The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is concerned with the generalized network flow (GNF) problem, which aims to find a minimum-cost solution for a generalized flow network. The objective is to determine the optimal injections at the nodes as well as optimal flows over the lines of the network. In this problem, each line is associated with two flows in opposite directions that are related to each other via a given nonlinear...
This paper proposes a new design methodology of two-input and one-output fuzzy logic controller by training an Artificial Neural Network (ANN) that approximates a fuzzy control surface resulting from a basic fuzzy controller. The main purpose of this approach is to fully exploit the Artificial Neural Network (ANN) feature by translating the expertise of controlling the plant into two stages. In the...
The presented work studies an application of a technique known as a semismooth Newton (SSN) method to accelerate the convergence of distributed quadratic programming LASSO (DQP-LASSO) - a consensus-based distributed sparse linear regression algorithm. The DQP-LASSO algorithm exploits an alternating directions method of multipliers (ADMM) algorithm to reduce a global LASSO problem to a series of local...
Swarm operation in Unmanned Aerial Vehicles is an emerging technology which has numerous uses. It can be used in industrial, agricultural, and even military applications. However, it must be able to perform formations for it to be effective. Also, countermeasures must be made by the swarm to account for certain obstructions that are present in the environment. This paper aims to address this issue...
Operations that combine smaller networks into a larger network in a manner such that the rate region of the larger network can be directly obtained from the associated rate regions of the smaller networks are defined and presented. The operations are selected to also have the property that the sufficiency of classes of linear network codes and the tightness of the Shannon (polymatroid) outer bound...
Virtual private networks (VPNs) are now practically the only mean of establishing secure data exchange via the public networks (Internet). The problem of designing a virtual private network is to determine the required number of VPN channels, connecting the fragments of the distributed network infrastructure to each other. However, if the number of fragments is great, this problem becomes rather complex...
This paper describes the identification of a nonlinear time invariant system is quite essential for its stability point of view. Among all the identification approaches, FLANNs is the best one but in case of learning speed and convergence point of view it does not work well. Amongst all the traditional approaches, a newly developed algorithm named ELMs (Extreme Learning Machine) for identification...
A number of key examples of spectrum databases in wireless communications either persist or are in the process of being instantiated. Perhaps one of the most notable recent developments in this area is the spectrum databases that enable secondary usage of TV White Space (TVWS), authorized by regulators such as the FCC in the US, Ofcom in the UK, and various others internationally. Such developments...
Accurate and simple simulation flow model is useful to make decision at the right time to manage supply chain or workshop. To do that, different reduction model complexity approaches have been proposed. One of them is to associate discrete event model of bottlenecks and continuous model of other work centers according to the theory of constraints. The continuous approximation is used only do determine...
For maximum utilization of Photovoltaic (PV) system the Maximum Power Point tracking (MPPT) is necessary. This paper presents three novel intelligence techniques named Trigonometric Functional Link Artificial Neural Network (TFLANN), Ridge Extreme Learning Machine (RELM) and RELM with trigonometric functional expansion block (FEB) under partial shaded condition to predict the voltage at Maximum Power...
In this paper we describe a model for the activation level of users in online dating platforms (ODPs). Such popular systems are conceived in order to match individuals from two groups of potential mates. The business of such platforms pivots around the customers' expectancy to get in contact with their future dates: upon the payment of a fee to the platform owner, ODPs provide specific tools to improve...
The use of the unlicensed spectrum by LTE networks (LTE-U or LAA-LTE) is being considered by mobile operators in order to satisfy increasing traffic demands and to make better use of the licensed spectrum. However, coexistence issues arise when LTE-U coverage overlaps with other technologies currently operating in unlicensed bands, in particular WiFi. Since LTE uses a TDMA/OFDMA scheduled approach,...
This paper presents a new algorithm for colorizing gray scale natural still images. The algorithm uses artificial neural network (ANN) to predict the low frequency discrete cosine transform (DCT) components of the RGB channels. A set of natural color images are used to train three ANNs. The trained networks estimates the RGB layers of the gray scale image that best match a set of training colored...
In this paper we present an enhanced algorithm with modified approach to extricate various Triplets i.e. subject-predicate-object from Natural language sentences. The Treebank Structure and the Typed Dependencies obtained from Stanford Parser are used to elicit multiple triplets from English Sentences. Typed Dependencies represents grammatical connections among the words of any sentence and represents...
The problem of base station cooperation has recently been set within the framework of Stochastic Geometry. Existing works consider that a user dynamically chooses the set of stations that cooperate for his/her service. However, this assumption often does not hold. Cooperation groups could be predefined and static, with nodes connected by fixed infrastructure. To analyse such a potential network, in...
Anomalies in computer networks has increased in the last decades and raised concern to create techniques to identify these unusual traffic patterns. This research aims to use data mining techniques in order to correctly identify these anomalies, particularly in spam detection, for it was applied an collection of machine learning algorithms for data mining tasks and an dataset called SPAMBASE to identify...
This article proposed a new smart diagnosis algorithm of the open-circuit fault in a PV generator. For the faults conventional diagnosis, it used the analysis of the actual operation parameters of the PV generator. For the faults smart diagnosis, it based on the optimization of SVM technique by the neural network for the classification of observations located on its margin. The resulting algorithm...
In previous works of ours [1-3], we proposed a neural network-based face detection and facial expression analysis system, which was able to classify three expressions in frontal view face images. In the present work, we examine the possibility of classifying these expressions in side view face images. Specifically, we evaluate the extracted facial feature discrimination power of three image acquisition...
Heterogeneous wireless systems such as a combination of mobile broadband wireless access (MBWA) and wireless local area network (WLAN) are candidates to attain the large capacity in the next generation mobile communication systems. For capacity expansion, small cells of multiple wireless network are deployed densely in these systems. Because a number of the cells overlap, users must discover a lot...
Machine vision is still a challenging topic and attracts researchers to carry out researches in this field. Efforts have been placed to design machine vision systems (MVS) that are inspired by human vision system (HVS). Attention is one of the important properties of HVS, with which the human can focus only on part of the scene at a time; regions with more abrupt features attract human attention more...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.