The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We often use shortest route to reach safety place when disaster occurs, that is because it takes shorter time than others in many cases. However, it sometimes cause congestion and make evacuation time longer. In this paper we propose a method of selecting appropriate route for each evacuee according to variation of person number. We explain algorithms to select appropriate route for each evacuee and...
Attacks authored by state sponsored actors, criminal outfits, ideological enclaves and recreational hackers continue to trouble public and private cyber systems. In order to create and/or maintain an advantage over their adversaries, cyber defenders must pursue novel ways to detect, attribute and respond to offensive operations. Linkography is a topic that has been explored for decades that has found...
In this paper, we introduce a distributed algorithm to compute the Čech complex. This algorithm is aimed at solving the coverage problems in self organized wireless networks. The complexity to compute the minimal Čech complex that gives information about coverage and connectivity of the network is O(n2), where n is the average number of neighbors of each cell. An application based on the distributed...
Physical therapy has a lot of importance for the well being and a better quality of living for an elderly patient. One integral constituent of any patient regime is the home-based exercise that a patient works on in a much comfortable environment. Although the benefits are well known, there is a big lag between the exercises prescribed by the therapists and the ones actually done by the patient. There...
This study rewrote a fractional-order particle swarm optimizer algorithmic equation and used an improved uniform design method (IUDM) to find the best combination for parameters of FPSO. Compared to PSO, FPSO makes a high convergence rate. In the improved FPSO, there are 4 parameters to influence effectiveness. Uniform design is an experimental method and suitable for multiple parameters and multiple...
With the process of China's entering a serious aging society, it generally becomes one of the problems for people caring as elderly falls frequently. Thus, it is necessary for us find a way that the old people get help timely when it happened. On studies related to falls in outdoors currently, popular methods are on Computer Vision and Inertial Sensor. The problems of these researches are focus on...
Connected vehicles will likely use hybrid communication networks. Presumably a licence-free radio access technology (RAT) will be used for vehicle-to-vehicle (V2V) contact, complemented by a cellular network, with an associated usage cost. In previous work, we developed a self-adaptive clustering algorithm for reducing cellular access costs, while ensuring that clustering overheads do not saturate...
Estimating collective state is an important component of many distributed systems, but has inherent challenges in balancing the availability of estimates against their accuracy. In this paper, we analyze the error bounds and dynamics of a commonly used family of self-stabilizing state estimation algorithms based on spanning trees. We find that in the worst case transients can duplicate values leading...
Applications in computer network security, social media analysis, and other areas rely on analyzing a changing environment. The data is rich in relationships and lends itself to graph analysis. Traditional static graph analysis cannot keep pace with network security applications analyzing nearly one million events per second and social networks like Facebook collecting 500 thousand comments per second...
The understanding and learning of how an unknown system behaves is crucial to the self-improving system integration challenge of continually integrating and optimising a collection of self-aware and adaptive systems. We aim to design an algorithm that can discover, learn the behaviour of, and interact with these systems of interest. We seek to exploit the latest models of neocortical architectures...
Article presents method of storing and processing Big Data using object-oriented datatype in commercial relational database server. Methodology was presented based on genomic data. Additionally, some methods of pattern matching implemented in the object were described and commented. Due to set of numerical experiments based on real data the efficiency of the system was testified. Obtain results shows...
Dictionary Learning is a method used in signal and image processing. In this study, classification of mammogram images were realized by using dictionary learning and sparse representation algorithms. The attributes of the images were detected with Wavelet Transform and PCA, and the new dataset which was created by the obtained attributes were classified by Dictionary Learning. Moreover, the classification...
In this paper, described depth first search algorithm being implemented on line maze solver robot. Right hand rule will be used to select the turn priority. Some mazes will be used to test the reliability of this depth first search maze solver robot. In the result, the system is able to use depth first search algorithm well. The robot able to finish non-loop maze with 84.97 s average time and with-loop...
This paper proposes a jumped matching depth estimation algorithm to calculate the disparity value in the 3D virtual view synthesis. The matching criterion adopts pixel value similarity, distance similarity and color information similarity as the weighted cost aggregation. In order to reduce the depth discontinuing and then providing the comfort of 3D watching, this paper proposes the disparity prediction...
A solid and practical approach for designing an optimal secondary distribution network is proposed. The methodology starts by optimally locating and sizing medium voltage/low voltage transformers then finding the optimal path for secondary circuits. The optimal number of transformers and their location are determined by k-means clustering algorithm, and validated using Davies-Bouldin index. In addition,...
Word sense disambiguation is the process of identifying existence of polysemous words in the text and disambiguating the appropriate sense satisfying the given context in Kannada language. The proposed methodology uses the synonyms of the target word and its surrounding words' gloss in combination with part of speech tagging to determine the overlap between the senses of the polysemous word or the...
There is a plenty of unorganized data available in various information repositories and examining this data is very necessary for some future analysis. Clustering this kind of data plays a vital role in knowing about formerly unknown and possibly useful data and also the concerns should be widely examined. Here, we are proposing a high level methodology for clustering the data. First of all the proposed...
In recent technological advancement such as smart grid applications, security surveillance & border protection, internet of things, disaster management & other smart home applications exhilarate the deployment of autonomous, self-configured, large-scale wireless sensor networks. Efficient power conservation is crucial concerns for sensor networks to operate in the hostile environment. Therefore...
In order to reduce the false matching rate and matching time, an improved algorithm based on RANSAC-SIFT was proposed. The feature points were extracted by SIFT algorithm firstly. Then most of the mismatching points were eliminated according to the constraints that matching distances tend to be consistent. Finally the remaining points were regarded as pre matching points for achieve fine matching...
Although, there have been considerable advances in quantum technology, a great scale quantum computer will not be available until about a few years. In the meantime, it requires quantum emulators which allow to study the existing quantum algorithms and the design of new ones. We propose a flexible method to emulate quantum circuits which reduces design and processing time. In this context, we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.