The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Process-aware Information Systems (PAIS) have become ubiquitous in companies. Thus the amount of data that can be used to analyze and monitor process executions is vast. The event logs generated by PAIS might contain information about decision making processes and can support the understanding and improving of procedures in companies. Mining decisions and constraints from logs has already been investigated,...
To utilize asynchronous multichannel recordings with different start and end time of recordings for acoustic scene analysis, we propose a combination method for estimating unrecorded durations and extracting spatial features. Focusing on the fact that amplitude information is relatively robust to the estimation error of the unrecorded durations and the synchronization mismatch of multichannel recordings,...
Indoor positioning is a hot topic in current research. Most of the existing indoor positioning technologies based on time-difference-of-arrival (TDOA) require the time synchronization between base stations. In this paper, a high-precision multiple-antenna indoor positioning system based on chirp signal is proposed, in which each base station extracts TDOA information independently, so there is no...
The article presents the analysis of the clustering problem formalization and considers possibilities to use the classical methods and bio-inspired methods for solving problems of the cluster analysis. In this paper we do not present full review of the new clustering methods, but identify some trends in the development of cluster analysis and special attention is given to area of bio-inspired methods...
Cooperation combat of multi-UAV could improve the combat effectiveness and survivability. Cooperation architecture is the base of cooperation. To overcome shortcomings of the existing cooperation architectures, the workflow-based multi-UAV cooperation combat architecture is proposed. Performances of the proposed new architecture are analyzed and verified. Experimental results show that, in the given...
This work contributes towards the vision of a suture platform that is able to objectively quantify suturing skill by integrating data from multiple sensing modalities. A first step towards such a platform is the synchronization of data from multiple sensor streams and perhaps even multiple systems. We present the design of a novel suture platform with force and motion sensors as well as video capture...
The Levy Walk (or Levy flight) is a concept fromBiomathematics to describe the hunting–behaviour of manypredatory species. It is a very efficient way to find prey in avery short time frame. We now want to use this concept ina clustering–context to – if you so will – "hunt" for clusters. We describe how we convert this concept into an efficient wayto find cluster centres by linking the data...
Data mining has gained high significance in the recent years owing to the need for management of large volumes of data available at organizations. Often this raw data is unstructured and available at different locations. In order to extract meaningful and usable information, data from such sources need to be integrated synchronously on a common platform before it can be used for extracting meaningful...
Associative data mining is the research hotspot in the field of big data, and frequent item sets mining is an important step in the analysis of associative data. This paper focuses on analyzing the frequent item sets mining algorithm based on Apriori parallel algorithm. The paper has found two shortages of Apriori parallel algorithm: one is that the key value pair are too many, another is that in...
This paper proposes a high-capacity hiding scheme for embedding secret message in the inactive frames of low-bit rate speech bitstream. Our information-hiding scheme can correctly extract secret message in the receiver. The scheme uses a flag to synchronize the embedding and extraction process in steganography. The results of an imperceptibility evaluation indicate that the average perceptual evaluation...
In the extraction of halftone anti-counterfeiting information, the image maybe skew, which causes the anti-counterfeiting information cannot be extracted. Using dots characters to construct the synchronous information, we propose a halftone dots detection algorithm based on cluster analysis. This algorithm detects dots with different in the halftone images, then extract the synchronous information...
We describe a method of sharing information between a tactile map on a paper and an online map on the information terminals (e.g., Tablet computers such as iPad). We use "digital pen" technology which is used as an input method of hand-written characters (e.g., Pegasus technologies such as Note Taker). Our method is based on synchronizing the location of contact point on the tactile-map...
In this paper, we propose a work-stealing runtime -- Library for Work Stealing LibWS -- using MPI one-sided model for designing scalable FP-Growth -- de facto frequent pattern mining algorithm -- on large scale systems. LibWS provides locality efficient and highly scalable work-stealing techniques for load balancing on a variety of data distributions. We also propose a novel communication algorithm...
A content delivery network (CDN) using community information that is extracted from the data of a social networking service (SNS) is proposed in this paper. The structure of the load characteristics of the CDN in terms of the number of servers, communities, and downloads is also shown as a tool for evaluating network performance.
Information hiding of data in an audio file is an important thing that the media can be recognized by its ownership. The hidden information would be the important information which describes the copyright of the audio file. In this research, the binary data is inserted or hidden into the audio file by multicarrier modulation technique data hiding. The encoded binary data by convolutional encoding...
In this paper we propose a method to locate inloop repetitions in a video. An in-loop repetition consists in repeating the same action(s) many times consecutively. The proposed method adapts and uses the auto-correlation method YIN, originally proposed to find the fundamental frequency in audio signals. Based on this technique, we propose a method that generates a matrix where repetitions correspond...
This paper describes an approach of application of the actor model for distributed computations of the block based data mining algorithms, provides the comparison with other approaches, describes concrete implementation of the approach and the result of the experiment.
Telemetry package is one of the inevitable subsystems in a complex spacecraft. Telemetry (TM) data of the mainframe and payload section of the spacecraft is required to be monitored continuously throughout its life span to check the subsystems health and take appropriate decision from ground or autonomously from on-board. In various types of spacecraft like geostationary, remote sensing and interplanetary...
The ability to access and query data stored in multiple versions is an important asset for many applications, such as Web graph analysis, collaborative editing platforms, data forensics, or correlation mining. The storage and retrieval of versioned data requires a specific API and support from the storage layer. The choice of the data structures used to maintain versioned data has a fundamental impact...
In this paper, we present CLUE, a system event analytics tool for black-box performance diagnosis in production Cloud Computing systems. CLUE provides an unified and extensible means of profiling service transactional behaviors, and builds structured data called event sketches. CLUE further offers a set of analytic tools for summarizing and analyzing event sketches by integrating data mining and statistical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.