The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
In the field of network analysis, centrality values of graph nodes, which represents the importance of nodes, have been widely studied. In this paper, we focus on one of the most basic centrality measures: closeness centrality. Since the exact computation of closeness centrality for all nodes of a network is prohibitively costly for massive networks, algorithms for estimating closeness centrality...
Sparse Discriminant Analysis (SDA) has been widely used to improve the performance of classical Fisher's Linear Discriminant Analysis in supervised metric learning, feature selection and classification. With the increasing needs of distributed data collection, storage and processing, enabling the Sparse Discriminant Learning to embrace the Multi-Party distributed computing environments becomes an...
Selecting the right web links for a website is important because appropriate links not only can provide high attractiveness but can also increase the website's revenue. In this work, we first show that web links have an intrinsic multi-level feedback structure. For example, consider a 2-level feedback web link: the 1st level feedback provides the Click-Through Rate (CTR) and the 2nd level feedback...
Latent Dirichlet Allocation (LDA) has been widely used in text mining to discover topics from documents. One major approach to learn LDA is Gibbs sampling. The basic Collapsed Gibbs Sampling (CGS) algorithm requires O(NZ) computations to learn an LDA model with Z topics from a corpus containing N tokens. Existing approaches that improve the complexity of CGS focus on reducing the factor Z. In this...
The number of triangles in a graph is useful to deduce a plethora of important features of the network that the graph is modeling. However, finding the exact value of this number is computationally expensive. Hence, a number of approximation algorithms based on random sampling of edges, or wedges (adjacent edge pairs) have been proposed for estimating this value. We argue that for large sparse graphs...
Most state-of-the-art graph kernels only take local graph properties into account, i.e., the kernel is computed with regard to properties of the neighborhood of vertices or other small substructures. On the other hand, kernels that do take global graph properties into account may not scale well to large graph databases. Here we propose to start exploring the spacebetween local and global graph kernels,...
Nowadays with enlargement of power grid and increasing renewable energy integration, uncertainties and randomness challenge traditional power system analysis methods. Scenarios are widely applied to deal with power system uncertainties. Especially power flow examination in transmission expansion planning needs typical scenarios to verify normal power flow, and provide useful information for auxiliary...
Smart grid systems include many different power sources such as renewable and fossil energy basis. While collecting all type of energy on the grid, phase order, frequency, maximum voltage value and synchronization time of each power station should be known for a smooth operation of the smart grid. Therefore, the detection of peak values of grid voltages will help the smart grid operators to connect...
In this article, we propose a data analytics development to detect unusual patterns of flights from a vast amounts of FDR (flight data recorder) data for supporting airline maintenance operations. A fundamental rationale behind this development is that if there are potential issues on mechanical parts of an aircraft during a flight, evidences for these issues are most likely included in the FDR data...
The combination of Software Defined Networking (SDN) and Network Function Virtualization (NFV) promises to provide highly flexible and configurable network infrastructures. This relies, however, on an efficient assignment of the respective Service Function Chain (SFC). This is related to Virtual Network Embedding (VNE), where algorithms are devised to provide such an assignment. To evaluate and compare...
In this paper, the application of genetic algorithm (GA) to energy management of isolated power system is discussed. A method to realize the simultaneous optimization of configuration and operation with emergency generators (EGs) in a hospital is proposed as an example. The simultaneous optimization of configuration and operation needs search of enormous combinations, which is generally considered...
Intrusion detection systems are a central component of cyber security architecture, and their accuracy is a critical performance metric for any security deployment. Most of the current performance analysis of intrusion detection systems relies on empirical profiling of a given algorithm or implementation against a benchmark dataset. Whilst effective to a point, this traditional evaluation methodology...
All around the world, domestic birds are a major threat in the field of agriculture causing damage to economic field crops, storage houses and also dirtying human life areas. Such most common pest birds in many countries are House crows (Corvus), Common myna, Jungle myna, Brahminy starling, White-cheeked bulbul, Acridotterestritis etc. In order to distract these birds away, many traditional methods...
the image is vulnerable to human attack during transmission. Image information not only involves personal privacy, but even relates to national security. Therefore, more and more countries all over the world pay more attention to picture security. Here, a single chaotic encryption method cannot meet the current demand. A new image encryption scheme is designed by combining logistic mapping, sine mapping...
Computer Network has great effect on improving the efficiency of the communication system and application requirements in our life. In order to establish transmission path with movement characteristics and improve the efficiency of information transmission in Computer Network, the optimized clustering routing protocol based on node position using the minimum distance routing competition mechanism...
This paper proposes an algorithm that uses predefined weights to create broadcast routes for a WirelessHART network. The network topology is represented by a graph, and the algorithm uses information of the devices present in the network to build the broadcast graph. At each iteration of the algorithm, a device is selected and then added to the broadcast solution graph. A cost function determines...
The current animal sperm morphology analysis is mostly achieved through computer vision technology. By using image processing technique, the parameters of each sperm such as ellipticity, elongation of the head, mid-piece angle and percentage of acrosome can be calculated, then the quality of sperm can be evaluated. This system uses K-means algorithim to segment the sperm images, thinning algorithm...
The thickness of the boundary layer of the discrete-time Tracking-Differentiator is variable, so that the control characteristic line is asymmetric. In general, the nonlinear boundary transform is used to get the control synthesis function. However, it contains square root operations, and the compute is more complex. This study is conducted to put forward a new algorithm to simplify partition boundary...
In this paper, an implicit iterative algorithm is developed to obtain the unique positive definite solution of the generalized algebraic Riccati matrix equation. For this proposed algorithm, there exisits a tuning parameter which can be chosen such that this algorithm achieves better convergence performance. Some convergence results are given for the proposed algorithm. Moreover, an approach is also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.