The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fluid mechanics considers two frames of reference for an observer watching a flow field: Eulerian and Lagrangian. The former is the frame of reference traditionally used for flow analysis, and involves extracting particle trajectories based on a vector field. With this work, we explore the opportunities that arise when considering these trajectories from the Lagrangian frame of reference. Specifically,...
Automatic extraction of hyponymy relations between concepts in an ontology is significant for ontology learning and knowledge organization. In this paper, we propose a fusion approach of hyponymy relation extraction in patent domain, using Relative Decoration Degree (RDEG) to extract high precision relations, and then Association Rule (AR) to enrich those relations. We use Cilin to extend a word to...
This paper presents and investigates two new numerical algorithms (i.e., E47 algorithm and 94LVI algorithm) for solving the quadratic programming (QP) problem subject to inequality and bound constraints. Such a constrained QP problem is firstly converted equivalently into a linear variational inequality (LVI), and then converted equivalently into a piecewise-linear projection equation (PLPE). The...
Sentence similarity compute is an important part in question answering system based on frequency asking questions. The accuracy of the existing sentence similarity algorithm needs to be improved, so this paper presents a revised question similarity compute method. We combine the word order feature with vector space model algorithm. When we use the VSM to compute the question similarity, we propose...
A new antenna pattern verification system based on a flying far-field source has been recently developed [1]. It performs the antenna validation considering the measured received power level at the antenna port. This paper discusses the deembedding procedure that is used to obtain the antenna pattern from such measured data. The measured radiation patterns of a log-periodic antenna operating at 408...
The accurate and rapid detection of voltage and current in non-sinusoidal and unbalanced voltage condition is the prerequisite for grid power quality management and stable operation. Based on analyzing the vectors of the grid voltage and current, the rotating vector detection is carried out which can detect the voltage and current specified harmonic component and reactive and active current in non-sinusoidal...
Regulating the power consumption to avoid peaks in demand is a common practice. Demand Response(DR) is being used by utility providers to minimize costs or ensure system reliability. Although it has been used extensively there is a shortage of solutions dealing with dynamic DR. Past attempts focus on minimizing the load demand without considering the sustainability of the reduced energy. In this paper...
Selecting accurate and simple association rules that efficiently cover all data samples is very important in knowledge discovery. There are several measures to assess accuracy and relations in a rule. This poses a challenge for researchers to select effective measures. Combining different measures via multi-objective evolutionary algorithms is an effective method to select suitable association rules...
Recent studies on ECG signals proved that they can be employed as biometric traits able to obtain sufficient accuracy in a wide set of applicative scenarios. Most of the systems in the literature, however, are based on templates consisting in vectors of integer or floating point numbers. While any numerical representation is inherently binary, in here we consider as binary templates only those codings...
Nowadays, extremely wide and facilitated access to the internet has made the plagiarism and text reuse more common. Many studies have been conducted on automatic plagiarism detection. But there are few studies on automatic Persian plagiarism detection methods due to lack of a suitable Persian corpus. In this paper, an external Persian plagiarism detection method based on the vector space model (VSM)...
In recent years, progress in the field of artificial neural networks provides a very important tool for complex problems in pattern recognition, data mining and medical diagnosis. The training algorithms of neural networks play an important role for adjustment the network parameters. Different algorithms have been presented for training neural networks; the most common one is the use of gradient descent...
Reduced-reference (RR) image quality assessment (IQA) aims to achieve higher evaluation accuracy by using only partial information about the reference image. In this paper we propose a novel Reduced-reference image quality assessment method which uses the Singular Value Decomposition (SVD) algorithm for reducing the amount of information. Using the SVD components makes the proposed quality metric...
Development of location privacy protection mechanisms is one of the most important concerns in existing and future location-based information systems, due to the important value that users' locations have for ill-intentioned organizations that could break in and obtain this data. Transformation-based location obfuscation techniques are one of the best techniques available because they substantially...
Recommendation systems suggest useful information to the end users. They predict the information demands of online users and offer recommendations to facilitate their navigation. There are many approaches to construct such systems. Most of the recommendation systems use data mining techniques on the web access log or the database of the site and discover user's access patterns. Afterwards, the recommendation...
Physical inactivity is an important contributor to non-communicable diseases in countries of high income, and increasingly so in those of low and middle income. Physical inactivity is the leading cause of many diseases. It has been estimated that as many as 250,000 deaths per year in the United States, approximately 12% of the total, are attributable to a lack of regular physical activity. Measuring...
The imbalance data problem in classification is a significant research area and has attracted a lot attention in recent years. Rebalancing class distribution techniques such as over-sampling or under-sampling are the most common approaches to deal with this problem. This paper presents a new method so called Diversity and Separable Metrics in Over-Sampling Technique (DSMOTE) to handle the imbalanced...
There are a number of methods for image recognition and they are mainly based on Bag-of-Words (BoW) model. These models can be divided into two categories: generative and discriminative models. Some of the generative models are Naïve Bayes, latent Dirichlet allocation and Probabilistic Latent Semantic Analysis. Discriminative methods are Nearest neighbor classification, Support Vector Machines and...
The apparatus for vector electrocardiogram recording has developed. The principle of operation has been considered and technical characteristics of developed apparatus based on Frank's formulas are justified. The vector electrocardiogram recording procedure has been described. The way of electrocardiogram from vector electrocardiogram synthesis has been analyzed. Confidence limits of vector electrocardiogram...
In this paper, a two-layer scheduling scheme for pump stations in a water distribution network has been proposed. The upper layer, which works in one-hour sampling time, uses Model Predictive Control (MPC) to produce continuous flow set-points for the lower layer. While in the lower layer, a scheduling algorithm has been used to translate the continuous flow set-points to a discrete (ON-OFF) control...
This paper presents an efficient VLSI implementation of a singular value decomposition (SVD) processor of on-line recursive independent component analysis (ORICA) for use in a real-time electroencephalography (EEG) system. ICA is a well-known method for blind source separation (BBS), which helps to obtain clear EEG signals without artifacts. In general, computations of ORICA are complicated and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.