The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Word embedding in the NLP area has attracted increasing attention in recent years. The continuous bag-of-words model (CBOW) and the continuous Skip-gram model (Skip-gram) have been developed to learn distributed representations of words from a large amount of unlabeled text data. In this paper, we explore the idea of integrating extra knowledge to the CBOW and Skip-gram models and applying the new...
Quality models are regarded as a well-acceptedapproach for assessing high-level abstract quality characteristics(e.g., maintainability) by aggregation from low-level metrics. However, most of the existing quality models adopt the weightedlinear aggregation method which suffers from a lack of consensusin how to decide the correct weights. To address this issue, wepresent an automated aggregation method...
Controlling the spread of infectious diseases in large populations is animportant societal challenge. Mathematically, the problem is best captured as acertain class of reaction-diffusion processes (referred to as contagionprocesses) over appropriate synthesized interaction networks. Agent-basedmodels have been successfully used in the recent past to study such contagionprocesses. We describe EpiSimdemics,...
This paper deals with usage of single-chip computers for controlling MIMO systems. The aim is to design a general control system, which is easy to use and easy to implement for other MIMO systems. The performance of control system is limited by the performance of used MCU (PIC 16F876A) and its peripherals (2×PWM, 8×A/D, MAC, …). The key tasks of MCU are communication with upper level and implementation...
The amount of software in modern vehicles is constantly growing. However, the risk for functional and quality deficiencies increases simultaneously with size. This results in industry for example in inevitable and unexpected refactorings of software models, which is slowing down development processes in turn. In this industrial case study, we evaluate model growth predictors applied to foresee critical...
Drilling is a repetitive, dangerous and costly process and a strong candidate for automation. We describe a method for autonomously controlling a rotary drilling process as it transitions through multiple materials with very different dynamics. This approach classifies the drilling medium based on real-time measurements and comparison to prior drilling data, and can identify the material type, drilling...
Increasing volumes of data and the desire for realtime query capability make the development of efficient streaming algorithms for data analytics valuable. Streaming graph algorithms that avoid unnecessary recomputation through clever application of data dependency analysis are often more complex to derive than their static counterparts. This paper discusses a method to derive algorithms for streaming...
In this paper, we study the problem of predicting the visual quality of a specific test sample (e.g. a video clip) experienced by a specific user, based on the ratings by other users for the same sample and the same user for other samples. A simple linear model and algorithm is presented, where the characteristics of each test sample are represented by a set of parameters, and the individual preferences...
We consider a class of planar pursuit-evasion games with multiple pursuers and a single evader. The evader must reach a target set while avoiding the pursuers which relay the pursuit among themselves. We model this multi-player dynamic game as a two-player multi-stage game. In particular, all the pursuers are modeled as one entity, which we refer to as the super-pursuer, which can deploy only one...
As a fundamental task in automated video surveillance, person re-identification, which has received increasing attention in recent years, aims to match people across non-overlapping camera views in a multi-camera surveillance system. It has been reported that KISS metric learning has been followed by most of the previous supervised work because of its state of the art performance for person re-identification...
In this paper, a monitoring method for calculating the malodor level by measuring the concentration of ammonia gas and hydrogen sulfide gas in the barn is established. This method is used to monitoring the level of malodor in the traditional henhouse and that with automatic ventilation and cleaning equipment. The monitoring results showed that in the livestock and poultry production process, timely...
Underwater Sensor Networks (USN) has a wide range of aquatic application that is totally different from terrestrial sensor network. The nodes of USN has a peculiar character tics like float mobility, limited bandwidth and energy, signal and link quality, routing challenges and its cost and high error probability. This nature if USN degrades the performance in terms of throughput and lifetime. This...
Diffeomorphic image registration algorithms are widely used in medical imaging, and require optimization of a high-dimensional nonlinear objective function. The function being optimized has many characteristics that are relevant for optimization but are typically not well understood. Due to that complexity, most authors have used a simple gradient descent, but it is not often discussed how step sizes...
Distributed systems consist of several heterogeneous computing devices. In such systems, the total cost of ownership (TCO) includes capital expenditure such as purchasing of equipment like servers, switches, etc. and operational expenditure such as human salary, electricity bills, etc. Thusly, power consumption is a big portion of operational expenditure. The high rate of power wastage is directly...
The networked nature of many system-of-systems (SoS) requires consideration of resilience in their design and analysis. We present an approach for the design space exploration of such resilient SoS networks. We model candidate network designs using complex network methods, and generate and analyze a network design space with Design of Experiments. Results show an interaction between adaptation strategy...
We analyze online social data to model social interactions of users in recommender systems: i) Rating prediction, and ii) detecting spammers and abnormal user rating behaviors. We propose a social trust model using matrix factorization method to estimate users taste by incorporating user-item matrix. The effect of users friends tastes is modeled based on centrality metrics and similarity algorithms...
LTE networks are deployed to increase capacity and coverage especially for the indoor and cell-edge mobile users. However, such deployment comes with major challenges, radio resource management and inter-cell interferences. Fractional Frequency Reuse mechanism (FFR) is one of the most effective interference avoidance techniques. In this paper, we evaluate an existing adaptation process that adjusts...
Similarity computations are crucial in various web activities like advertisements, search or trust-distrust predictions. These similarities often vary with time as product perception and popularity constantly change with users' evolving inclination. The huge volume of user-generated data typically results in heavyweight computations for even a single similarity update. We present I-SIM, a novel similarity...
Microstrip and slot antennas are often used in aerospace vehicles because of their advantages of simplicity in construction, lightweight and their ability to conform to the shape of the space-borne structures. In practice, a large number of aerospace bodies or their significantly scattering portions can be conveniently approximated by Quadric Surfaces of Revolution (QUASORs) or Quadric Cylinders (QUACYLs)...
We have reconstructed microwave tomographic images of the Supelec breast phantom using our imaging fixture in combination with a multi-channel vector network analyzer. During this study we were able to recover images without the support of a priori information over a broad frequency range — 1100–1900 MHz. We then fitted the spectral values at each pixel within the field of view to a Cole-Cole curve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.