The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this article, we propose low complexity transmitter and receiver architectures for Faster Than Nyquist communications. Both architectures are based on circular convolutions rather than linear convolutions. These circular architectures allow us to consider a turbo-equalization scheme based on linear MMSE equalization. We can consider low-values for the time compression factor without increasing...
In this work, we consider compressed sensing reconstruction from M measurements of K-sparse structured signals which do not possess a writable correlation model. Assuming that a generative statistical model, such as a Boltzmann machine, can be trained in an unsupervised manner on example signals, we demonstrate how this signal model can be used within a Bayesian framework of signal reconstruction...
In recent years the social network analysis has been increased, in this paper we focus mining the small network formed by social gathering or business meeting. The main objective is to discover the existence of correlation and influence among the group of people by analysing their social affinity and emotions, currently we are interested only in facial emotions. Whereas the approach for emotion detection...
With the rapid development of IT and logistics, importance of the warehouse has been growing. It is generally believed today that shorten the working time in the Warehouse is viewed as an important issue. The solution of the issue is changing product placement in the warehouse. This study proposes the dynamic product placement method. We examine that experimental results is effective.
Fistly, IEEE database is utilized to retrieve ICMSE conference data from 2006 to 2013 to build the conference coauthors network, then use social network analysis methods to analyze the scientific status of cooperation between scholars. Secondly, in the analysis of Cohesive Subgroup, we analyze and compare the two larger network from the core node centrality, the correlation between code centrality...
In this paper we introduce three main features extracted from Moodle logs in order to be uses a possible means to predict future student grades. We discuss the statistical analysis on these features and show how they cannot be applied isolatedly to model our data. We then apply them as a whole and use principal component analysis to derive a decision tree based on the features. With derived tree we...
Recently, social event recommendation, which is to recommend a list of upcoming events to a user, has attracted a lot of research interests. In this paper, we first construct a heterogeneous graph to express the interactions among different types of entities in event-based social network. Based on the constructed graph, we propose a novel recommendation algorithm called reverse random walk with restart...
In recent years, decision fusion techniques have been widely applied in many studies to combine information from different sensor data to achieve higher accuracy in information extraction than that could be achieved by the use of single sensor data alone. So far, most of the decision fusion techniques developed for the remote sensing applications have the drawback of assuming conditional independence...
Urban lands of Chinese cities tend to expand in an unreasonable way, which has been a critical problem for China due to its insufficient land resources. As the important carrier loading active social economic activities and dense population, municipalities and provincial capitals are in an important strategic position in the China. In this study, 4 municipalities and 27 provincial capitals are selected...
Classification between foggy and non-foggy images is a primitive step for automation in traffic activity and industries. The existing techniques provide low accuracy and needs validation over both synthetic and natural database. Foggy images are identified and classified based on their optical characteristics for vision enhancement and to make them more efficient for further processing. In proposed...
The idea of relating cyclic codes and frequency hopping (FH) sequences has yielded families of FH sequences, which meet tight bounds. Reed Solomon based FH sequences are an instance of such families. In this paper, these sequences are investigated for Galois fields of characteristic two. More specifically, the symbols utilized in each of sequences are calculated for two important cases, where hamming...
Software testing is designed in various company hierarchy, such as end product/service providers and subcontractors. An end product/service providers generally has a severe responsibility for their software quality, while a subcontractor has a limited responsibility. There can be a hypothesis that there is differences in software quality between service providers and subcontractors. To examine the...
The arithmetic correlation has been studied in the binary sequences and Boolean functions, the ideal arithmetic correlation sequences can be used in mobile communication authentication with their properties, such as the large number and the independent certification. In this paper, a new class of no-linear Boolean functions are described and their arithmetic correlation are analyzed. And based the...
Security Operation Centers rely on data triage to identify the true "signals" from a large volume of noisy alerts and "connect the dots" to answer certain higher-level questions about the attack activities. This work aims to automatically generate data triage automatons directly from cybersecurity analysts' operation traces. Existing methods for generating data triage automatons,...
The development and deployment of the Locator/ Identifier Separation Protocol (LISP), a paradigm introducing several benefits to the Internet architecture, is becoming widespread thanks to initiatives like the LISP-Lab project. Yet, LISP remains a relatively recent technology, hence, its actual performance when integrated with the current Internet remains still to be assessed. To tackle this issue...
In this study we analyzed the curricula of 65 university students to investigate the impact of activities progression on student performances. Clustering curricula based on activity order and type we discovered a significant incidence on performance, validating the predictive power of curricula. Nevertheless, we discovered that the characterization of clusters is mainly due to non mandatory activities,...
Students working in teams to complete software tasks is an effective method to learn necessary skills. Previously we examined the educational effectiveness as a function of personal characteristics, but the findings were inconclusive. Because we hypothesize that team discussions impact learning and are related to educational effectiveness, this study investigates the influence of team discussions...
With the rapid development of cellular network systems, the operators need more experience to deal with complicated network management system and wide range of Key Performance Indicators (KPIs). There are many indicators related to each other due to the definition or communication process. But several implicit associations still exist among these KPIs. This paper proposes an approach to figure out...
Weighted item-set mining is used to find the profitable connection between the data. There are two types of items contained in dataset i.e. frequent and infrequent. Infrequent item-sets are nothing but items which are rarely found in database. Mining frequent items in data mining are very helpful for retrieving the related data present in the dataset. Using transactional dataset as an input dataset...
Owing to the growing demand for the high-speed wireless communications which uses Orthogonal Frequency Division Multiplexing (OFDM), there is a need to provide high-quality to overcome various channel impairments appearing over the transmission link. One of the main problems in providing such mechanisms is Doppler shift. which reduces the spectral efficiency of the system, raising a need to determine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.