The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Opinion mining and demographic attribute inference have many applications in social science. In this paper, we propose models to infer daily joint probabilities of multiple latent attributes from Twitter data, such as political sentiment and demographic attributes. Since it is costly and time-consuming to annotate data for traditional supervised classification, we instead propose scalable Learning...
Steganographic techniques are used to transmit secret information using a carrier file without visibility during communication. In this paper, we proposed an improved RGB image steganographic technique for secured communication between two authorized parties. This technique embeds the information within 2nd to 8th bit position of blue (B) or green (G) component or both of a pixel throughout the blue...
This paper addresses a robust methodology for developing a statistically sound, robust prognostic condition index and encapsulating this index as a series of highly accurate, transparent, human-readable rules. These rules can be used to further understand degradation phenomena and also provide transparency and trust for any underlying prognostic technique employed. A case study is presented on a wind...
We propose a new approach to detect and quantify the periodic structure of dynamical systems using topological methods. We propose to use delay-coordinate embedding as a tool to detect the presence of harmonic structures by using persistent homology for robust analysis of point clouds of delay-coordinate embeddings. To discover the proper delay, we propose an autocorrelation like (ACL) function of...
Data glitches are errors in a data set, they are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking, and we propose a novel, statistically rigorous indicator called masking index...
Audio data hiding techniques have been applied various applications such as audio watermarking and steganography. In this paper, we propose an audio data hiding method based on the phase information of the modulated complex lapped transform (MCLT) coefficients and evaluate the performance in terms of audio quality and robustness. To embed and extract the data, the proposed technique modifies the phases...
We report on recent advances in the project TAKE on the Scientist's Workbench, a platform demonstrating the use of natural language processing (NLP) to support scientists or other knowledge workers in fast and better access to digital document content. We focus on sentence-wise NLP analysis of electronically available scientific paper texts. With the generated NLP annotations, we are able to provide...
The R*-tree, as a state-of-the-art spatial index, has already been applied in many fields. But in high-dimensional space its performance is not better than sequential scan algorithm. To solve time-series retrieval problem, we introduce a new index structure - Hierarchical Index Tree. Each time-series of database is divided into several segments with same length, each segment of which corresponds to...
It is always the important and key research issue to estimate the robustness performance of flexible manufacturing system in the field of the advanced production management technology. A robustness evaluation method is proposed considering the static and dynamic manufacturing environment. The robustness is regarded as the combination of the scope of changes and the errors maintain capacity. Delphi...
We study how the maximum/minimum gain of a decentralized controller influences the maximum/minimum gain of the corresponding closed loop transfer function, and provide lower bounds on the best closed-loop performance achievable by decentralized controllers satisfying additional frequency domain restrictions. These bounds are obtained using generalizations of the structured singular value and approximated...
This paper discusses the robust fault detection design for the criteria such as ??-/????,??2/???? and????/???? in which Gd, the transfer function from disturbance to the measurement output, is a tall transfer matrix and Dd is not full column rank. It is shown that the faults in a subspace can be made arbitrarily sensitive, while the faults in the complementary subspace have bounded sensitivities that...
This paper considers robust pole assignment problem for discrete-time linear periodic systems via linear periodic output feedback. To character a measure for the sensitivity of the eigenvalues of the closed-loop system with respect to perturbations in the coefficient matrices, a robustness index for periodic systems is proposed, which can be regarded as a generalization of robustness index of normal...
In this paper we propose a novel technique for the corner detection of plane curves. This corner detector is given through the triangle-area representation method, whose underlying idea rests on the maximum property of the local area at the corner point. Therefore, the method can be realized easily and is of high accuracy under some appropriate scale ( triangle-length scale ). The experimental results...
Polychlorinated diphenyl furans is included in the blacklist of so-called persistent pollutants. The poisonousness of Polychlorinated diphenyl furans has relation to its structure. Some index of polychlorinated diphenyl furans were defined and calculated by the technique of molecule graphics and AMl. Quantitative structure - activity relationship for estimating toxicity of polychlorinated diphenyl...
Local descriptors have been extensively used in CBIR systems, where their robustness to intense geometric and photometric transformations allows the identification of a target object/image with great reliability. However, due to their excessive discriminating power, their application to the retrieval of complex categories is challenging. The introduction of the technique of visual dictionaries (also...
In this paper, a novel blind data hiding technique based on quantization is proposed. Quantization is performed in a special domain which converts one dimensional signal to a 2-D one named Point to Point Graph (PPG). Basis of the method is on the separation of this domain into two portions; while, only one portion is quantized. Furthermore, in the data extraction procedure, by using the unquantized...
It is now well understood that l1 minimization algorithm is able to recover sparse signals from incomplete measurements and sharp recoverable sparsity thresholds have also been obtained for the l1 minimization algorithm. In this paper, we investigate a new iterative reweighted l1 minimization algorithm and showed that the new algorithm can increase the sparsity recovery threshold of l1 minimization...
Many image watermarking methods have been proposed over the last decade; however, most of them only focus single or two purposes, verification of copyright and integrity. This paper proposed a multipurpose watermarking method based on blind vector quantization (BVQ) and there are three purposes, copyright protection, integrity verification, and distinguish between malicious and non-malicious manipulations,...
In this paper, a zero-watermarking algorithm based on fuzzy adaptive resonance theory (ART) is proposed. There are three roles in the algorithm: the signer, the verifier, and trusted authority (TA). The signer is responsible for constructing the verification information of the host image with fuzzy ART, the verifier can be anyone who wants to check the ownership of the host image, and TA is responsible...
The Linking Open Data (LOD) initiative has motivated numerous institutions to publish their data on the Web and to interlink them with those of other data sources. But since LOD sources are subject to change, links between resources can break and lead to processing errors in applications that consume linked data. The current practice is to ignore this problem and leave it to the applications what...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.