The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The origin-destination (O-D) matrix is a known indicator of individual and group mobility in transport science, an invaluable input for socio-economic activity assessment of the community, and a tool for strategic planning and policy developments. The abundance of mobility-related data allows for expansion of the ODM towards the description of the over-all socio-economic activity, of which the transport...
This paper firstly analyzes the shortcoming of a self-organizing incremental neural network (SOINN), then proposes a novel online similarity metric and online adaptive kernel density estimator to handle 2 basic problems of unsupervised learning: clustering and density estimation. Our approach is an extension of the standard Gaussian process, online density estimator and SOINN; not only does it fully...
Drilling is a repetitive, dangerous and costly process and a strong candidate for automation. We describe a method for autonomously controlling a rotary drilling process as it transitions through multiple materials with very different dynamics. This approach classifies the drilling medium based on real-time measurements and comparison to prior drilling data, and can identify the material type, drilling...
We consider the problem of scheduling a set of sensors to observe the state of a discrete-time linear system subject to a limited energy budget. Our goal is to devise a sensor schedule that minimizes the mean squared error (MSE) of an optimal estimator (i.e., the Kalman Filter). Both the minimum-MSE and the minimum-cardinality optimal sensor scheduling problems are inherently combinatorial, and computationally...
Registration of diffusion weighted datasets remains a challenging task in the process of quantifying diffusion indexes. Respiratory and cardiac motion, as well as echo-planar characteristic geometric distortions, may greatly limit accuracy on parameter estimation, specially for the liver. This work proposes a methodology for the non-rigid registration of multiparametric abdominal diffusion weighted...
Packing and placement are two crucial stages for FPGA realization. In the design flow, the basic logic units, such as look-up-tables (LUTs) and flip-flops (FFs), have to be merged into configurable logic blocks (CLBs) before placement. How the basic logic blocks are clustered in the packing stage has a great impact on the placement quality. This work presents an analytical placement framework for...
This paper provides a mathematical method for airspace capacity estimation. It is motivated by the need to assess the impact of unmanned aircraft systems on low altitude airspace operations. We define capacity as a minimum of metric-specific phase transition thresholds. The definition is flexible to accommodate a wide variety of metrics defined for the airspace and hence, can be used to compare different...
Data accuracy is one of the central criteria for data quality. Bayesian network (BN) learning algorithm based on independence test is a promising approach for assessing data accuracy. However, it may get stuck in out-of-memory exception when confront with large network and small percentage of inaccurate data. In this paper, we extend the method for data accuracy assessment to search & scored-based...
Key Frame Extraction (KFE) is an important block involved with any search process on large scale video logs. KFE has wide applications in fields like Content based retrieval systems, Video Summarization, compression and Video content management. The conventional algorithms exploit the pixel similarities or histogram distributions between frames of video, ignoring the key frame metric information in...
We present a variant of the regularized dual averaging (RDA) algorithm for stochastic sparse optimization. Our approach differs from the previous studies of RDA in two respects. First, a sparsity-promoting metric is employed, originated from the proportionate-type adaptive filtering algorithms. Second, the squared-distance function to a closed convex set is employed as a part of the objective functions...
We consider problems where one wishes to represent a parameter associated with a signal source - subject to a certain rate and distortion - based on the observation of a number of realizations of the source signal. By reducing these indirect vector quantization problems to a standard vector quantization one, we provide a bound to the fundamental interplay between the rate and distortion in the large-rate...
The IEEE 802.11ad waveform can be used for automotive radar by exploiting the Golay complementary sequences in the preamble of a frame. The performance of radar, however, is limited by the preamble structure. In this paper, we propose an adaptive preamble design that permits a trade-off between radar parameters' estimation accuracy and communication rate. To quantify this trade-off, we propose a minimum...
In this paper we present the INESC Key Detection (IKD) system which incorporates a novel method for dynamically biasing key mode estimation using the spatial displacement of beat-synchronous Tonal Interval Vectors (TIVs). We evaluate the performance of the IKD system at finding the global key on three annotated audio datasets and using three key-defining profiles. Results demonstrate the effectiveness...
Dynamic texture describes images sequence that continuously demonstrates movement of pixels intensity change patterns in time, for example, smoke, fire, waterfall, sea-waves, foliage, traffic on highway and so on. Motion coherence analysis on dynamic textures is usually observed through their motion vector fields. We implement strategic motion coherence analysis to evaluate the coherent motion on...
This paper presents an effective design space exploration strategy for the development of dependable systems using selective hardening techniques based on software. Instead of design space exploration approaches based on brute-force or time-consuming fault injection experiments, this strategy is grounded in an early estimation of the register file criticality in microprocessor-based systems. This...
Exploring the design space of the memory hierarchy requires the use of effective methodologies, tools, and models to evaluate different parameter values. Reuse distance is of one of the locality models used in the design exploration and permits analytical cache miss estimation, program characterization, and synthetic trace generation. Unfortunately, the reuse distance is limited to a single locality...
Floating Content (FC) has recently been proposed as an attractive application for mobile networks, such as VANETs, to operate opportunistic and distributed content sharing over a given geographic area, namely Anchor Zone (AZ). FC performances are tightly dependent on the AZ size, which in literature is classically chosen by the node that generates the floating message. In the present work, we propose...
This paper presents an online algorithm for mobile user speed estimation in 3GPP Long Term Evolution (LTE)/LTE-Advanced (LTE-A) networks. The proposed method leverages on uplink (UL) sounding reference signal (SRS) power measurements performed at the base station, also known as eNodeB (eNB), and remains effective even under large sampling period. Extensive performance evaluation of the proposed algorithm...
We employ network metrics on relational variables of interest to control for econometric estimation bias, inefficiency and inferential problems from non-spherical, network induced disturbances in sampled, unknown behaviorally driven networks. Our analysis follows a two-step procedure to establish a conceptual baseline and then integrate real-world data and questions pertinent for statistical inference...
Detection of corner is the most essential process in a large number of computer vision and image processing applications. We have mentioned a number of popular contour-based corner detectors in our paper. Among all these detectors chord to triangular arm angle (CTAA) has been demonstrated as the most dominant corner detector in terms of average repeatability. We introduce a new effective method to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.