The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grey-incidence decision making approach is proposed to deal with the implementation of brownfield redevelopment project in the remediated sites. The inspiration behind this approach is valuable, because it is suitable to use regardless of the sample size. Whether it is big or small, or whether the data fulfills a particular conventional distribution or not. Above and beyond that, what makes it convenient...
Particle swarm optimization (PSO) has been proven to be a simple yet effective algorithm for searching the optimal solutions of objective functions. The main advantage of PSO is its simplicity, but it easily gets stuck in local optima. In order to remain the original merit and raise its performance, a novel idea is proposed in this paper, which selects the best model of PSO based on the previous performance...
As features in semiconductor technology become extremely scaled down, manufacturability is becoming a great challenge. Owing to the delayed adoption of new lithographic techniques, such as extreme ultraviolet (EUV), e-beam direct-write (EBDW), and directed self-assembly (DSA), in IC volume production, double patterning lithography (DPL) or multiple patterning lithography (MPL) is used to print critical...
SASEBO and SAKURA, boards developed for physical security analysis of cryptographic circuits against side-channel attacks, are FPGAs of different generations. The attacks perform statistical analysis on power or electromagnetic waveforms, and enhance leakage signals caused by a secret key. However, the signal becomes weaker along with the advancing miniaturization and high integration of semiconductor...
We studied the feasibility of the use of iBeacons for position detection. We compared the precision achieved by two well-known algorithms, i.e. nearest neighbor and k-nearest beacon. The nearest neighbor algorithm showed lower average error distance, by 1.0 m, than the k-nearest beacon algorithm. We also found that both indoor position methods are not influenced by the difference in the measured rooms...
By using haptic and olfactory senses as well as visual and auditory senses, it is expected that we are able to play networked games with high sense of presence. Fairness among players is important for the games, but we sometimes cannot use some senses by sickness, injury, and so on. In this paper, we assess the influence of olfactory and auditory senses on fairness for a networked virtual 3D object...
Many practical sensing applications involve multiple sensors simultaneously acquiring measurements of a single object. Conversely, most existing sparse recovery guarantees in compressed sensing concern only single-sensor acquisition scenarios. In this paper, we address the optimal recovery of compressible signals from multi-sensor measurements using compressed sensing techniques. This confirms the...
A recent line of work has established accurate predictions of the mean squared-error (MSE) performance of non-smooth convex optimization methods when used to recover structured signals (e.g. sparse, low-rank) from noisy linear (and possibly compressed) observations. Specifically, in a recent paper [15] we precisely characterized the MSE performance of a general class of regularized M-estimators using...
In series of papers, the authors introduced the concepts of multidimensional intuitionistic fuzzy sets and logic. Here, the concept of a multidimensional intuitionistic fuzzy quantifier is introduced. Three groups of these quantifiers are described and some of their basic properties are studied.
For many industries a key activity in product development is to demonstrate legislative compliance by showing, explicitly, that all relevant requirements from regulatory documents have been identified and addressed. The analysis and interpretation of standards and regulations requires considerable skills and consumes significant effort in product development. Therefore initiating reuse from the analysis...
Regulatory authorities of e.g. the automotive, avionic, or railway domain pose high requirements concerning safety assurance activities. One activity known from requirements engineering (RE) is requirements traceability. We propose a model-based methodology to facilitate trace link visualization over several levels of abstraction and different viewpoints. This intuitive visualization concept allows...
Today's systems are socio-technical, they are composed of social (humans and organizations) and technical components that interact with one another to achieve objectives they cannot achieve on their own. Security is a central issue in socio-technical systems and cannot be tackled through technical mechanisms alone. Instead, it requires enforcing security policies over the procedures that specify how...
In this paper, we improve a computational conceptof logic-based consensus among agents that has been introducedrecently. A consensus is defined as a non-contradictoryfragment of the information conveyed by various agents suchthat this fragment does not logically conflict with any agent. In this study, we introduce an additional requirement to theconcept of consensus to avoid some paradoxical consensuses...
In this paper, we introduce and explore the Frechet metric between the trees. We have used the metric to find similarities between polygons. This approach is used to quantify the quality of image segmentation.
Clustering is an unsupervised data mining tool and in bioinformatics, clustering genome sequences is used to group related biological sequences when there is no additional supervision. Sequence clusters are often related with gene/protein families, which can shed some light onto determining tertiary structures. To extract such hidden and valuable structures in a data set of genome sequences can benefit...
English, though not being the native language, is the language of instruction across the schooling years in Mauritius. Indeed, English literacy is introduced to young students at the pre-primary level as it is a pre-requisite for all other subjects, except French language in Standard One of primary level. In consequence, it is imperative that students acquire English literacy skills at pre-primary...
A novel method called boundary distance is proposed for pre-extracting support vectors. It first calculates the distance between the sample and the other class sample. According to sort distance, the less distance samples, and nearest neighbor samples in the other class, are used as boundary samples. As the boundary samples include most support vectors, it greatly declines the training time without...
In this paper we report how we improve our Chinese grammar error detection system. We focus on the recognition of word selection error, which is the hardest error type defined in 2015 NLP-TEA shared task CGED. Four major error types was defined in CGED shared task, including redundant word error, missing word error, word selection error and word disorder error. Based on the conditional random fields...
In this paper we introduce three main features extracted from Moodle logs in order to be uses a possible means to predict future student grades. We discuss the statistical analysis on these features and show how they cannot be applied isolatedly to model our data. We then apply them as a whole and use principal component analysis to derive a decision tree based on the features. With derived tree we...
The single valued neutrosophic graph is a new version of graph theory presented recently as a generalization of fuzzy graph and intuitionistic fuzzy graph. The single valued neutrosophic graph (SVN-graph) is used when the relation between nodes (or vertices) in problems are indeterminate. In this paper, we examine the properties of various types of degrees, order and size of single valued neutrosophic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.