The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The non-holonomic behavior and the presence of dynamic singularities are only a few factors that make collision-avoidance path planning of Space Manipulators (SMs) such a hard task. Additionally, contributions in the field of motion planning of SMs often concentrate in the point-to-point strategy, with particular interest in the complex dynamics of such systems. As a criterion, collision-avoidance...
While observation sets for an individual object in orbit can be quite data-sparse, the sheer number of objects in orbit makes the tracking problem as a whole data-rich. As such it is infeasible for humans to process these measurements manually. While orbit determination procedures are largely automated the resulting solutions can be quite poor when the assumed dynamics are flawed due to mismodeled...
Cache technology has emerged as a promising approach for distributed web systems to mitigate the web server's data access performance bottleneck. In this paper, we propose a decentralized load balancing architecture. The cache system takes advantage of the decentralized architecture for providing scalability and high availability. It can provide content requested by a user if it is cached in any of...
For map building purposes it is necessary to distinguish between moving and not moving objects, because moving objects might falsify map matching procedures. This paper presents a new approach of a grid based map building algorithm which represents an extension of occupancy grids. As well as it its archetype, the algorithm can easily be used for 2d or 3d time-dependent map building procedures. The...
A major problem in Wireless Mesh Network is capacity decrease due to wireless interference. A wireless mesh router with multiple routers and channels is capable of reducing network interference. Static channel allocation and dynamic channel allocation are types of channel allocation. Adaptive Dynamic Channel Allocation protocol (ADCA) is dynamic channel allocation protocol which decreases the packet...
Vehicular ad-hoc network (VANET) is an important technology for future development of intelligent transportation systems. VANETs are being used as a tool for improving road safety by warning the drivers about accidents occurred ahead of them or for providing internet access to the passengers via gateways along the road. Although VANET is an application of MANETs but routing of data packets is more...
The performance of Emergency Management Systems (EMS) in confined spaces is highly dependent on the decision algorithm employed for the safe navigation of the evacuees to the available exits. In the algorithm proposed in this paper, we have considered evacuees under two groups, based on their age and physical condition, and we tailor two routing metrics, one for each group, in finding suitable paths...
The dynamic TDD DL/UL configuration based on instantaneous asymmetric DL/UL traffics is an effective way to increase the radio resource utilization. However, free reconfiguration of each cell's TDD DL/UL configuration may result in significant co-channel co-subframe DL-UL interference. In this paper, we propose and evaluate a novel centralized cell clustering interference mitigation scheme for dynamic...
Gravitational microlensing exploits a transient phenomenon where an observed star is brightened due to deflection of its light by the gravity of an intervening foreground star. It is conjectured that this technique can be used to measure the abundance of planets throughout the Milky Way. In order to undertake efficient gravitational microlensing an observation schedule must be constructed such that...
Coverage-based fault localization is a spectrum-based technique that identifies the executing program elements that correlate with failure. However, the effectiveness of coverage-based fault localization suffers from the effect of coincidental correctness which occurs when a fault is executed but no failure is detected. Coincidental correctness is prevalent and proved as a safety reducing factor for...
Recent research activities have recognized the essentiality of node mobility for the creation of stable, scalable and adaptive clusters with good performance in mobile ad hoc networks (MANETs). In this paper, we propose a distributed clustering algorithm based on the group mobility and a revised group mobility metric which is derived from the instantaneous speed and direction of nodes. Our dynamic,...
Concurrently executing diverse independent applications on a many-core processor with hundreds of cores requests allocating application tasks to minimize communication contention and communication cost. In this paper, we propose a novel application allocation algorithm to assign applications onto a many-core processor with considering communications between tasks and contentions on network channels...
The problem of efficient decoding of polar codes is considered. A multilevel bucket structure is proposed for implementation of the stack in the sequential decoding algorithm. This data structure reduces the complexity of stack operations with respect to the implementation based on a red-black tree.
In this paper, a fuzzy c-means algorithm based on an adaptive L2-Wasserstein distance for histogram-valued data is proposed. The adaptive distance induces a set of weights associated with the components of histogram-valued data and thus of the variables. The minimization of the criterion in the fuzzy c-means algorithm is performed according three steps such that the representation, the allocation...
In this paper, we examine data-driven aspects of consensus networks influenced by a stubborn agent. In particular we show that the judicious placement of the stubborn agent can be achieved based on snapshots of the data generated by the network through estimating the appropriate eigenvector of the perturbed Laplacian matrix. The exact dynamic mode decomposition algorithm is employed for estimating...
A Mobile Ad hoc Network (MANET) is a multihop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network...
This article addresses the issue of social image search result diversification. We propose a novel perspective for the diversification problem via Relevance Feedback (RF). Traditional RF introduces the user in the processing loop by harvesting feedback about the relevance of the search results. This information is used for recomputing a better representation of the data needed. The novelty of our...
Database-as-a-service providers typically use replication to meet the performance and availability guarantees demanded by their customers. A crucial problem in this context is that of placing the replicas on machines in such a way as to meet these guarantees while optimally utilizing the available resources, despite having incomplete or erroneous a priori knowledge of the workload characteristics...
The SDN architecture decouples the control plane and data plane, and multiple controllers are adopted to solve the scalability and reliability problem in SDN. However, most of the researches are focused on the control architecture and ignore the controller placement problem. Moreover, the mapping between the switches and controllers are static in current proposals, which will lead to the load unbalance...
Finding a compact formal representation of a processor instruction set is important for easier comprehension by the designer, as well as for synthesis of an efficient hardware implementation of the processor's microcontroller. We present a new heuristic algorithm for deriving compact models of processor instruction sets. The algorithm is based on finding similarities between pairs of instructions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.