The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays with enlargement of power grid and increasing renewable energy integration, uncertainties and randomness challenge traditional power system analysis methods. Scenarios are widely applied to deal with power system uncertainties. Especially power flow examination in transmission expansion planning needs typical scenarios to verify normal power flow, and provide useful information for auxiliary...
It is important to develop defense mechanisms to bolster the cyber-physical security of critical infocomm infrastructure (CII) systems. A basic method of defense for CII systems is a firewall. Since SCADA / ICS systems may be negatively impacted by latencies and delays introduced by firewalls, which will translate to real world impacts, any implemented firewall in the network should attempt to minimize...
Prefix Scan (or simply scan) is an operator that computes all the partial sums of a vector. A scan operation results in a vector where each element is the sum of the preceding elements in the original vector up to the corresponding position. Scan is a key operation in many relevant problems like sorting, lexical analysis, string comparison, image filtering among others. Although there are libraries...
Clustering is an important tool for analyzing gene expression data. Many clustering algorithms have been proposed for the analysis of gene expression data. In this article we have clustered real life gene expression data via K-Means which is one of clustering algorithms. Also, we have proposed a new method determining the initial cluster centers for K-means. We have compared results of our method...
Iterative learning control (ILC) is a simple technique devised for repetitive systems. In this work, an inter-sample ILC algorithm is proposed for the speed control problem of an induction motor. The proposed algorithm is mathematically analyzed and validated using a real-time experiment. Its performance is observed to be better than that of PI based Field Oriented Control (FOC) regarding convergence...
The problem of full-state observer and reduced-order state observer design for a class of linear time-varying system is researched in this paper. Implementing the linear time-varying system transformed, the two algorithms are proposed. Compared with other observer design approaches of linear time-varying system, the pivotal merit of these algorithms is no sophisticated calculation. Moreover, the separation...
In this paper, the characteristics of two different uniformly spaced circular arrays are analyzed, including the beam width, the sidelobe peak level, the resolution and the Cramer-Rao bound(CRB) of the array. Firstly, according to the structure of the dual circular array, the formula of array pattern, the formula of resolution and the formula of CRB are deduced. Secondly, the effects of the elements...
The deletion channel takes as input a bit string x ∊ {0,1}^n, and deletes each bit independently with probability q, yielding a shorter string. The trace reconstruction problem is to recover an unknown string x ∊ from many independent outputs (called traces) of the deletion channel applied to x.We show that if x is drawn uniformly at random and q
With the rapid increasing scale of Intelligent Transportation System (ITS) and vehicular network, our quality of life are significantly improved, especially traveling in urban area. To supply a large amount of real-time ITS applications, such as navigation and automatic driving, aggregation delay should be controlled in a small range so that more data might be dropped during aggregation. State-of-the-art...
Due to increasing volume of data in information technology, saving storage space and providing security to data has acquired more attention and popularity. In data processing and data mining, duplicates can effect severely. Data deduplication is a technique that eliminates duplicate data and store only one copy, promoting single instance storage. The main challenges are to identify maximum duplicate...
This article covers the comparison of a primitive Dissipating-Predictive-State Planning Actor-Critic learning approach with SARSA(λ) (State-Action-Reward-State-Action) on the highly non-stationary competitive Cat and Mouse problem. The primary objective of the new algorithm was to minimize the number of constants that must be optimized before application while maintaining the performance found in...
In this paper, we explore the capability of selectively decentralized Q-learning approach in learning how to optimally stabilize control systems, as compared to the centralized approach. We focus on problems in which the systems are completely unknown except the possible domain knowledge that allow us to decentralize into subsystems. In selective decentralization, we explore all of the possible communication...
In this paper, we consider the privacy preserving problem in an agreement network under interception attacks. First, we introduce a consensus protocol with privacy preserving, where each node hides their initial states into a set of random sequences, and then injects the sequences into the process of consensus. Second, we assume that an attacker with limited power can intercept the data transmitted...
Speech feature learning is very important for the design of classification algorithm of Parkinson's disease (PD). Existing speech feature learning method for classification of PD just pays attention to the speech feature. This paper proposed a novel hybrid feature learning algorithm which puts the features of all the speech segments of each subject together, thereby obtaining new and high efficient...
Progressive edge-growth (PEG) algorithm was proven to be a simple and effective approach to design good LDPC codes. However, the low-density parity-check (LDPC) constructed by PEG algorithm is of a single code rate. In this paper, we propose a modified PEG algorithm to construct multiple-rate LDPC codes, which is referred to as the multiple-rate PEG (MR-PEG) algorithm. The obtained LDPC codes with...
In this paper, we propose an algebraic approach to design extremely low rate low-density parity-check (LDPC) codes by employing the primitive polynomials. We first investigate the requirements for the polynomials to construct 4-cycle free LDPC codes and then propose an algebraic approach to design the parity check matrix. To achieve a better decoding performance in the extremely low rate region, we...
In this paper, we study the problem of cache content placement in the wireless small cell networks. We consider the small base station (SBS) has a cache unit and limited backhaul capacity, and the SBS cache the popular content to serve local users request while reducing the traffic load on the backhaul link. The goal of the cache unit in SBS is to maximum the traffic offloading from backhaul link,...
As a manner of communications with the high spectral and energy efficiency, cognitive underwater acoustic communications based on index modulation (CUAC-IM) have been investigating by us in more recent years. Like other communication system, estimation algorithm on frequency offset (FO) caused by the relative motion of mobile station is crucial to CUAC-IM system. In this paper, system model, especially...
Based on the analysis and summary of the features of existing STL (Stereolithography) model slicing algorithms, the STL model slicing algorithm that based on dynamic adjacent edge is proposed. According to the Z-max and Z-min of the Z-coordinate projection in the slice direction and the thickness of the every layer, achieving slicing the whole STL model, and the topological relation of the adjacent...
Dividing a dataset into disjoint groups of homogeneous structure, known as data clustering, constitutes an important problem of data analysis. It can be solved with broad range of methods employing statistical approaches or heuristic procedures. The latter often include mechanisms known from nature as they are known to serve as useful components of effective optimizers. The paper investigates the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.