The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Per-cell codebook based limited feedback technique in coordinated multi-point transmission (CoMP) system has received more and more attention due to its flexibility and scalability. In a practical system, as the capacity of backhaul links and the bandwidth of the feedback channels are finite, there exists channel state information (CSI) delay. In this paper, we study the bit allocation problem considering...
He Hansen coefficients are one of the most important tools in the analytical or semi-analytical methods of celestial mechanics. The problem of efficient computation was investigated in detail in many papers, but this subject is still open and to date there are not standard algorithms to generate the Hansen coefficients with accuracy and good computation time. Although the analytical expressions are...
Data streams with high volume and complicated items become more and more common, and typical algorithms of finding top-k frequent items on streams, such as counter-based algorithms and sketch algorithms, are gradually not keeping up with efficiency requirements. Our paper focuses on finding top-k frequent items on timestamp-based complicated streams, and proposes an approximate solution by sampling...
The temperature dependencies of the basic parameters of MOSFETs in a temperature range 20 – 300 K are measured. The universal formal four-parametric model, which allows to approximate all experimental temperature dependencies with the relative error less than 1 % is proposed. The hybrid analytical model efficiency for approximation of volt-ampere characteristics of MOSFETs is proved.
Stochastic computing (SC) is a re-emerging technique to process probability data encoded in digital bit-streams. Its main advantage is that arithmetic operations can be implemented by extremely small and low-power logic circuits. This makes SC suitable for signal-processing applications involving matrix operations whose VLSI implementation is very costly. Previous SC approaches only address basic...
This paper first formulates a non-iterative minimax method for designing a digital all-pass (AP) phase-compensation-system (PCS) by utilizing the second-order-cone-programming (SOCP) technique, and then uses an example to show that the PCS design accuracy can be improved by appropriately selecting the initial coefficients of the digital PCS. Originally, such a minimax design is a highly non-linear...
In Medio-Lateral Oblique (MLO) view of mammogram, the presence of pectoral muscle may sometimes affect the detection of architectural distortion due to their similar characteristics with abnormal tissues. As a result pectoral muscle should be handled separately while detecting the breast cancer. The straight line approximation of pectoral muscle is also very important in obtaining the breast tissue...
This paper proposes a new feature extraction scheme for speaker-independent Speech Emotion Recognition under both unsupervised and supervised conditions following a non-hierarchical process first and then a hierarchical one. The feature is derived from the Teager energy operated wavelet coefficients of speech signal. The wavelet coefficients enhanced by TE operation is used to compute entropy thus...
This paper considers the task of answering shortest path queries in large real-world graphs such as social networks, communication networks and web graphs. The traditional Breadth First Search (BFS) approach for solving this problem is too time-consuming when networks with millions of nodes and possibly billions of edges are considered. A common technique to address these complexity issues uses a...
In this paper we discuss the application of formal methods for the verification of properties of control systems designed for autonomous robotic systems. We illustrate our proposal in the context of surgery by considering the automatic execution of a simple action such as puncturing. To prove that a sequence of subtasks planned on pre-operative data can successfully accomplish the surgical operation...
Behavior Model Inference techniques aim at mining behavior models from execution traces. While most of approaches usually ground on local similarities in traces, recent work, referred to as behavior mining with temporal steering, propose to include long term dependencies in the mining process. Such dependencies correspond to temporal implications between events in execution traces, whose consideration...
We explore a novel avenue for generating absorbing boundary conditions for wave problems. The key part of our approach is Trefftz approximations of the solution, i.e. approximations by functions satisfying locally the underlying wave equation. Trefftz functions include outgoing waves only (and possibly evanescent waves), but no incoming waves. We show how this idea can be applied in three different...
Implicit Runge-Kutta based convolution quadrature and temporal Galerkin approaches to the discretization of the time domain integral equations are combined to produce an accurate efficient solution approach. The underlying method is just the convolution quadrature approach itself, and is used to compute temporal interactions between proximal patches. More distant interactions are computed by a method...
In this paper, we present a hyper graph kernel computed using substructure isomorphism tests. Measuring the isomorphisms between hyper graphs straightforwardly tends to be elusive since a hyper graph may exhibit varying relational orders. We thus transform a hyper graph into a directed line graph. This not only accurately reflects the multiple relationships exhibited by the hyper graph but is also...
In recent years, the accuracy of pedestrian detectors significantly improved. Currently, state-of-the-art pedestrian detectors achieve high accuracy results on challenging datasets. As opposed to refining a single detector, in this paper we propose a different approach to further increase the detection accuracy: combining multiple pedestrian detectors. The most straight-forward way to combine pedestrian...
In this paper we describe an approach to automatically improving the efficiency of soft cascade-based person detectors. Our technique addresses the two fundamental bottlenecks in cascade detectors: the number of weak classifiers that need to be evaluated in each cascade, and the total number of detection windows to be evaluated. By simply observing a soft cascade operating on a scene, we learn scale...
Various lower and upper approximations defined by the tolerance classes of objects and maximal tolerance classes are compared in the tolerance rough set models. Based on the study, some suggestions for choosing the suitable lower and upper approximations are given for the purpose of improving approximation accuracy.
For some classification tasks the data can be partitioned into disjoint subsets based on some attribute, for example a disease subtype. It then seems logical to train a classifier with the same classes as the original classification problem for each subtype separately, such that the performance per subtype is optimized. Unfortunately, the influence of the subtype performances on the aggregated overall...
The conventional Takagi-Sugeno (T-S) fuzzy model is an effective tool used to approximating behaviors of nonlinear systems on the basis of precise and certain input and output observations. In some situations, however, we can only obtain mixture of precise data (for input variables), imprecise and uncertain data (for output variable/response). This paper presents a method used to constructing T-S...
While a large number of surveillance cameras available nowadays provide a safe environment, the huge amount of data generated by them prevents a manual processing, requiring the application of automated methods to understand the scene. However, the majority of the currently available methods are still unable to process this amount of data in real time, mainly those focusing on pedestrian detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.