The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article analyses effects of price signals on the consumption behavior of household electricity customers. It proposes a systematic analysis process consisting of data preprocessing, aggregation steps and clustering methods. This analysis process was applied to two smart meter datasets (Olympic Peninsula Project, RESIDENS). Large fluctuations in customers' response to the same price signal were...
The task of determining informative sensors and clustering the sensor measurements according to their information content is considered. To this end, the standard canonical correlation analysis (CCA) framework is equipped with norm-one and norm-two regularization terms to estimate the unknown number of field sources and identify informative groups of sensors. Coordinate descent techniques are combined...
Spatial clustering is one of the main methods of data mining and knowledge discovery. DBSCAN algorithm can be found in space with "noise" database clustering of arbitrary shape, is a kind of good clustering algorithm. This paper introduces the basic concept and principle of DBSCAN algorithm, and applies this algorithm to perform clustering analysis distributions of weibo location information...
Large software development projects receive many bug reports and each of these reports needs to be triaged. An important step in the triage process is the assignment of the report to a developer. Most previous efforts towards improving bug report assignment have focused on using an activity-based approach. We address some of the limitations of activity-based approaches by proposing a two-phased location-based...
A wrapper is a program that selectively extracts a necessary part (component) from Web pages. Automatic or semi-automatic wrapper construction is crucial to achieve a fine grained search engine for Web pages. However, this is not an easy task to achieve. This paper proposes a component-based search engine in which the content components gain a high score in the search results. Thus, the required segments...
Clustering validation has long been recognized as one of the vital issues essential to the success of clustering applications. In general, clustering validation can be categorized into two classes, external clustering validation and internal clustering validation. In this paper, we focus on internal clustering validation and present a detailed study of 11 widely used internal clustering validation...
Two damage anomalous filters which were set up by BP neural network have been used to alarm the damage in structural members. After dealing with eigenparameter extracted from damaged and intact structure, different input data is considered for setting up different damage warning anomalous filters. Filter □: the first eight natural frequencies are chosen as input data of network. Filter □: one mode...
Biclustering is usually referred to as the process of finding subsets of rows and columns from a given dataset. Each subset is a bicluster and corresponds to a sub-matrix whose elements tend to present a high degree of coherence with each other. In order to find such structures, the δ-biclustering problem was formulated, being denoted as the problem of finding a set of biclusters limited by a maximum...
Clustering is the process of classifying objects in to different groups by partitioning sets of data into a series of subsets called clusters. Clustering has taken its roots from algorithms like k-means and k-medoids. However conventional k-medoids clustering algorithm suffers from many limitations. Firstly, it needs to have prior knowledge about the number of cluster parameter k. Secondly, it also...
An observed nonlinear dynamics is observable if the mapping from initial condition to output trajectory is one to one. The standard tool for checking observability is the observability rank condition but this only gives a yes or no answer. It does not measure how observable or unobservable the system is. Moreover it requires the ability to differentiate the dynamics and the observations. We introduce...
This paper discusses the robust fault detection design for the criteria such as ??-/????,??2/???? and????/???? in which Gd, the transfer function from disturbance to the measurement output, is a tall transfer matrix and Dd is not full column rank. It is shown that the faults in a subspace can be made arbitrarily sensitive, while the faults in the complementary subspace have bounded sensitivities that...
Nowadays, the environment risk of mining area is a very serious problem. And mining area environmental impact of a variety of uncertainties, from the engineering point of view can be divided into land pollution, water pollution, air pollution, noise pollution and solid waste pollution. In the paper, an evaluation index system of mining area risk is established by using the triangular fuzzy number...
In the process of data mining, a major obstacle of using mathematical analysis to study the patterns and trends hidden in the data is the specific sample points existed in large-scale data sets. According to the ratio of specific sample points to the sample size, taking into account other factors at the same time, specific sample points may be divided into true and false specific sample points. For...
How to effectively detect and identify permanent scatterers (PS) from SAR images is one of the crucial procedures in PS interferometric system. In this paper, a new method of PS detection is presented by using the wavelet multi-scale product and wavelet modulus maxima according to the PS targets' features and the characteristics of speckle noise in SAR image. This paper analyzed the theory of wavelet...
This paper presents a study on the effect of input noise on the detect index of structural damage. The main procedures include that, for some structures with small damage, the different dynamics response are obtained under the given input function and various input noise level, and then, the structural damage index is constructed using the energy spectrum of the sub-signal decomposed by wavelet analysis...
A new method is proposed for speckle noise suppression and water objects extracting from synthetic aperture radar (SAR) imagery based on sequential nonlinear filtering and independent component analysis. The distribution of SAR image data with multiplicative speckle noise is non-Gaussian and its parameters are unknown. Logarithmic quantification is utilized to transform multiplicative speckle noise...
In this article we propose a technique to detect the reference point of a fingerprint based on the main supposition that the crests belonging to the superior area of reference point usually have a orientation quantized of 0??. To take advantage of this fact it is accomplished an analysis of the orientation image considering their multiple levels of representation in relation to their values of quantization...
Secret image sharing is a technique to share the secret among n participants. Each participant has meaningless, noise like shares. The secret image is revealed if any k of the shares are gathered. This scheme uses polynomial based (k, n) secret sharing approach proposed by Shamir in 1979. In 2007, Chen et al. proposed a new secret image sharing method that uses quadratic residues. Their scheme restricts...
Identifying similarity of strings is an essential step in data cleaning and data integration processes. However, information on the Web is mostly composed of semi-structured and unstructured data, and mixes with a variety of inaccurate information, such as noise data, repeat characters and the abbreviated name. This makes traditional string similarity algorithms aiming at some particular environment...
A Rao-Blackwellised particle filtering approach for tracking multiple simultaneously active and time-varying number of speakers is investigated. A novel measurement extraction method appropriate for the scenario of multiple sources is proposed based on a time-frequency masking technique, in which each source is represented separately by a joint gain-ratio and time-delay histogram. An existing Rao-Blackwellised...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.