the image recognition system based on joint-Fourier transform correlator. A histogram based filter is proposed to remove noise and amplify cross-correlation peaks. The experiment results illustrate this method is simple, fast but effective.
This paper explores the use of Orient specks as on-body network of wireless inertial-magnetic sensors to capture the parameters of the human gait for mobile clinical gait analysis. A range of kinematic and temporal parameters were measured for normal humans using Orient specks and compared to values obtained from a commercial Vicon optical motion capture system. There was a good correlation between...
Outlier mining is a major task in data analysis. Outliers are objects that highly deviate from regular objects in their local neighborhood. Density-based outlier ranking methods score each object based on its degree of deviation. In many applications, these ranking methods degenerate to random listings due to low contrast between outliers and regular objects. Outliers do not show up in the scattered...
Investigating potential dependencies in data and their effect on future business developments can help experts to prevent misestimations of risks and chances. This makes correlation a highly important factor in risk analysis tasks. Previous research on correlation in uncertain data management addressed foremost the handling of dependencies between discrete rather than continuous distributions. Also,...
We consider the problem of recovering a set of correlated signals (e.g., images from different viewpoints) from a few linear measurements per signal. We assume that each sensor in a network acquires a compressed signal in the form of linear measurements and sends it to a joint decoder for reconstruction. We propose a novel joint reconstruction algorithm that exploits correlation among underlying signals...
Inspired from non-equilibrium statistical physics models, a general framework enabling the definition and synthesis of stationary time series with a priori prescribed and controlled joint distributions is constructed. Its central feature consists of preserving for the joint distribution the simple product structure it has under independence while enabling to input controlled and prescribed dependencies...
This paper focuses on the performance of a Wyner-Ziv coding scheme for which the correlation between the source and the side information is modeled by a hidden Markov model with Gaussian emission. Such a signal model takes the memory of the correlation into account and is hence able to describe the bursty nature of the correlation between sources in applications such as sensor networks, video coding...
We present the design of a joint source-channel decoder by modifying the IRA code decoder in order to exploit the correlation characteristics of hidden Markov sources. The basic idea is to add factor graph for forward/backward algorithm, which models the Markov source, to the bipartite graph of IRA decoder. We assume that receiver has no apriori knowledge of the correlation characteristics of the...
In this paper, we consider a central estimating officer (CEO) scenario, where sensors observe a noisy version of a binary sequence generated by a single hidden source (the phenomenon). Distributed source coding is not used; rather, the correlation is exploited at the access point (AP), whose goal is to estimate, by properly fusing the data received through AWGN or block fading channels, this sequence...
We consider the problem of code design for compression of correlated sources under adversarial attacks. A scenario with three correlated sources is considered in which at most one source is compromised by an adversary. The theoretical minimum achievable sum-rate for this scenario was derived by Kosut and Tong. We design layered LDPC convolutional codes for this problem, assuming that one of the sources...
In this paper, we re-formulate an issue related to wireless mesh networks (WMNs) from a Chief Executive Officer (CEO) problem viewpoint, and provide a practical solution to a simple case of the problem. The problem is described as follows: an originator broadcasts its binary source information to several forwarding nodes over Binary Symmetric Channels (BSC); the originator's source information suffers...
Joint diagonalization of a series of non-negative Hermitian matrices is one of important techniques in the fields of signal processing, such as blind source separation based on second order statistics. In our previous works, we introduced a closed-form solution of a joint diagonalizer of non-negative Hermitian matrices and also proposed a method for improving the performance of the solution for the...
Operation of the power systems with high wind penetration is significantly influenced by wind variability and uncertainty. This paper examines the potential impact of distributed wind generation on operating reserve requirements in the IEEE 24-bus system. Wind and load are stochastically modeled using actual data from a balancing authority. Probabilistic optimal power flow based on the two point estimate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.