The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Necessary and sufficient conditions are given for multiple input discrete-time linear systems to be controllable where the inputs are constrained to be greater than some negative values. Furthermore a simple method to test the controllability with input constraints is proposed by using the Jordan canonical form and constructing some particular form of input matrices based on the elimination method...
Score normalisation with cohort speaker models has been widely used in HMM-based speaker verification. Most of the proposed methods are based on the framework of the hypothesis testing. Based on this framework an overall average of all cohort scores is often used for normalisation, which leads a log likelihood ratio (LLR) for verification. In this paper we use a competition-based criterion to define...
In our day-today life, we performs a lot of tasks that involves direct or indirect use of random numbers e.g. Games, lotteries, simulations and most important cryptography and data communication security. Although, the field of pseudo random number generation is important, it is very difficult to find a good generator for several of applications. In present manuscript, we explore the possibility of...
The item response theory (IRT) is widely used in many fields recently because it provides us the abilities of examinees and the difficulties of items simultaneously. Online IRT test systems are often equipped with the adaptive testing. Such a testing method selects the most appropriate items to examinees automatically. However, the item difficulty values remain the same even if the features of the...
The item response theory (IRT) gives us valuable information about the difficulties of items as well as the abilities of examinees. Adaptive testing using the IRT provides the most appropriate items to examinees automatically. However, the item parameters remain the same even if the features of the examinees and the number of examinees change. We propose to use the dually adaptive online IRT testing...
PHY layer authentication of a wireless sender has gained much interest recently. In this paper, we consider the famous Alice, Bob and Eve model and investigate (for the first time) the feasibility of using time-varying clock offsets for sender-node-authentication at Bob. Specifically, we exploit the fact (and de-facto problem) that clock offset between every node pair is unique; moreover, the two...
Solar radiation is a source of alternative energy that is very influential on the photovoltaic performance in generating energy. The need for solar radiation estimation has become a significant feature in the design of photovoltaic (PV) systems. Recently, the most popular method used to estimate solar radiation is artificial neural network (ANN). However, a new approach, called the extreme learning...
In recent years, demands about offshore plant developments are increasing. Since the cost of installation of offshore plants in the deep ocean is very high, operation and realtime monitoring of offshore plants is not only important to produce a high performance such as tremendous profits but maintenance of them is also crucial to prevent accidents. However, since offshore plants are custom built compared...
Researchers at Lawrence Livermore National Laboratory (LLNL) have started digitizing technical films spanning the above ground atmospheric nuclear testing operations conducted by the United States from 1950 through the 1960s. This technical film test data represents unique information that can be use as a primary validation data source for nuclear effects codes that are used by national researchers...
In 1950 Abraham Wald proved that every admissible statistical decision rule is either a Bayesian procedure or the limit of a sequence of such procedures. He thus provided a decision-theoretic justification for the use of Bayesian inference, even for non-Bayesian problems. It is often assumed that his result also justified the use of Bayesian priors to solve such problems. However, the principles one...
Component Based System (CBS) development is a systematic reuse approach that helps in developing software by integrating existing components. Component selection plays a vital role in the success of the CBS. Lately, researchers have suggested using acceptance test cases as a functional specification to better understand software requirements. In this paper, we present an acceptance test case driven...
Program slicing is a common means to support developers in examining the source code with respect to debugging, program comprehension, or regression testing. While a vast amount of techniques exist, they are mostly tailored to single software systems. However, with the increasing importance of variable and highly-configurable systems, such as the Linux kernel, the number of software variants, subject...
Auto-parallelization compilization is an essential way to obtain high efficient parallel code for High Performance Computers (HPCs) and Chip Multi-Processors (CMPs). For the parallelizing compilers, a fundamental step is array dependence analysis used for identifying the parallelizable code. Whereas, the existing dependence analysis approaches are only capable of recognizing few types of dependences,...
Finding out an effective way to score Chinese written essays automatically remains challenging for researchers. Several methods have been proposed and developed but limited in the character and word usage levels. As one of the scoring standards, however, content or topic perspective is also an important and necessary indicator to assess an essay. Therefore, in this paper, we propose a novel perspective...
In many classification problems, there exists additional information which is available during training but not available during testing. In this paper we denote such information as hidden information, and study how to incorporate it to improve the learning performance. Despite its importance, learning with hidden information has not attracted enough attention from the field and existing work in this...
In this paper we present a novel approach to integrate feature similarity and spatial consistency of local features to achieve the goal of localizing an object of interest in an image. The goal is to achieve coherent and accurate labeling of feature points in a simple and effective way. We introduced our Spatial-Visual Label Propagation algorithm to infer the labels of local features in a test image...
We continue to consider the question of what language features are needed to effectively model cyber-physical systems (CPS). In previous work, we proposed using a core language as a way to study this question, and showed how several basic aspects of CPS can be modeled clearly in a language with a small set of constructs. This paper reports on the result of our analysis of two, more complex, case studies...
Bonifaci et al have recently introduced some novel analytical techniques in order to derive a speed-up bound for the multiprocessor global EDF scheduling of systems of recurrent tasks that are represented using the sporadic DAG task model, and have applied these techniques to obtain a pseudo-polynomial time sufficient schedulability test. In this paper, these techniques are further generalized to...
In this study, a theoretical model for the combination of all individual questions from a questionnaire is investigated. For this implementation, a well-fitted Elman neural network is used in order to formulate the weighting relations between questions of the questionnaire which is produced for the project “Innovative Services to Strengthen Cooperation and Internationalization between SMEs” (I.S.C...
The use of system requirements and their risks enables software testers to identify more important test cases that can reveal faults associated with risky components. Having identified those test cases, software testers can manage the testing schedule more effectively by running such test cases earlier so that they can fix faults sooner. Some work in this area has been done, but the previous approaches...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.