The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Clustering is a classic topic in optimization with k-means being one of the most fundamental such problems. In the absence of any restrictions on the input, the best known algorithm for k-means with a provable guarantee is a simple local search heuristic yielding an approximation guarantee of 9+≥ilon, a ratio that is known to be tight with respect to such methods.We overcome this barrier...
Wireless Mesh Networks (WMNs) employ hybrid distributed mobile networks with instant deployment and capabilities Such as: self_healing, self_organization and self_configuration. These abilities make WMNs a likely technology for incident communication. An Incident Area Network (IAN) requires a reliable and efficient routing path in an environment, where infrastructure-based communications have been...
The evaluation of recommender system is often biased towards accuracy, which is hard to balance all participants' interests. In this paper, a novel recommendation strategy using expanded neighbor collaborative filtering (ECF) is presented. Different from the standard collaborative filtering (CF), this recommendation strategy takes into account the second-order neighbors, which are expected to contribute...
Most of the effort in image quality assessment (QA) has been so far dedicated to the degradation of the image. However, there are also many algorithms in the image processing chain that can enhance the quality of an input image. These include procedures for contrast enhancement, deblurring, sharpening, up-sampling, denoising, transfer function compensation, and so on. In this paper, possible strategies...
Configuring an Evolutionary Algorithm (EA) can be a haphazard and inefficient process. An EA practitioner may have to choose between a plethora of search operator types and other parameter settings. In contrast, the goal of EA principled design is a more streamlined and systematic design methodology, which first seeks to better understand the problem domain, and only then uses such acquired insights...
Distance-based and density-based clustering algorithmsare often used on large spatial and arbitrary shape ofdata sets. However, some well-known clustering algorithms havetroubles when distribution of objects in the dataset varies, andthis may lead to a bad clustering result. Such bad performancesare more dramatically significant on high-dimensional dataset. Recently, Rodriguez and Laio proposed an...
In this paper, we introduce and explore the Frechet metric between the trees. We have used the metric to find similarities between polygons. This approach is used to quantify the quality of image segmentation.
The purpose of this work is to compare temporal gait parameters from three different IMU locations to the gold standard force platform. 33 subjects (12 F, 21 M) performed twenty gait trials each while wearing inertial measurement units (IMUs) on the trunk, both shanks and both feet. Data was simultaneously collected from a laboratory embedded force plate. Step times were derived from the raw IMU data...
Herein it is proposed a simple algorithm for automatic hopping among mining pools in the Bitcoin network. The hopping ceases to occur when the best pool to be mined is found. The choice of the best pool is based on statistical data generated and collected during the operation of the Bitcoin network. Experiments for validation and performance analysis are based on mining networks built specifically...
Multi-Agent systems enable us to simulate swarm behaviour wherein intelligence emerges from the collective instead of the individual. The problem of terrain coverage forms a prominent field of research in multi-agent systems with wide-ranging real-life applications. We propose a new multi-agent framework called the Scout-Explorer framework which utilizes global terrain knowledge to cover a previously...
This contribution deals with multi-instance classification, where the labeled data samples are bags composed on instances instead of labeled instances as in standard classification. Every bag contains a number of traditional instances (described by a number of attributes) and the number of instances is not usually the same in all the bags. So, the whole bag is labeled but the instances that compose...
Nowadays, there are a lot of online repositories containing thousands of very useful educational resources for the educational community. To take full advantage of these resources requires a simple, direct and effective access to those resources that are of interest, therefore, it is necessary that those resources are ordered or ranked based on some criteria? -- that is to say, they have to be classified...
Linear programming has played a key role in the study of algorithms for combinatorial optimization problems. In the field of approximation algorithms, this is well illustrated by the uncapacitated facility location problem. A variety of algorithmic methodologies, such as LP-rounding and primal-dual method, have been applied to and evolved from algorithms for this problem. Unfortunately, this collection...
Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the routing process, needed for storing and retrieving resources within a DHT (Distributed Hash Table), extremely difficult and time consuming. We investigate current possible countermeasures and...
Coronary Wave Intensity Analysis (cWIA) is a technique capable of separating the effects of proximal arterial haemodynamics from cardiac mechanics. The cWIA ability to establish a mechanistic link between coronary haemodynamics measurements and the underlying pathophysiology has been widely demonstrated. Moreover, the prognostic value of a cWIA-derived metric has been recently proved. However, the...
A number of biclustering algorithms have been introduced to discover local gene expression patterns in micro array data. Also, High-throughput biological techniques such as ChIP-seq have generated massive genome-wide data and offered ideal opportunities where biclustering can help unveil underlying biological mechanisms. Chromatin immunoprecipitation with massively parallel sequencing (ChIP-seq) has...
There is an increasing demand for converged solution for multi-standard radio processors to support existing and future standards. In this work, heterogeneous multi-processor platform is proposed for multi standard wireless communication system which is programmable and scalable in adapting to future standards. Channel decoding algorithms form important constituent of wireless communication system...
A vector optimizer, based on population based incremental learning (PBIL) method, is proposed and used to study a hard engineering inverse problem with good results.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.