The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Indoor localization has become a hot topic thanks to the fast development of wireless local area networks. The basic localization scheme can be divided into two approaches: fingerprint-based and lateration-based. In this paper, we propose a novel localization method that combines the fingerprint method and lateration method. Fingerprint-based method is first used for sub area determination and lateration...
The purpose of this study is to apply the APOS theories by using the GSP software to design the dynamic digital materials for learning mathematical linear functions. The APOS cognitive theory was developed by Ed Dubinsky et al. originally, however it was rooted on the structured programming ISETL and applied on the function domain. We extend the theory to the visual object on developing the linear...
In this paper, LLC resonant converter simulation with dual closed loop control is demonstrated for Electric Vehicles (EVs) battery charger. To improve efficiency and fast charging conditions, switching losses must be diminished to have a maximum energy transfer among the variable converter components. The presented dual closed loop control technique is implemented under soft-switching conditions with...
This work is devoted to the multicollision attacks analysis. Known methods of the multicollision attacks counteraction are considered and main trends of these methods development are determined. Methods of data blocks bonding and hash constructions for their implementation are proposed. Theoretical infeasibility analysis of constructions based on these methods is performed and it is shown, that for...
Static analysis has been successfully employed in software verification, however the number of generated warnings and cost incurred in their manual review is a major concern. In this paper we present a novel idea to reduce manual review efforts by identifying redundancy in this review process. We propose two partitioning techniques to identify redundant warnings - 1) partitioning of the warnings with...
An epidemic model with infectivity and recovery in both latent and infected period is introduced. Utilizing the LaSalle invariance principle and Bendixson criterion,the basic reproduction number is found, we prove that the disease-free equilibrium is globally asymptotically stable when the basic reproduction number is less than one. The disease-free equilibrium is unstable and the unique positive...
As the ocean wave energy field continues to mature, developers need a generic modeling methodology to test their designs before building prototypes. A design methodology for a first-pass time-domain simulation is a goal of this work. Built on results from the frequency domain analysis, the general procedure for obtaining time domain results is presented. Wave energy researchers and developers can...
Warped text-lines often appear whenever one performs the digitalization of bound documents using flatbed scanners or digital cameras. Compensating such distortion is an important pre-processing step in document transcription via OCR, for instance. This paper presents an efficient algorithm for text-line segmentation for document images. A typographic study and parameter tuning are done yielding into...
Cooperative Communication is a wireless communication scheme, which gains signal transmission diversity through user cooperation. In cooperative communications, the existing relaying strategies include amplify-and-forward (AF) and decode-and-forward (DF). Moreover, cooperative communications through opportunistic relay selection and nonorthogonal signal transmission can further improve the system...
Reliable multicast is a technology used in a number of applications such as multi-receiver file transfer, streaming media, multimedia conferencing, collaborative processing etc. Pragmatic general multicast (PGM) is a reliable multicast transport protocol that runs over a best effort datagram service. Through this paper we propose an efficient loss recovery scheme for PGM. In our proposal a PGM router...
This paper discusses the use of EDMA in real time image processing systems, high-resolution panoramic vision unfolding system based on TMS320DM642, which continuously update dynamic image data in ping-pong cache. And analyze the cache performance. The cache strategy is based on the channel chaining capability of the EDMA channel controller. Each EDMA transfer synchronized with another transfer. Then...
An algorithm of estimating poles of dynamic systems is proposed. It is proved that poles of rational functions are solutions of an algebra equation which can be obtained by taking backward shift operator. An illustrative example is presented to show the efficiency of estimating poles of systems with distinguished and multiple poles cases.
Efficiency represents an important parameter that characterizes a mechanism or a machine. This value gives fundamental information about the energy that is lost during the process. Machines or mechanisms can be combined in order to build a more complex system. For example, they can be arranged as a series or as a parallel layout. For these cases, the efficiency can be easily evaluated. However, in...
As networked systems increasingly pervade every facet of life, it is quintessential for users to communicate without revealing their identities or the paths of data flow. Chaum Mixes are intermediate nodes or routers that are used to provide anonymity by using cryptographic and batching methods to hide source identities. The anonymity achievable by batching strategies, are however, severely impacted...
In this paper, the properties of a new construction method of aggregation functions from two given ones, called threshold construction, are examined. This class of nonsymmetric functions provides a generalization of t-norms and t-conorms by partitioning the unit interval with respect to only one variable. Fuzzy modeling provides a framework in which relationship of the input and the output can be...
The performance of diffusion least-mean square adaptive networks, considerably deteriorates when communication links between nodes are subject to channel noise. One way to mitigate the effect of noisy links is to amplify the transmitted information among the nodes. Although this solution reduces the effect of channel noise, however, the price for this improvement is an increase in power consumption...
In order to finish the phase unwrapping of multi-baseline InSAR (Interferometric Synthetic Aperture Radar) to combine data with longer and shorter baselines and derive accurate DEMs (Digital Elevation Models), a phase unwrapping model with linear congruent equations is designed and its solution with the Chinese Remainder Theorem (CRT) is presented in detail. In this algorithm, the un-fuzzy phase interval...
In this article the method of exact linearization is applied to pneumatic systems. These systems are used in industrial environments like in glassworks or automotive industry to guarantee an exact and constant air flow. In addition with a subordinate high dynamic pressure control the closed loop reaches the desired setpoint as soon as possible. Although in the transformed system model zero dynamics...
Opportunistic routing is studied as a representative example of location-aware greedy routing schemes. The routing process between an arbitrary source-destination pair is modeled as a directed random walk between the two ends in the underlying graph. The mean number of transmissions as well as the average multi-hop distance between arbitrary nodes are unified under a conceptual measure called expected...
Many solutions proposed in the literature to enforce privacy in presence of location information use, implicitly or explicitly, spatial granularities. However, most of the contributions do not describe the formal and computational properties of this tool in details. In this paper we propose three families of spatial granularities, specifically designed for privacy-aware systems. We mathematically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.