The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Prioritizing genes according to their association with a disease allows researchers to explore genes in more informed ways. Although some useful algorithms have been developed, they are based on single gene importance, gene interaction networks, or gene modules with little consideration of relative gene importance in the context of modules. In this paper, we propose to prioritize genes considering...
Ligand-based Virtual screening became a standard in-silico complement to the wet laboratory screening in small molecules discovery. It utilizes prior knowledge about molecules to rank a set of candidate molecules with yet unknown activity. Virtual screening software is often implemented as a specialized screening tool or as a part of a drug-discovery suite where ligand-based screening is one of the...
In this paper, we consider a Device-to-Device (D2D) cellular network in which idle users can work as relays between cell users and the base station to improve their data rate. The relaying induces a cost for the User Equipment Relays (UER), that should be compensated with a payment from the mobile operator so that UERs accept to offer the service. The problem hence arises for the operator to match...
As an SNS, Twitter is popular because users can post their emotions as a short message easily. Emotional tweets may influence user relationships. In our previous study, we found that positive users construct mutual relationships in Twitter. Keyword matching with emotional word dictionaries was used to detect positive users. The problem of keyword matching is the limitation of word number. To solve...
This paper is concerned with the consensus problem for general first-order multi-agent systems over undirected topology. Under the assumption that the topology is connected and every agent receives neighbors information with time-varying communication delay, allowable delay bound depending on the agent dynamics, topology structure and the control gain is obtained. In particular, in case of first-order...
Order-batching is a common practice in orderpicking» which can reduce the total picking time if the orders have many relevant in Multi-Shuttle Warehouse System. In this paper, the performance of different order-batching methods that are made up of one seed-order selection rule and one accompanying-order selection rule is investigated. A seed-order selection rule selects the first order (i.e. the seed...
The prevalence of bridging defects makes bridging fault models important to consider during fault simulation and test generation. The large number of bridging faults that can be defined for a circuit led to the development of procedures for selecting subsets of bridging faults that are likely to occur based on the circuit layout, and hard-to-detect bridging faults whose coverage provides a more effective...
This paper considers global practical tracking for a class of nonlinear systems with unknown relative degree, unknown control direction and non-parametric uncertain nonlinearities. Different from the existing results, known upper bound is not required for the unknown relative degree, which makes it impossible to design a filter with fixed dimension. To compensate the multiple uncertainties, a novel...
According to the tensor diffusion theory, this paper proposes a novel active contour model for image segmentation in the level set formulation. Firstly, we define an external energy term using the trace-based tensor diffusion equation, which can locate the evolution curve to the neighborhood of one target boundaries adaptively. So it will enhance the robustness of the model to the initialization of...
The global synchronization problem of complex dynamical networks with memristive neural networks (MNNs) nodes is studied in this paper. By using the Filippov solution and some set-valued maps, the synchronization framework of complex networks with MNNs nodes is presented. Some sufficient criteria ensuring the considered complex networks to be globally exponentially synchronized are derived by using...
The Domain Name System (DNS) has evolved to support the exponential growth of the Internet, by relying heavily on a highly distributed infrastructure. Nevertheless, trust between server must exist in order to guarantee correct functioning of the system, which is prone to attacks and errors. The Domain Name System Security Extensions (DNSSEC) is the current extension of the DNS system to provide security...
Our research group at Nagoya Institute of Technology is developing “MMDAgent” as a voice interaction toolkit. Using MMDAgent, system developers can create various speech dialogue contents. When developers create voice interaction contents, it is important to consider user needs. Therefore, an approach is necessary to elicit preference information of the user. In this paper, we propose a method to...
Recently, the state estimation issue of a TCP/IP network has attracted much attention from different communities. In this paper, a terminal sliding-mode observer (TSMO) is proposed based on a fluid-flow model of a TCP/IP network to estimate traffic flow states. A novel control strategy is proposed to fasten the convergence of the estimation error for average congestion window (ACwnd). Furthermore,...
Recommender systems, inferring users' preferences from their historical activities and personal profiles, have been an enormous success in the last several years. Most of the existing works are based on the similarities of users, objects or both that derived from their purchases records in the online shopping platforms. Such approaches, however, are facing bottlenecks when the known information is...
In this paper, a dynamic output feedback tracking controller is studied for a class of discrete-time system with multiple disturbances. A composite anti-disturbance tracking controller is proposed based on disturbance observer and H∞ control schemes, which can guarantee system have a good anti-disturbance performance. A solvable sufficient condition is given via linear matrix inequality. Finally,...
In this paper, we empirically analyze the spatial distribution of Chinese cities using a method based on triangle transition. This method uses a regular triangle mapping from the observed cities and its three neighboring cities to analyze their distribution of mapping positions. We find that obvious center-gathering tendency for the relationship between cities and its nearest three cities, indicating...
Network Planning and Fault Location, Isolation and Supply Restoration (FLISR) are important functions of power distribution automation systems. We model these functions as a combinatorial optimization graph problem called the Capacitated Spanning Forest Problem (CSF), defined as the problem of creating a spanning forest with a capacity constraint on each tree bounding its total weight. We present...
Microgrids rely on energy management levels to optimally schedule their components. Conventionally, the research in this field has been focused on the optimal formulation of the generation or the demand side management separately without considering real case scenarios and validated only by simulation. This paper presents the power scheduling of a real site microgrid under a price-based demand response...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.