The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of this paper is the simultaneous minimization of model error and model complexity for the Choquet integral. The Choquet integral is a generator function, that is, a parametric function that yields a wealth of aggregation operators based on the specifics of the underlying fuzzy measure (aka normal and monotonic capacity). It is often the case that we desire to learn an aggregation operator...
Nowadays energy efficiency and its various aspects has been taken into consideration significantly. Also, non-linear loads have been increasing tragically while absence of supervision on their harmonic contents are quite obvious. These loads are extensively used in residential and commercial parts. Such a widely use of non-linear loads are in building lighting structure when Compact Fluorescent Lamps...
On behalf of the FGCT 2015 conference, the program committee has the pleasure to welcome the attendees to participate in the Fourth edition of the International Conference on the Future Generation Communication Technologies (FGCT 2015) which is dedicated to addressing the challenges in computing technologies for the new generation.
DNA computing has attracted the eyes of many researchers in recent years to solve NP-complete problems. It over-performs conventional computers due to its inherent massively parallelism nature. But to make it generally applicable, problems those are very much implement able on conventional computers, should also be implement able on a DNA computer. To implement those problems, data structures are...
This paper proposes a novel extension on Non-negative Matrix Factorization (NMF) scheme for the separation of single channel speech mixtures, where we impose a post-sparse model on the original weight matrix derived from a previously proposed coherence-constrained NMF model. The approach considers both the modeling ability of NMF basis functions for each source as well as the ability of these basis...
Recently, Big Data processing is becoming a necessary technique to efficiently store, manage, and analyze massive data obtained by social media contents. NoSQL is one of databases that efficiently handle Big Data compared to the traditional database that has the limitation to manipulate Big Data. Log-structured key/value store, widely used in NoSQL, basically stores data into the disk storage in batch...
Mobile learning is potential and valuable in education. However, most of previous developing strategies of m-learning were analyzed by means of individual knowledge, experience, judgment, and statistic software. Although these methods provide systematic steps for the implementation of m-learning strategies, the correlation between factors cannot be considered thoroughly through the steps, and it is...
Response effect assessment of Internet public opinion is a very important aspect of Internet public opinion response. It can summarize the response and handling works of public opinion and make it clear to the advantages and disadvantages during the process, and then provide guidance to future work. This paper presents assessment program for response effect of Internet public opinion used AHP and...
Most Vehicular Ad-hoc Network (VANET) applications require the delivery of a variety of content to vehicles. Furthermore, content in such applications is usually geo-localized (i.e., designated to a specific region of interest). To help with the delivery of geo-localized content in VANET applications, content replication strategies can be exploited to keep content available where the interested vehicles...
Hybrid inorganic-organic solar cells using vertically aligned ZnO nanorod array forming a core with nanocrystalline ZnO1−xSx shell integrated with polymeric P3HT+PCBM semiconductor blend are investigated. ZnO nanorod array over SnO2:F coated transparent conductor glass substrates are capped by sulfur chemiplating to create ZnO/ZnO1−xSx core-shell 3-dimensional electron transport electrode nanostructure...
Affective computing research field is growing in large scale with the frequent development of human-computer applications. These applications use information of mental or affective conditions of desired subjects to train their brain responses. Facial impressions, text physiology, vocal and other information about the subjects are used in the classification algorithms. However, the classification frameworks...
Universal quantifier queries on recursive relation are defined as the set of queries that query the database to get pairs of records (r1, r2) from the same relation such that the second record of each pair must intersect with the first record in a set of required attributes. Such query remains to be an interesting type of queries specially today with the appearance of many applications that need them...
The main objective of this paper is a presentation of an improved probabilistic approach for estimating the additional operating reserve in modern power systems with a large share of renewable energy sources. A reliable operation of modern power systems can be ensured by application of the proposed method. Results show that the power-generation reliability in modern power systems and consequently...
Identifying anomalies and contamination in datasets is important in a wide variety of settings. In this paper, we describe a new technique for estimating contamination in large, discrete valued datasets. Our approach considers the normal condition of the data to be specified by a model consisting of a set of distributions. Our key contribution is in our approach to contamination estimation. Specifically,...
A new construction for sector-disk codes and partial MDS codes up to three sector erasures are proposed. In contrast to existing codes, which are based on the design of parity check matrix, our new code is based on the design of generator matrix. This new approach allows us to construct a code that requires a small field size. In particular, for the case when there is only one sector erasure, our...
This paper analyzes the spatial and temporal dynamics of high technology industry of China from 2000 to 2013 by using information entropy, concentration ratio, Theil index, spatial concentration ratio, and Local Moran I index. Revenue from Principal Business of high technology industry data are collected from China statistic yearbooks. The results indicate that the structure and the distribution of...
Proof carrying hardware intellectual property (PCHIP) introduces a new framework in which a hardware (semiconductor) Intellectual Property (IP) is accompanied by formal proofs of certain security-related properties, ensuring that the acquired IP is trustworthy and free from hardware Trojans. In the PCHIP framework, conversion of the design from a hardware description language (HDL) to a formal representation...
Recent advances in embedded devices capabilities and wireless networks paved the way for creating ubiquitous Cyber-Physical Systems (CPS) grafted with self-configuring and self-adaptive capabilities. As these systems need to strike a balance between dependability, open-endedness and adaptability, and operate in dynamic and opportunistic environments, their design and development is particularly challenging...
OpenFlow Switch in Software-Defined Networking (SDN) has changed packet classification from standard 5-tuple to arbitrary many-field. The growing number of fields in a rule and the increasing number of rules in a ruleset poses great challenges for packet classification in terms of performance, storage, and update cost. In this paper, we design a two-stage packet classification system to address those...
The multi-armed bandit (MAB) problem has been an active area of research since the early 1930s. The majority of the literature restricts attention to i.i.d. or Markov reward processes. In this paper, the finite-parameter MAB problem with time-dependent reward processes is investigated. An upper confidence bound (UCB) based index policy, where the index is computed based on the maximum-likelihood estimate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.