The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Levy Walk (or Levy flight) is a concept fromBiomathematics to describe the hunting–behaviour of manypredatory species. It is a very efficient way to find prey in avery short time frame. We now want to use this concept ina clustering–context to – if you so will – "hunt" for clusters. We describe how we convert this concept into an efficient wayto find cluster centres by linking the data...
In connected health services automatic discovery of recurring patterns and correlations, or insights, provides many interesting opportunities for the personalization of the services. In this paper the focus is on insight mining for a health coaching service. The basic idea in the proposed method is to generate a large number of insight candidates which have been pre-validated with domain experts and...
In this work we address the problem of multilevel context representation and exploitation for target tracking. Specifically, we present an approach for encoding different types of contextual information (CI) as likelihood functions via classifiers in particle filters. The proposed solution is sufficiently versatile as to be able to couch different types of CI. Promising results have been obtained...
The approach described in this paper replaces the Reliability Block Diagrams (RBD) with a mission event functional architecture that is used to identify and mitigate mission or safety critical functions. The functional architecture is linked to functional test points that are used to demonstrate a reliable and safe product. A product is reliable and safe when the likelihood of mission and safety critical...
Motivated by the increased consideration of probability distributions as local descriptors of shape, we propose a local descriptor based on a bivariate circular distribution. Although some bivariate circular distributions are difficult to compute, our descriptor is computationally feasible because it is a generalization of the mixture of von Mises distributions. Using various shapes formed by line...
Statistical distributions have been extensively used in modeling fading effects in conventional and modern wireless communications. In the present work, we propose a novel κ — μ composite shadowed fading model, which is based on the valid assumption that the mean signal power follows the inverse gamma distribution instead of the lognormal or commonly used gamma distributions. This distribution has...
We introduce a new method to perform the partitioning of non-centralized dynamical linear systems based on the relevance of the possible interconnections among the smallest components of the system. In particular, we analyze the importance of the interconnections using game theoretical tools, so that they can be arranged as a function of their expected contribution to the overall system performance...
This paper deals with stochastic resonance and its application in sine detection. The nonlinear physical phenomenon of stochastic resonance generally occurs in bistable systems excited by a random noise plus a sine. Such systems force cooperation between the input noise and the input sine: Provided a fine tuning between the noise amplitude and the dynamics, the system reacts periodically. The interesting...
E-Reputation is gaining increasing attention among companies. Many brands are making deep invests in managing their image across the web and virtual communities. Thereby, marketers try to access to large volumes of data generated by e-reputation analysis. Their main issue is detecting what is said about their brand and how it can impact their business. As social mediacontributes in assessing opinions...
Although the collection of player and ball tracking data is fast becoming the norm in professional sports, large-scale mining of such spatiotemporal data has yet to surface. In this paper, given an entire season's worth of player and ball tracking data from a professional soccer league (≈400,000,000 data points), we present a method which can conduct both individual player and team...
This paper presents MATLAB-based educational program for teaching transformation of random variable in context of its parameters, mean value and variance, and probability density function (PDF). First, Monotone transformation, in witch only one input value corresponds to only one output value, is considered. Linear and Nonlinear transformations are elaborated. Finally, Non-monotone transformation...
To optimize their networks, Telecom operators tend to use the quality of Service (QoS) differentiation in order to ensure fair use and sufficient capacity. In this study, the economic impact of QoS differentiation mechanism implementation in 3G network for streaming flows is assessed according to QoS satisfaction constraint. Two approaches are developed through different scenarios. In the first case,...
The performance of channel estimation is often assessed by deriving the proper Cramér-Rao Bound (CRB). However, in the blind case a special treatment is required due to the singularity of the Fisher Information Matrix (FIM). Usually a constraint is introduced to overcome the blind ambiguity and ensuing singularity. Hence, a constrained CRB has been derived in the literature since a long time ago....
This paper investigates a new constrained relay selection scheme for two-way relaying systems where two end terminals communicate simultaneously via a relay. The introduced technique is based on the maximization of the weighted sum rate of both users. To evaluate the performance of the proposed system, the outage probability is derived in a general case (where an arbitrary channel is considered),...
This paper presents a theoretical and practical novel approach for computing the probability density function underlying a set of observations. The estimator we propose is an extension of the conventional Parzen Rosenblatt method that leads to a very specific interval-valued estimation of the density. Within this approach, we make use of the convenient representation of a set of usual (summative)...
This paper studies the problem of coverage management with two emerging formalisms in simulation based validation, namely formal specification of test points and the use of inline temporal assertions. We present methods for checking whether a test-bench with inline assertion covers a set of formal test points. This is particularly useful in developing verification IPs for standard on-chip protocols...
In embedded systems, Application Specific Instruction Set Processors (ASIPs) are used commonly with the aim to get high performance without losing flexibility. A crucial operation required during ASIP synthesis (in particular, selection of custom instructions) as well as code generation for ASIPs is identifying portions of an application program that can be executed by custom functional units (CFUs)...
Different method calls may have different contributions to the precision of the final application when abstracted into the call strings. The existing call string based pointer analysis algorithms do not consider such contribution difference and hence often can not achieve best cost-effectiveness. To solve the problem, this paper firstly proposes a contribution-based call stack abstraction method which...
The goal of Information Extraction is to automatically generate structured pieces of information from the relevant information contained in text documents. Machine Learning techniques have been applied to reduce the cost of Information Extraction system adaptation. However, elements of human supervision strongly bias the learning process. Unsupervised learning approaches can avoid these biases. In...
The extended finite state machine (EFSM) is an extension of the finite state machine, which creates input and output parameters, context variables, operations and predicates. It is applied widely in the fields of software engineering since there are many tools that support software development activities based on the EFSM models. However, the theoretical foundation of EFSM is not yet well-developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.