The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We are interested in non parametric density estimation under constraints. It generalises a previous paper which was devoted to density estimation with non-positive kernels. The resulting density approximation improves the estimation (by reducing the bias) but provides negative values. Therefore, we have proposed a projection method on the space of probability densities and an algorithm designed to...
Solar systems are highly penetrating into the electrical networks all over the world currently. Solar radiation is not steady and never will be, and so, a storage system is required to ensure a stable and continuous supply. To increase the reliability of the system whether islanded or network connected, it is better to have a storage system. After all, the decision of whether to use a storage system...
We present and analyze an Electric Vehicle (EV) charging management model for a fast charging station network in a smart grid environment. The proposed model considers a charging station network that provides service to multiple EV charging-classes. The basic feature of the proposed model is when EVs are blocked by their preferred station due to the unavailability of charging outlets, they are prompted...
The change of ship's characteristic length can change scientific researching method. The paper gains the calculation parameters of Green function and the relational expression of vessels' characteristic length by establishing the analysis theory of ships' characteristic length dimension based on the control equation of green function and gives the statistical expression for ships' characteristic length...
We present a new model of two coupled defect-level recombination. Calculation of the generation and recombination rates is based on the so-called exchange times. These allow calculating the occupation probability of the trapping centres and subsequently the generation-recombination rates of free charge carriers appearing in the continuity equations. Each of these two coupled defect levels has its...
The queueing system with renewal arrival process, two types of customers, infinite number of servers and exponential service time is considered. Investigation of two-dimensional stochastic process that characterizes the number of busy devices for different types of customers is held by the method of initial moments.
Threshold load control is one of the key tools in preventing overload in telecommunication networks. Its implementation as hysteretic control mechanism is used for detecting and mitigating congestion in Next Generation Networks, where session initiation protocol is the main signalling protocol. In this paper single-server finite capacity queuing system with constant service time, poisson input flows...
This study exhibits the application of the concept of matrices, probability and optimization in making an electronic Tic-Tac-Toe game using logic gates and exhibiting the concept of Boolean algebra. For a finite number of moves in every single game of Tic-Tac-Toe, the moves are recorded in a 3×3 matrix and the subsequent solution, or a winning combination, is presented from the data obtained by playing...
The issue of channel selection in a decentralized cognitive radio network having a spectrum broker is discussed in this paper. In the proposed method we take into account both the Primary user (PU) channel usage statistics and, Secondary user (SU) channel usage statistics as perceived by an SU of interest. In the marked Markov process based method proposed, each SU calculates the reward of using each...
False alarms are frustrating test and diagnostic complications. Finding more faults than actually exist within a unit under test (UUT) results in increased costs, unnecessary and longer down times, and loss of confidence by the end user. In this paper we deviate from the classical definition of false alarm and replace it with a pragmatic one that measures the maintenance actions taken as a result...
Many of the phrase pairs extracted in the phrase-based machine translation systems have low quality and are not relevant. So their existence in the phrase table not only enlarges it, but also could reduce the translation quality. There are many methods presented to prune these noisy phrase pairs, using the statistics derived from the phrase table. In this paper we proposed a new pruning method that...
This paper considers a semiconductor manufacturing scheduling problem (SMSP), subjected to all the practical constraints such as limited waiting time, machine status, different process time on different machines, setup time and arrival time in wafer fabrication facilities (fabs) of semiconductor manufacturing industry. A hybrid estimation of distribution algorithm with multiple subpopulations (HEDA-MS)...
Text categorization task have gained the attention of researchers in last 10 years with the increase in web-based contents of documents. For searching a particular document from the web or any large document collection text or document categorization is most useful task. We demand some better system and enhanced machine learning classifiers to accomplish task of document categorization. We designed...
Torso detection in static images is a crucial and challenging problem. Torso means the trunk portion of the human body. Locating the torso region of a human body is complex due to its cluttered backdrop and various postures. Existing works on torso detection typically insist a prolonged training phase for complex shape-matching processes. In this work, a new methodology for detecting the torso portion...
In order to improve spectrum utilization efficiency of Cognitive Radio (CR) systems, it is important for Secondary User (SU) to get knowledge about Primary User(PU)'s behavior when SU exploits opportunity to access spectrum. Radio Environment Database has recently been proposed to provide information about PU. Traditional advanced spectrum database constructed based on spectrum sensing method assumes...
Given an incompletely specified index generation function, the number of variables to represent the function can often be reduced by properly assigning don't care values. In this paper, we derive a lower bound on the number of variables necessary to represent a given incompletely specified index generation function. We also derive three properties of incompletely specified index generation functions...
In this paper, we present the analysis of the new transmission algorithm of RFID in form of multichannel which has been developed from frame slotted ALOHA protocol. By using concept of the tag transmission group division which differ in slot access ability and the multinomial distribution foundation for calculate each probability of successful transmission slots. And compare with the ordinary frame...
Ant Colony Optimization Algorithms are the most successful and widely accepted algorithmic techniques based on the decentralized collaborative behavior of real ants when foraging for food. The initialization of pheromone in these algorithms is an important step because it dictates the speed of the system's convergence to the optimal solution. All the proposed initialization techniques in the literature...
In this study, we have classified well known 20 News Group Set that contains 20.000 documents with a Naïve Bayes Classifier. Rather than using traditional Naïve Bayes method, we have used logarithm based classifier that is more suitable for information retrieval tasks. We successfully evaluated the performance of our implementation using two other classification studies (Icsiboost-bigram and EM) on...
Data gathering is one of the most popular applications in multi-hop wireless sensor networks. Since resources are limited, it is important to efficiently allocate the resource while providing desired performance. In this paper, we consider resource allocation in the uplink of multi-hop wireless networks with the use of data buffers of finite size in the presence of transmission error. We first analyze...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.