The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with energy management in smart districts using distributed model predictive control (DMPC). We investigate two decomposition methods, primal and dual decomposition, for problems where a shared resource has to be distributed optimally amongst sub systems. The objective is to compare these two decomposition methods with a focus on how well they are suited in the context of smart district...
This paper presents exact solution methods for analyzing vulnerability of electric power networks to a certain kind of undetectable attacks known as false data injection attacks. We show that the problems of finding the minimum number of measurement points to be attacked undetectably reduce to minimum cut problems on hypergraphs, which admit efficient combinatorial algorithms. Experimental results...
Mobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile security app's loyalty, or who can determine a given mobile security app is not a hypocritical thief? Thus, it is very necessary to establish a supervision mechanism to restrict mobile security app for user's privacy, but there isn't any technique to...
Occlusion is one important problem in single object tracking. However, conventional methods are not capable of making full use of the spatial information because of occlusion, which may lead to the drift. In this paper, we propose a robust patches-based tracking method via sparse representation, namely RPSR, which selects the unoccluded patches, and adaptively assigns larger contribution factors to...
This paper presents an efficient VLSI implementation of a singular value decomposition (SVD) processor of on-line recursive independent component analysis (ORICA) for use in a real-time electroencephalography (EEG) system. ICA is a well-known method for blind source separation (BBS), which helps to obtain clear EEG signals without artifacts. In general, computations of ORICA are complicated and the...
This work presents a new approach of control specification. Many researches on control synthesis sacrificed some requirement of control in order to satisfy control specifications that are expressed by a linear combination of place markings in a given reachability graph. However, these control specifications cannot usually fulfil some requirement of control; this is why we introduce a new approach...
Relations which allow to estimate the influence of vector measuring errors on algorithm TRIAD accuracy of orientation determination are suggested. Connection between the algebraic and geometrical methods of errors analysis is received.
Network virtualization is critical for distributing cloud services over expanded distances and improving scalability and responsiveness. However many providers are very concerned about maintaining high availability, particularly under large catastrophic/disaster type conditions causing multiple failures. Now recent studies have looked at network virtualization for disaster recovery. However these...
Virtualized cloud environments have emerged as a necessity within modern unified ICT infrastructures and have established themselves as a reliable backbone for numerous always-on services. ‘Live’ intra-cloud virtual-machine (VM) migration is a widely used technique for efficient resource management employed within modern cloud infrastructures. Despite the benefits of such functionality, there are...
This paper presents a multiple feature fusion method using topic model for social image visualization. Images in social media are represented from several aspects such as their visual information and tags. The proposed method extracts low-level features from social images and their tags and calculates their integrated high-level features. Specifically, the proposed method applies multilayer multimodal...
Interest points matching for aerial visual odometry using quadrotor MAV is tackled in this work. First, a set of sparse feature points are extracted using ORB detector. These are then grouped using Gradient Vector Flow (GVF) fields by finding points of high symmetry within the image. A robust matching strategy is introduced to improve the motion estimation. In order to validate ORB features matches,...
This article describes universal tracking control method. It is based on model linearization in every point of trajectory. Tested device is an inertial wheel pendulum (IWP). This is an underactuated nonlinear object — two degrees of freedom (angle from vertical and angle of rotation of electric motor) and one actuator (current). The linear quadratic regulator (LQR) and the model of the object are...
This paper describes a method aimed at producing reduced order models in state-space form for speeding up the transient thermal simulation of mechatronics products. Designed in a non-intrusive framework, this method is implemented as an offline tool that post-processes the inputs and outputs of a detailed reference model considered as a black box. The reduction algorithm is based on robust linear...
The essence of 3D model retrieval is to classify and to sort. An algorithm based on neural network is proposed in this paper. After pretreatment, six projection viewpoints are selected to project the 3D model in order to generate six two-dimensional images. Then the images are transformed by Fourier Transform to obtain the vector features. Finally, the dimension of vector is compressed to input into...
This paper is researched on hybrid recommendation. It is mixed with user's similarity, Hamming distance, Cluster and Slope one to get a good prediction. This paper propose take into account Hamming distance to cluster .and then we take f(x)=x+b to predict the item rated in the cluster. At last, This paper verified the model through experiments and carried out the proposed recommendation model drawn...
In the present paper, we propose a gray-level image watermarking algorithm with high capacity based on bit decomposition and spread transform. To implement this algorithm, the gray-level digital watermark image is bit decompounded into a series of binary digital images, then the cover data extracted from the original cover image are projected to multiple orthogonal directions, while a binary image...
An acoustic echo canceler (AEC) is often employed to remove the acoustic echoes generated in hands-free communication systems. The AEC cancels the acoustic echoes by approximating the echo-path with the use of an adaptive filter and subtracting the pseudo echoes generated by the filter from the observed signal. The conventional adaptive algorithm for updating the filter, however, fails in estimation...
In this paper, a new structure for acoustic echo cancellation is presented. The role of acoustic echo canceller (AEC) is to remove undesirable acoustic echoes in communication systems. However, in double-talk case the performance of the AEC is degraded, thus, a double-talk detector (DTD) must be used for controlling the AEC. A new structure for AEC using an auxiliary adaptive filter is proposed in...
Multi-label learning has attracted an increasing attention from many domains, because of its great potential applications. Although many learning methods have been witnessed, two major challenges are still not handled very well. They are the correlations and the high dimensionality of data. In this paper, we exploit the inherent property of the multi-label data and propose an effective sparse multi-label...
Analysis and mining of social media has become an important research area. A challenging problem in this area consists in the identification of a group of users with similar patterns. In this paper, we propose the classification of users based on their activity profiles (e.g., periods of the day when the user is most and least active in online communications). Activity profiles can be useful for many...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.