The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the actual GNSS space signal quality monitoring system, the performance of the channel is not ideal, resulting in the signal transmitted to the receiver is inconsistent with the signal received by the antenna. Studying the characteristics and designing the equalization algorithm of the channel could restore the received signal to the real state, which will ensure the quality monitoring results...
In recent years there have been many proposals for automated applications in vegetable harvesting. There are two major challenges: estimation of yield and harvesting of fruit trees. This research proposes a new algorithm that allows accurate counting of the number of fruits on a tree to accurately estimate the output of a dragon fruit. The algorithm consists of the following main steps: image segmentation,...
This paper considers the multi-unit resource allocation problem with a few distinct (indivisible and non-shareable) goods (or items, objects), each has a certain amount of copies. Every agent expresses her preference over multisets of goods by mean of utility function. The goal is to distribute goods among agents in such a way that maximizes either utilitarian social welfare or egalitarian social...
Mining high utility patterns, the subject of which has attracted many researchers in data mining, is the process of discovering patterns with utility satisfying a minimum predetermined threshold. Many studies have been performed, but finding the suitable minimum utility threshold is problematic, because users cannot predict the appropriate threshold that affects mining performance. To solve this problem,...
Lightweight cryptography (LWC) provides cryptographic solutions for resource-constrained devices such as RFID tags, industrial controllers, sensor nodes, and smart cards. LWC based devices have stringent constraints on power consumption and are vulnerable to side-channel attacks such as Differential Power Analysis (DPA). The existing CMOS-based countermeasures for DPA are not suitable for circuits...
The intense demand for video applications from mobile devices brings a challenge to the hardware design, especially in the energy consumption. This work presents a design space exploration to define energy-efficient cache memory configurations for the ME process considering different video sequences and HEVC encoder configurations. We focus on the Motion Estimation (ME) process, known as the most...
Analog signal sampling is one of the most fundamental topics in engineering sciences. The classical Shannon theorem is proposed for the band-limited signals, and so far it has been a cornerstone in signal processing and communication theory. In this work, we present a group of local time domain theorems for sampling differentiable continuous analog signals through Lagrange interpolation, and show...
An approach is proposed to reasoning problems based on Petri nets (PNs). First, a method is presented modeling a world by describing Boolean variables as PN loops. Second, an algorithm is introduced to rearrange inference rules as conjunctive normal forms (CNFs), and, in turn, CNFs are transformed into linear constraints. Consequently, a knowledge base system (KBS) PN is obtained by designing monitor...
In the context of the Open Network Automation Platform (ONAP), we develop in this paper a resource allocation strategy for deploying Virtualized Network Functions (VNFs) on distributed data centers. For this purpose, we rely on a three-level data center hierarchy exploiting co-location facilities available within Main and Core Central Offices. We precisely propose an active VNFs' placement strategy,...
This paper formulates and studies the problem of distributed filtering based on randomized gossip strategy in order to estimate the state of a dynamic system via all sensors in a network. First we introduce the randomized gossip algorithm by which the fastest averaging strategy can be obtained for a network with an arbitrary topology. Then we combine the randomized gossip algorithm with the information...
Cheetah flows, which are high-rate flows, can cause increased packet delays and losses in other flows. Leveraging the flexibility offered by the NFV paradigm, our proposed Cheetah Flow Identification Network Function (CFINF) uses a novel method in which a new measure, short-duration flight rate, which is the rate of a flight of packets received over a fixed (short) time interval, is computed and compared...
The accuracy provided by traditional sampling-based monitoring approaches, such as NetFlow, is increasingly being considered insufficient to meet the requirements of today's networks. By summarizing all traffic for specific statistics of interest, sketch-based alternatives have been shown to achieve higher levels of accuracy for the same cost. Existing switches, however, lack the necessary capability...
The Ellipsoidal Intersection algorithm aims at fusing two state estimates under a partial knowledge of the cross-correlation of the estimation errors. However, it has been observed that it does not provide an upper bound of all admissible fused mean square error matrices. This paper provides a mathematical tool for an analysis of the fusion under the considered partial knowledge of correlations. The...
In the event of a large blackout in the smart distribution system with distributed generators, a power supply restoration plan for the non-fault blackout regions must be devised quickly. According to the actual operation of the smart distribution network with DG after fault and the prin-ciple of islanding, this paper determines the running range of the island, maintains the power supply of the important...
Biological data is often represented as networks, as in the case of protein-protein interactions and metabolic pathways. Modeling, analyzing, and visualizing networks can help make sense of large volumes of data generated by high-throughput experiments. However, due to their size and complex structure, biological networks can be difficult to interpret without further processing. Cluster analysis is...
The third generation sequencing data exposes great advantage on read length, which extremely benefits the genomic analyses. However, the third generation sequencing data implies error models different from the ones that the second generation data brings. It is suggested to correct sequencing errors, which could significantly reduce false positives in downstream analyses. Existing error correction...
Optical mapping is a high-throughput sequencing technology which carries long-range genome information at no risk of PCR artifacts. On account of its long span, optical maps leave much fewer gaps when used for genome assembly. However, a high risk of errors poses an enormous challenge to optical map assembly. Here we propose an iterative algorithm for de novo optical map assembly. In any iteration,...
Mining multiple gene coexpressions networks allows for identifying context-specific modules, and improving biological function prediction. Frequent subnetworks represent essential biological modules. Existing algorithms for frequent subgraph mining do not scale for large networks. In this work, we propose a greedy approach for mining approximate frequent subgraphs. Experiments on two real coexpression...
Finding motifs in networks usually involves traversing through the network to enumerate all possible subgraphs of a given size, and then determining their statistical uniqueness by sampling subgraphs from many randomly generated networks that share similar features with the original network. Current algorithms for network motif analysis can be categorized into either network-centric or motif-centric...
TCM is a traditional medicine in China and has made great contributions to the Chinese nation and has rich information resources. With the development of information technology, data mining technology is rapidly rising. Under the guidance of Chinese medicine theory, how to combine data mining technology with Chinese medicine to make it serve people has become a new topic. This paper mainly applies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.