ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (15,224)
  • Springer  (15,224)
  • Copernicus
  • Nature Publishing Group
  • 2010-2014  (15,224)
  • 1945-1949
  • Computer Science  (15,224)
Collection
  • Articles  (15,224)
Years
Year
  • 1
    Publication Date: 2010-02-25
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2010-08-21
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2014-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2014-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2014-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2014-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
  • 17
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
  • 19
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2014-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Publication Date: 2014-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2013-01-01
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2014-11-08
    Print ISSN: 1867-4828
    Electronic ISSN: 1869-0238
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2012-01-01
    Electronic ISSN: 2192-1962
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2013-09-07
    Description: In cognitive radio networks, the secondary users (SUs) switch the data transmission to another empty spectrum band to give priority to primary users (PUs). In this paper, channel switching in cognitive radio mobile ad hoc networks (CR-MANETs) through an established route is modeled. The probability of channel availability in this route is calculated based on the PU's activity, SU's mobility, and channel heterogeneity. Based on the proposed model, the channel and link availability time are predicted. These predictions are used for channel assignment in the proposed channel allocation scheme. A handoff threshold as well as a life time threshold is used in order to reduce the handoff delay and the number of channel handoffs originating from the short channel usage time. When the channel handoff cannot be done due to the SU's mobility, the local flow handoff is performed to find an appropriate node in the vicinity of a potential link breakage and transfer the current data flow to it. The local flow handoff is performed to avoid possible flow disruption and also to reduce the delay caused by the link breakage. The study reveals that the channel heterogeneity and SU's mobility must be considered as important factors, which affect the performance of the handoff management in the CR-MANETs. The results emphasize on the improvement of the route maintenance probability after using the local flow handoff. It is also stated that the amounts of handoff requirement and handoff delay are decreased after using the predicted channel usage life time and handoff threshold time.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-06
    Description: Norms are used in open Multi-Agent Systems as a formal specification of deontic statements aimed at regulating the actions of agents and the interactions among them. In this paper, we propose a set of services facilitating the development of both non-normative and normative agents for norm-governed MAS. Specifically, we propose to provide agents with norm reasoning services. These services will help agent designers/developers to programme agents that consider norm reasoning without having to implement the needed mechanisms to reason about norms by themselves. This article shows how these services perform as well as the results of the experiments that we conducted to evaluate their performance.
    Print ISSN: 1387-3326
    Electronic ISSN: 1572-9419
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2013-09-07
    Description: In the field of rheology, properties of non-Newtonian fluids have been traditionally represented on graphs such as viscosity curves. In this paper, we propose a visualizer to express the fluid properties as visualized fluid motions in a rotating cylinder. To highlight different fluid motions, three patterns of rotation were given to the cylinder: rapid start of constant rotation (spin-up), rapid stop from constant rotation (spin-down), and periodic rotation. Relationships between fluid motion and fluid properties are discussed by comparing velocity profiles for three fluids: silicone oil, yogurt, and a polyacrylamide (PAA) solution. Ultrasonic velocity profiler (UVP) was used to obtain spatio-temporal velocity maps. The velocity maps reflect essential rheological properties, such as shear thinning, yield stress, and elasticity. Two additional display modes are proposed to explore fluid motions due to viscoelasticity of the PAA solution and yogurt: a grid deformation field and a shear rate field. These two visualizations can provide intuitive understanding of viscoelasticity because deformation and shear rate determine elastic and viscous stresses, respectively. In spin-down tests, the recovery of deformed grids, which is caused by elasticity, can be explicitly observed. Further, the shear rate distributions indicate that kinetic energy of the fluid dissipates near the lateral wall right after the wall stops rotating. In short, these two quantity fields visualize energy conversion among kinetic, elastic, and thermal energy; such energy conversions are characteristic of viscoelastic fluids. Graphical Abstract
    Print ISSN: 1343-8875
    Electronic ISSN: 1875-8975
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2013-09-11
    Description: Multi-processor HPC tools have become commonplace in industry and research today. Evolutionary algorithms may be elegantly parallelized by broadcasting a whole population of designs to an array of processors in a computing cluster or grid. However, issues arise due to synchronization barriers: subsequent iterations have to wait for the successful execution of all jobs of the previous generation. When other users load a cluster or a grid, individual tasks may be delayed and some of them may never complete, slowing down and eventually blocking the optimization process. In this paper, we extend the recent “Futures” concept permitting the algorithm to circumvent such situations. The idea is to set the default values to the cost function values calculated using a high-quality surrogate model, progressively improving when “exact” numerical results are received. While waiting for the exact result, the algorithm continues using the approximation and when the data finally arrives, the surrogate model is updated. At convergence, the final result is not only an optimized set of designs, but also a surrogate model that is precise within the neighborhood of the optimal solution. We illustrate this approach with the cluster optimization of an A/C duct of a passenger car, using a refined CFD legacy software model along with an adaptive meta-model based on Proper Orthogonal Decomposition (POD) and diffuse approximation.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-11
    Description: This paper presents a methodology to repair flawed migrated models that are designed with knowledge-guided NURBS (KGN). Incompatible traditional CAD packages that are based on NURBS technology have been for many years carrying out the exchange of models and data through either neutral file formats (IGES or STEP) or proprietary formats. The exchange process most often produces poor quality data and results in errors in the migrated CAD models costing the industry billions of dollars every year. While previous studies by large focus on finding means to repair migrated models through patching, we propose to repair errors in CAD models which are generated using KGN through a reconstructing process instead of patching. We have implemented a prototype system to show that employing the right tools on the stored knowledge and data a designer can reconstruct a migrated model based on new local requirements of the receiving system without having to repair it, avoiding delay and corrective processes that only produce patched-up design bases and limiting the effective use of such models.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-12
    Description: Multiple interval graphs are variants of interval graphs where instead of a single interval, each vertex is assigned a set of intervals on the real line. We study the complexity of the MAXIMUM CLIQUE problem in several classes of multiple interval graphs. The MAXIMUM CLIQUE problem, or the problem of finding the size of the maximum clique, is known to be NP-complete for t -interval graphs when t ≥3 and polynomial-time solvable when t =1. The problem is also known to be NP-complete in t -track graphs when t ≥4 and polynomial-time solvable when t ≤2. We show that MAXIMUM CLIQUE is already NP-complete for unit 2-interval graphs and unit 3-track graphs. Further, we show that the problem is APX-complete for 2-interval graphs, 3-track graphs, unit 3-interval graphs and unit 4-track graphs. We also introduce two new classes of graphs called t -circular interval graphs and t -circular track graphs and study the complexity of the MAXIMUM CLIQUE problem in them. On the positive side, we present a polynomial time t -approximation algorithm for MAXIMUM WEIGHTED CLIQUE on t -interval graphs, improving earlier work with approximation ratio 4 t .
    Print ISSN: 0178-4617
    Electronic ISSN: 1432-0541
    Topics: Computer Science , Mathematics
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2013-09-14
    Description: Neurons are spatially extended structures that receive and process inputs on their dendrites. It is generally accepted that neuronal computations arise from the active integration of synaptic inputs along a dendrite between the input location and the location of spike generation in the axon initial segment. However, many application such as simulations of brain networks use point-neurons—neurons without a morphological component—as computational units to keep the conceptual complexity and computational costs low. Inevitably, these applications thus omit a fundamental property of neuronal computation. In this work, we present an approach to model an artificial synapse that mimics dendritic processing without the need to explicitly simulate dendritic dynamics. The model synapse employs an analytic solution for the cable equation to compute the neuron’s membrane potential following dendritic inputs. Green’s function formalism is used to derive the closed version of the cable equation. We show that by using this synapse model, point-neurons can achieve results that were previously limited to the realms of multi-compartmental models. Moreover, a computational advantage is achieved when only a small number of simulated synapses impinge on a morphologically elaborate neuron. Opportunities and limitations are discussed.
    Print ISSN: 0340-1200
    Electronic ISSN: 1432-0770
    Topics: Biology , Computer Science , Physics
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-14
    Print ISSN: 1865-2034
    Electronic ISSN: 1865-2042
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2013-09-14
    Description: Due to interference between co-located wireless networks, obtaining accurate channel assessment becomesincreasingly important for wireless network configuration. This information is used, amongothers, for cognitive radio solutions and for intelligent channel selection in wireless networks. Solutionssuch as spectrum analyzers are capable of scanning a wide spectrum range, but are not dedicatedfor channel occupation assessment because they are extremely costly and not able to perform continuousrecording for a time period longer than a few seconds. On the other hand, low-cost solutionslack the flexibility and required performance in terms of configuration and sensing efficiency. To remedythe situation, this paper presents an alternative for channel assessment on top of a commercialsoftware-defined radio platform. Although there exist software solutions for performing spectrumsensing on such platforms, to the best of our knowledge, continuous spectrum sensing and long-termrecording remain challenging. We propose a pioneering solution that is capable of seamless spectrumsensing over a wide spectrum band and guarantees sufficient flexibility in terms of configurations. Theproposed solution is validated experimentally. We demonstrate two advantages of seamless spectrumsensing: the capability of accurate channel occupancy measurement and detecting transient signalssuch as Bluetooth.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2013-09-15
    Description: Long-term monitoring of an environment is a fundamental requirement for most wireless sensornetworks. Owing to the fact that the sensor nodes have limited energy budget, prolonging theirlifetime is essential in order to permit long-term monitoring. Furthermore, many applications requiresensor nodes to obtain an accurate estimation of a point-source signal (for example, an animal call orseismic activity). Commonly, multiple sensor nodes simultaneously sample and then cooperate toestimate the event signal. The selection of cooperation nodes is important to reduce the estimationerror while conserving the network's energy. In this paper, we present a novel method for sensor dataacquisition and signal estimation, which considers estimation accuracy, energy conservation, andenergy balance. The method, using a concept of 'virtual clusters,' forms groups of sensor nodes withthe same spatial and temporal properties. Two algorithms are used to provide functionality. The'distributed formation' algorithm automatically forms and classifies the virtual clusters. The 'roundrobin sample scheme' schedules the virtual clusters to sample the event signals in turn. Theestimation error and the energy consumption of the method, when used with a generalized sensingmodel, are evaluated through analysis and simulation. The results show that this method can achievean improved signal estimation while reducing and balancing energy consumption.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2013-09-15
    Description: We study the problem of achieving maximum network throughput with fairness among the flows at the nodes in a wireless mesh network, given their location and the number of their half-duplex radio interfaces. Our goal is to find the minimum number of non-overlapping frequency channels required to achieve interference-free communication. We use our existing Select x for less than x topology control algorithm (TCA) to build the connectivity graph (CG), which enhances spatial channel reuse to help minimize the number of channels required. We show that the TCA-based CG approach requires fewer channels than the classical approach of building the CG based on the maximum power. We use multi-path routing to achieve the maximum network throughput and show that it provides better network throughput than the classical minimum power-based shortest path routing. We also develop an effective heuristic method to determine the minimum number of channels required for interference-free channel assignment.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Publication Date: 2013-09-17
    Description: Probabilistic model-building algorithms (PMBA), a subset of evolutionary algorithms, have been successful in solving complex problems, in addition providing analytical information about the distribution of fit individuals. Most PMBA work has concentrated on the string representation used in typical genetic algorithms. A smaller body of work has aimed to apply the useful concepts of PMBA to genetic programming (GP), mostly concentrating on tree representation. Unfortunately, the latter research has been sporadically carried out, and reported in several different research streams, limiting substantial communication and discussion. In this paper, we aim to provide a critical review of previous applications of PMBA and related methods in GP research, to facilitate more vital communication. We illustrate the current state of research in applying PMBA to GP, noting important perspectives. We use these to categorise practical PMBA models for GP, and describe the main varieties on this basis.
    Print ISSN: 1389-2576
    Electronic ISSN: 1573-7632
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-18
    Description: We give a memoryless scale-invariant randomized algorithm ReMix for Packet Scheduling that is e /( e −1)-competitive against an adaptive adversary. ReMix unifies most of previously known randomized algorithms, and its general analysis yields improved performance guarantees for several restricted variants, including the s -bounded instances. In particular, ReMix attains the optimum competitive ratio of 4/3 on 2-bounded instances. Our results are applicable to a more general problem, called Item Collection , in which only the relative order between packets’ deadlines is known. ReMix is the optimal memoryless randomized algorithm against adaptive adversary for that problem.
    Print ISSN: 0178-4617
    Electronic ISSN: 1432-0541
    Topics: Computer Science , Mathematics
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2013-09-19
    Description: Der Lehrstuhl für Datenbanksysteme der Technischen Universität München beschäftigt sich in der Forschung mit der Entwicklung, Optimierung und Anwendung „moderner“ Datenbanktechnologie. Die Schwerpunkte der letzten Jahre lagen in der Entwicklung von Multi-Tenancy-fähigen Datenbanken, eScience-Datenbankanwendungen, Workload-Management für heterogene Anwendungen, RDF-Datenbanken und, insbesondere, Hauptspeicher-Datenbanken für hybride OLTP&OLAP-Anwendungen.
    Print ISSN: 1618-2162
    Electronic ISSN: 1610-1995
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2013-09-19
    Description: Radio frequency identification (RFID) is a promising wireless technology for using tiny, remotely powered chips as identifiers. The number of RFID applications is rapidly increasing because RFID technology is convenient, fast, and contactless. However, collisions occur when multiple tags simultaneously transmit their IDs. Therefore, an efficient anti-collision algorithm is needed to accelerate tag identification. In some applications, the reader may repeatedly identify staying tags, which constantly exist in the reader's range. The adaptive query splitting algorithm (AQS) was proposed for reserving information obtained from the last identification process to enable rapid re-identification of staying tags. However, since AQS is a non-blocking algorithm that allows newly arriving tags to use the slots reserved for staying tags, collisions among them are problematic. Thus, semi-blocking AQS (SBA) proposed in this study is designed to reduce the collisions between arriving tags and staying tags by applying a semi-blocking technique in which only a minority of arriving tags use the slots reserved for staying tags. By counting the number of minor arriving tags, SBA estimates the number of unrecognized arriving tags and generates proper queries to minimize their collisions. The identification delay of SBA is analyzed, and simulation results show that SBA significantly outperforms AQS.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2013-09-19
    Description: Learning is a task that generalizes many of the analyses that are applied to collections of data, in particular, to collections of sensitive individual information. Hence, it is natural to ask what can be learned while preserving individual privacy. Kasiviswanathan et al. (in SIAM J. Comput., 40(3):793–826, 2011 ) initiated such a discussion. They formalized the notion of private learning , as a combination of PAC learning and differential privacy, and investigated what concept classes can be learned privately. Somewhat surprisingly, they showed that for finite, discrete domains (ignoring time complexity), every PAC learning task could be performed privately with polynomially many labeled examples; in many natural cases this could even be done in polynomial time. While these results seem to equate non-private and private learning, there is still a significant gap: the sample complexity of (non-private) PAC learning is crisply characterized in terms of the VC-dimension of the concept class, whereas this relationship is lost in the constructions of private learners, which exhibit, generally, a higher sample complexity. Looking into this gap, we examine several private learning tasks and give tight bounds on their sample complexity. In particular, we show strong separations between sample complexities of proper and improper private learners (such separation does not exist for non-private learners), and between sample complexities of efficient and inefficient proper private learners. Our results show that VC-dimension is not the right measure for characterizing the sample complexity of proper private learning. We also examine the task of private data release (as initiated by Blum et al. in STOC, pp. 609–618, 2008 ), and give new lower bounds on the sample complexity. Our results show that the logarithmic dependence on size of the instance space is essential for private data release.
    Print ISSN: 0885-6125
    Electronic ISSN: 1573-0565
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-19
    Description: Machine learning is traditionally formalized and investigated as the study of learning concepts and decision functions from labeled examples, requiring a representation that encodes information about the domain of the decision function to be learned. We are interested in providing a way for a human teacher to interact with an automated learner using natural instructions , thus allowing the teacher to communicate the relevant domain expertise to the learner without necessarily knowing anything about the internal representations used in the learning process. In this paper we suggest to view the process of learning a decision function as a natural language lesson interpretation problem , as opposed to learning from labeled examples. This view of machine learning is motivated by human learning processes, in which the learner is given a lesson describing the target concept directly and a few instances exemplifying it. We introduce a learning algorithm for the lesson interpretation problem that receives feedback from its performance on the final task, while learning jointly (1) how to interpret the lesson and (2) how to use this interpretation to do well on the final task. traditional machine learning by focusing on supplying the learner only with information that can be provided by a task expert. We evaluate our approach by applying it to the rules of the solitaire card game. We show that our learning approach can eventually use natural language instructions to learn the target concept and play the game legally. Furthermore, we show that the learned semantic interpreter also generalizes to previously unseen instructions.
    Print ISSN: 0885-6125
    Electronic ISSN: 1573-0565
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2013-09-21
    Description: This paper presents a parallel adaptive mesh control procedure designed to operate with high-order finite element analysis packages to enable large-scale automated simulations on massively parallel computers. The curved mesh adaptation procedure uses curved entity mesh modification operations that explicitly consider the influence of the curved mesh entities on element shape. Applications of the curved mesh adaptation procedure have been developed to support the parallel automated adaptive accelerator simulations at SLAC National Accelerator Laboratory.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-21
    Print ISSN: 1865-2034
    Electronic ISSN: 1865-2042
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Publication Date: 2013-09-21
    Description: With the advent of mobile technology, a new class of applications, called participatory sensing (PS), is emerging, with which the ubiquity of mobile devices is exploited to collect data at scale. However, privacy and trust are the two significant barriers to the success of any PS system. First, the participants may not want to associate themselves with the collected data. Second, the validity of the contributed data is not verified, since the intention of the participants is not always clear. In this paper, we formally define the problem of privacy and trust in PS systems and examine its challenges. We propose a trustworthy privacy-aware framework for PS systems dubbed TAPAS, which enables the participation of the users without compromising their privacy while improving the trustworthiness of the collected data. Our experimental evaluations verify the applicability of our proposed approaches and demonstrate their efficiency.
    Print ISSN: 0219-1377
    Electronic ISSN: 0219-3116
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2013-09-21
    Description: Data uncertainty is inherent in emerging applications such as location-based services, sensor monitoring systems, and data integration. To handle a large amount of imprecise information, uncertain databases have been recently developed. In this paper, we study how to efficiently discover frequent itemsets from large uncertain databases, interpreted under the Possible World Semantics . This is technically challenging, since an uncertain database induces an exponential number of possible worlds. To tackle this problem, we propose a novel methods to capture the itemset mining process as a probability distribution function taking two models into account: the Poisson distribution and the normal distribution. These model-based approaches extract frequent itemsets with a high degree of accuracy and support large databases. We apply our techniques to improve the performance of the algorithms for (1) finding itemsets whose frequentness probabilities are larger than some threshold and (2) mining itemsets with the $k$ highest frequentness probabilities. Our approaches support both tuple and attribute uncertainty models, which are commonly used to represent uncertain databases. Extensive evaluation on real and synthetic datasets shows that our methods are highly accurate and four orders of magnitudes faster than previous approaches. In further theoretical and experimental studies, we give an intuition which model-based approach fits best to different types of data sets.
    Print ISSN: 0219-1377
    Electronic ISSN: 0219-3116
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2013-09-24
    Description: Geodesy utilizes state of the art data collection techniques such as GPS (Global Positioning System) to acquire locations of points. Traditionally, the coordinates of these points are estimated using the Least Squares (LS) method. Nevertheless, Robust Estimation (RE) yields more accurate results than LS method in the presence of blunders (gross errors) among the data set. For example, the Least Trimmed Squares (LTS) method and the Least Median Squares (LMS) method can be used for this purpose. The first method aims to minimize the sum of the squared residuals by trimming away observations with large residuals. On the other hand, the second method involves the minimization of the median of the squared residuals. Both methods can be implemented using an optimization method, i.e., Artificial Bee Colony (ABC) algorithm. The ABC algorithm is a swarm intelligence (a branch of artificial intelligence) technique that can be used for the solution of minimization or maximization problems. In this paper, using the LTS and LMS methods for GPS data by employing the ABC, a new approach is put forward. Firstly, some discussions about the theoretical principals of RE and ABC are given. Then, a numerical example is used to demonstrate the validity of the proposed approach. Numerical results show that application of the robust estimation to GPS data can easily be carried out by ABC and this approach helps to enhance the reliability of geospatial data for any application of geodesy.
    Print ISSN: 1865-0473
    Electronic ISSN: 1865-0481
    Topics: Geosciences , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2013-09-26
    Description: Using the impulse responses of these multipath channels, the bit error rate (BER) performance for binary pulse amplitude modulation impulse radio ultra-wideband communication system is calculated. The optimization location of receiving antenna is investigated by dynamic differential evolution (DDE) and genetic algorithm (GA) to minimize the outage probability. Numerical results show that the performance for reducing BER and outage probability by DDE algorithm is better than that by GA.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2013-09-27
    Description: Stellen Sie sich vor, Sie landen auf einer einsamen Insel und die Bewohner verstehen nur die Sprache SQL. Das Spiel SQL Island ( http://www.sql-island.de ) dient zur Vermittlung und Übung von SQL-Grundlagen und wird durch die Eingabe von SQL-Anfragen gesteuert. Der Zweck des Spiels ist es, dem Spieler auf unterhaltsame Weise beizubringen, wie Daten in relationalen Datenbanken abgefragt und manipuliert werden können. Dabei werden keine SQL-Kenntnisse vorausgesetzt.
    Print ISSN: 1618-2162
    Electronic ISSN: 1610-1995
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2013-09-27
    Description: We use visualization to investigate the structure of the counter-current convection induced by microbubbles and small particles. In particular, we study the effect of small particles with different specific gravities on the gas-phase flow. In our experiments, microbubbles are injected into stationary liquid from a bubble generator that is set at the bottom of a vertical channel, and small particles are injected from a particle injector that is set at the top of the channel. The mean kinetic energy of the gas-phase is significantly lower in the flow with microbubbles and small particles than in the flow with only microbubbles. This results from significant suppression of the interaction of bubble plumes by the small particles. Moreover, the mean kinetic energy of the gas-phase in the flow with microbubbles and small particles is strongly dependent on the specific gravity of the small particles. Graphical Abstract
    Print ISSN: 1343-8875
    Electronic ISSN: 1875-8975
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2013-10-01
    Description: During last decade more and more old people live alone and the number of old people that need medical care is increased. The lack of doctors and the increase of the medical cost is becoming a big problem. Therefore, IT-based information systems should be implemented to help solve this problem. In this paper, we present the experimental results and evaluation of the SmartBox stimulation device for medical applications using a P2P system which is based on JXTA-Overlay. The SmartBox is integrated with our P2P system as a useful tool for monitoring and controlling patients activities. We found by experimental results that by SmartBox we can check the patient’s situation. We carried out experiments with a patient in the bed and changed the temperature of the room. From the experimental results, we conclude that the use of SmartBox is an effective way for medical applications.
    Print ISSN: 0010-485X
    Electronic ISSN: 1436-5057
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Publication Date: 2013-10-01
    Description: We present a new strategy, based on the idea of the meccano method and a novel T-mesh optimization procedure, to construct a T-spline parameterization of 2D geometries for the application of isogeometric analysis. The proposed method only demands a boundary representation of the geometry as input data. The algorithm obtains, as a result, high quality parametric transformation between 2D objects and the parametric domain, the unit square. First, we define a parametric mapping between the input boundary of the object and the boundary of the parametric domain. Then, we build a T-mesh adapted to the geometric singularities of the domain to preserve the features of the object boundary with a desired tolerance. The key of the method lies in defining an isomorphic transformation between the parametric and physical T-mesh finding the optimal position of the interior nodes by applying a new T-mesh untangling and smoothing procedure. Bivariate T-spline representation is calculated by imposing the interpolation conditions on points sited both in the interior and on the boundary of the geometry. The efficacy of the proposed technique is shown in several examples. Also we present some results of the application of isogeometric analysis in a geometry parameterized with this technique.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Publication Date: 2013-10-01
    Description: This paper presents a sketch-based volumetric decomposition framework using geometric reasoning to assist in hex meshing. The sketch-based user interface makes the framework user-friendly and intuitive, and the geometric reasoning engine makes the framework smarter and improves the usability. The system first generates a database that contains both the B-rep and 3D medial object to capture the exterior and interior of the input model, respectively. Next, the geometric reasoning process determines sweeping direction and two types of sweepable regions and provides visual aids to assist the user in developing decomposition solutions. The user conducts decomposition via the sketch-based user interface, which understands the user’s intent through freehand stroke inputs for smart decomposition. Imprint and merge operations are then performed on the decomposed model before passing it to the sweeping algorithm to create hex meshes. The proposed framework has been tested on industrial models.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Publication Date: 2013-10-02
    Description: Significant innovations in mobile technologies are enabling mobile users to make real-time actionable decisions based on balancing opportunities and risks to take coordinated actions with other users in their workplace. This requires a new distributed analytic framework that collects relevant information from internal and external sources, performs real-time distributed analytics, and delivers a critical analysis to any user at any place in a given time frame through the use of mobile devices such as smartphones and tablets. This paper discusses the advantages and challenges of utilizing mobile devices for distributed analytics by showing its feasibility with Hadoop analytic framework.
    Electronic ISSN: 2192-113X
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2013-10-03
    Description: Digital ecosystems rely on reputation systems in order to build trust and to foster collaborations among users. Reputation systems are commonplace in the Customer-to-Customer and Business-to-Customer contexts, however, they have not yet found mainstream acceptance in Business-to-Business (B2B) environments. Our first contribution in this paper is to identify the particularities of feedback collection in B2B reputation systems. An issue that we identify is that the reputation target in the B2B context is a business, which requires evaluation on a large number of criteria. We observe that due to the wide variation in user expertise, feedback forms that require users to evaluate all criteria have significant negative consequences for rating accuracy. Our second contribution is to propose an expertise prediction algorithm for B2B reputation systems, which filters the criteria describing the target business such that each user rates only on those criteria that he has expertise in. Experiments based on our real dataset show that the algorithm accurately predicts the expertise of users in given criteria. The algorithm may also increase the motivation of users to submit feedback as well as the confidence of users in B2B reputation systems.
    Print ISSN: 0010-485X
    Electronic ISSN: 1436-5057
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    facet.materialart.
    Unknown
    Springer
    In: Computing
    Publication Date: 2013-10-03
    Description: The advances and success of the Service-Oriented Architecture (SOA) paradigm have produced a revolution in ICT, particularly, in the way in which software applications are implemented and distributed. Today, applications are increasingly provisioned and consumed as web services over the Internet, and business processes are implemented by dynamically composing loosely coupled applications provided by different suppliers. In this highly dynamic context, clients (e.g., business owners or users selecting a service) are concerned about the dependability of their services and business processes. In this paper, we define a certification scheme that allows to verify the dependability properties of services and business processes. Our certification scheme relies on discrete-time Markov chains and awards machine-readable dependability certificates to services, whose validity is continuously verified using run-time monitoring. Our solution can be integrated within existing SOAs, to extend the discovery and selection process with dependability requirements and certificates, and to support a dependability-aware service composition.
    Print ISSN: 0010-485X
    Electronic ISSN: 1436-5057
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Publication Date: 2013-10-05
    Description: Formal verification aims to improve the quality of software by detecting errors before they do harm. At the basis of formal verification is the logical notion of correctness , which purports to capture whether or not a program behaves as desired. We suggest that the boolean partition of software into correct and incorrect programs falls short of the practical need to assess the behavior of software in a more nuanced fashion against multiple criteria. We therefore propose to introduce quantitative fitness measures for programs, specifically for measuring the function, performance, and robustness of reactive programs such as concurrent processes. This article describes the goals of the ERC Advanced Investigator Project QUAREM. The project aims to build and evaluate a theory of quantitative fitness measures for reactive models. Such a theory must strive to obtain quantitative generalizations of the paradigms that have been success stories in qualitative reactive modeling, such as compositionality, property-preserving abstraction and abstraction refinement, model checking, and synthesis. The theory will be evaluated not only in the context of software and hardware engineering, but also in the context of systems biology. In particular, we will use the quantitative reactive models and fitness measures developed in this project for testing hypotheses about the mechanisms behind data from biological experiments.
    Print ISSN: 1865-2034
    Electronic ISSN: 1865-2042
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2013-10-06
    Description: This paper presents a panel generation framework for seakeeping analysis of multiple bodies and offshore structures. The configurations of multiple bodies and offshore structures are different from those of a single ship. In particular, the topological structure of the free surfaces becomes complicated due to the multiple floating bodies, resulting in multiple classifications for the free surfaces based on their genus. The multi-body configuration consists of two floating bodies placed in two configurations, i.e., side by side and tandem, which would generate two holes in the free surface. For the offshore structure case, multiple holes are generated in the free-surface domain due to the legs of the offshore structure. In this work, strategies for generating body and free-surface panels are provided, and the results are analyzed. A software prototype that implements the proposed methods is developed to provide efficient panel generation for multiple bodies and offshore structures. Examples demonstrate that the proposed framework can be successfully used for seakeeping analysis of multiple bodies and offshore structures.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2013-10-06
    Description: Constrained Delaunay tetrahedralizations (CDTs) are valuable for discretizing three-dimensional domains with constraints such as edges and polygons. But they are difficult to generate and maintain robustly when finite-precision coordinates yield vertices on a line that are not perfectly collinear and polygonal facets that are not perfectly flat. This work focuses on two key operations, polygon insertion and vertex insertion in CDTs. These operations suffice to incrementally construct and update a CDT from a Delaunay triangulation of the vertices. We experimentally compare two recent algorithms for inserting a polygon into a CDT: a bistellar flip algorithm of Shewchuk ( Proc. 19th Annual Symposium on Computational Geometry , June 2003) and a cavity retriangulation algorithm of Si and Gärtner ( Proc. Fourteenth International Meshing Roundtable , September 2005). We modify these algorithms to robustly succeed in practice for polygons whose vertices deviate from exact coplanarity. Vertex insertion in a CDT is much more complicated than in a Delaunay tetrahedralization. Adding a single vertex into a CDT may not yield a new CDT. Multiple vertices may need to be inserted together to ensure the existence of a CDT. We propose a new algorithm for vertex insertion. Given a new vertex to be inserted into a CDT, this algorithm adds one or more Steiner points incrementally. It guarantees a new CDT including that vertex.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-09
    Description: Constrained clustering received a lot of attention in the last years. However, the widely used pairwise constraints are not generally applicable for hierarchical clustering, where the goal is to derive a cluster hierarchy instead of a flat partition. Therefore, we propose for the hierarchical setting—based on the ideas of pairwise constraints—the use of must-link-before (MLB) constraints. In this paper, we discuss their properties and present an algorithm that is able to create a hierarchy by considering these constraints directly. Furthermore, we propose an efficient data structure for its implementation and evaluate its effectiveness with different datasets in a text clustering scenario.
    Print ISSN: 0885-6125
    Electronic ISSN: 1573-0565
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2013-09-09
    Description: Experimental characterization of micro-jets is challenging because of the small dimensions of the micro-nozzle. In this study, we propose a new technique to visualize the instantaneous 3D structure of a pulsed gas micro-jet. Using phase-averaging of Schlieren visualizations obtained with a high-speed camera and 3D reconstruction through a filtered back projection algorithm, it is possible to follow the high-speed dynamics of the pulsed jet. The experimental technique is illustrated by a 3D reconstruction of a pulsed helium micro-jet. The technique is simple yet very useful. To our knowledge, it is the only experimental method to analyze the instantaneous 3D structure and high frequency dynamics of pulsed micro-jets. Graphical Abstract
    Print ISSN: 1343-8875
    Electronic ISSN: 1875-8975
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-11
    Description: We address a scheduling problem that arises in highly parallelized environments like modern multi-core CPU/GPU computer architectures where simultaneously active jobs share a common limited resource, e.g., memory cache. The scheduler must ensure that the demand for the common resource never exceeds the available capacity. This introduces an orthogonal constraint to the classical minimum makespan scheduling problem. Such a constraint also arises in other contexts where a common resource is shared across machines. We study the non-preemptive case of this problem and present a (2+ ϵ )-approximation algorithm which relies on the interplay of several classical and modern techniques in scheduling like grouping, job-classification, and the use of configuration-LPs. This improves upon previous bound of 3 that can be obtained by list scheduling approaches, and gets close to the (3/2− ϵ ) inapproximability bound. If the number of machines or the number of different resource requirements are bounded by a constant we obtain a polynomial time approximation scheme.
    Print ISSN: 0178-4617
    Electronic ISSN: 1432-0541
    Topics: Computer Science , Mathematics
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2013-09-11
    Description: Transport services are a fundamental utility that drives human society. A Digital Transportation Ecosystem is a sub-system of the Digital Ecosystem, which uses ICT resources to facilitate transport service transactions. This research focuses on the selection and ranking of online transport service information. The previous research in this area has been unable to achieve satisfactory performance or give sufficient freedom to service requesters to rank services based on their preferences. ‘ User-centered design ’ is a broad term to describe how end-users influence system design. In this research, we propose a Service-Requester-Centered Service Selection and Ranking Model, guided by the philosophy of user-centered design. Three major sub-models are involved in this model: a model for assisting service requesters to search appropriate transport service ontology concepts to denote their service requests, a model for enhancing the accuracy of automatic transport service concept recommendation by observing service requesters’ click behaviours, and a model for enabling service-requester-preference-based service ranking. Implementations and empirical experiments are conducted to evaluate the three sub-models and the drawn conclusions along with directions for future work are outlined.
    Print ISSN: 0010-485X
    Electronic ISSN: 1436-5057
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2013-09-11
    Description: According to the ongoing IEEE 802.11ac amendment, the wireless network is about to embrace the gigabit-per-second raw data rate. Compared with previous IEEE standards, this significant performance improvement can be attributed to the novel physical and medium access control (MAC) features, such as multi-user multiple-input multiple-output transmissions, the frame aggregation, and the channel bonding. In this paper, we first briefly survey the main features of IEEE 802.11ac, and then, we evaluate these new features in a fully connected wireless mesh network using an analytic model and simulations. More specifically, the performance of the MAC scheme defined by IEEE 802.11ac, which employs the explicit compressed feedback (ECFB) mechanism for the channel sounding, is evaluated. In addition, we propose an extended request-to-send/clear-to-send scheme that integrates the ECFB operation to compare with the IEEE 802.11ac-defined one in saturated conditions. The comparison of the two MAC schemes is conducted through three spatial stream allocation algorithms. A simple but accurate analytical model is derived for the two MAC schemes, the results of which are validated with simulations. The observations of the results not only reveal the importance of spatial stream allocations but also provide insight into how the newly introduced features could affect the performance of IEEE 802.11ac-based wireless mesh networks.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2013-09-11
    Description: Three dimensional (3D) unsteady, incompressible flows in a pump-turbine during a transient process of load rejection were studied using the computational fluid dynamics method. The dynamic mesh (DM) method and remeshing method combined with non-conformal grid boundaries were applied to simulate the rotation of guide vanes. The fluid coupling and DM method were used to calculate the rotational speed for each time-step. Calculations were performed based on the $ \overline{{v^{2} }} - f $ turbulence model to incorporate the near-wall turbulence anisotropy as well as non-local pressure–strain effects. Results show that $ \overline{{v^{2} }} - f $ model is thought to be suitable to predict characteristics of the transient process during load rejection in a pump-turbine. The transient explicit characteristics, such as the flow-rate, head, torque of the runner, etc., during the process of load rejection are analyzed. Pressure fluctuation was larger in the region close to the runner during the load rejection. Stalls and reverse flow in the runner resulted in the decrease of the torque of runner at turbine mode and turbine-braking mode. Simulation results were also compared and verified by experimental results. 3D simulations can be used instead of experiments to study the influence of inner flow to the external characteristics during transient processes. This calculation was based on a prototype of a pumped storage power station, and the computational method could be used in the fault diagnosis of transient operation.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2013-09-11
    Description: The paper presents a methodology for modeling profile of two circular-arc cams, which is based on the application of homogeneous coordinate transformation method. Analytical expressions that allow complete determining of all design parameters and coordinates of all the points of two circular-arc cams profile are defined. Also, analytical expressions for determining the kinematic performance such as displacement, velocity, acceleration and jerk are derived. The defined methodology is applied on concrete examples for which the analysis of the kinematic performance is also performed. Additionally, it is shown that a proper choice of the design parameters can significantly affect the improvement of the kinematic performance, especially the reduction of jerk as one of the most unfavorable occurrences in these mechanisms. The given methodology allows very efficient determination of all input data for parametric modeling and production of two circular-arc cams on numerical machines. This approach allows the fulfillment of one of the most important requirements of modern production–reduction of time necessary for design and manufacturing which causes reduction of costs.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2013-09-11
    Description: Performance of a flying cross bar, instead of the flying plate, to incapacitate the long-rod penetrator, has been evaluated numerically based on a finite element model. The length to diameter ratio, L / D , of the penetrator was 30 and the velocity was 2.0 km/s. The length of the cross bar was fixed to 0.5 L and the velocity of the bar was determined from its mass and given kinetic energy. The bar was assumed to impact the mid point of the penetrator at 45° of obliquity. The efficiency of flying cross bar is maximum when the diameter of the bar is in the range between 1D and 4D depending on the energy of the bar and the distance to witness block. The protection capability of the bar has been discussed in terms of the shape and lateral displacement of the disturbed penetrator by the flying cross bar.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2013-09-11
    Description: This paper presents a new boundary shape representation for 3D boundary value problems based on parametric triangular Bézier surface patches. Formed by the surface patches, the graphical representation of the boundary is directly incorporated into the formula of parametric integral equation system (PIES). This allows us to eliminate the need for both boundary and domain discretizations. The possibility of eliminating the discretization of the boundary and the domain in PIES significantly reduces the number of input data necessary to define the boundary. In this case, the boundary is described by a small set of control points of surface patches. Three numerical examples were used to validate the solutions of PIES with analytical and numerical results available in the literature.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2013-09-11
    Description: In this paper, metrics derived from a posteriori error estimates for the Poisson problem and for the Stokes system solved by some finite element methods are presented. Numerical examples of mesh adaptation in two dimensions of the space are given and show that these metrics detect the singular behavior of the solution, in particular its anisotropy.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2013-09-11
    Description: Corrosion resistances of mild steel specimens according to artificial neural network (ANN) analysis were investigated in the scope of this study. Corrosion rate values were taken into numerical analysis as a result of experimental studies under corrosive aggressive media. Mild steel specimens were selected according to the section type varieties such as box, tube and cornier. All steel specimens were subjected to the aggressive media formed using sodium chloride (NaCl with 99.8 % purity) solutions with 3.5, 5.0 and 7.0 % ratios per one liter distilled water and only distilled water. The reduction in corrosion rate has been observed and considered according to some corrosion loss respects. Corrosion rate prediction models were established between corrosion rate and parameters such as mass loss obtained by experimental studies using ANN. ANNs are computing systems that simulate the biological neural systems of the human brain. In this study, ANN analysis was generated to predict the corrosion rate values after experimental studies. Experimental and predicted values were compared by each other and it is seen that a strong relationship was established between them.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2013-09-11
    Description: In this paper we introduce the Manufactured Analytical Solution Abstraction ( MASA ) library for applying the method of manufactured solutions to the verification of software used for solving a large class of problems stemming from numerical methods in mathematical physics including nonlinear equations, systems of algebraic equations, and ordinary and partial differential equations. We discuss the process of scientific software verification, manufactured solution generation using symbolic manipulation with computer algebra systems such as Maple™ or SymPy, and automatic differentiation for forcing function evaluation. We discuss a hierarchic methodology that can be used to alleviate the combinatorial complexity in generating symbolic manufactured solutions for systems of equations based on complex physics. Finally, we detail the essential features and examples of the Application Programming Interface behind MASA , an open source library designed to act as a central repository for manufactured and analytical solutions over a diverse range of problems.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2013-09-11
    Description: Computation techniques have provided designers with deeper understanding of the market niches that were neglected before. Usage contextual information has been studied in marketing research since the last century; however, little research in design engineering focuses on it. Therefore, in this paper, we analyzed the relations between usage context information and the design of products. A usage coverage model is established to integrate users and their expected usage scenarios into product family assessment. We map the user’s individual capacity together with a given product into the usage context space. The overlapping between the required usage and feasible usage can be measured. Based on this mechanism, several usage coverage indices are proposed to assess the compliance of a given product family to the expected set of usage scenarios to be covered. The original method is demonstrated on a scale-based product family of jigsaws in a redesign context. Constraint programming technique is applied to solve the physics-based causal loops that determine usage performances in a set-based design approach. Designers can rely on the results to eliminate redundant units in the family or modify the configuration of each product. The contribution of the paper is to provide an inter-disciplinary point of view to assessing the composition and configuration of a product family design.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2013-09-12
    Description: The recent innovation of modern cars has mainly been driven by the development of new as well as the continuous improvement of existing electrical and electronic (E/E) components, including sensors, actuators, and electronic control units. This trend has been accompanied by an increasing complexity of E/E components and their numerous interdependencies. In addition, external impact factors (e.g., changes of regulations, product innovations) demand for more sophisticated E/E product data management (E/E-PDM). Since E/E product data is usually scattered over a large number of distributed, heterogeneous IT systems, application-spanning use cases are difficult to realize (e.g., ensuring the consistency of artifacts corresponding to different development phases, plausibility of logical connections between electronic control units). To tackle this challenge, the partial integration of E/E product data as well as corresponding schemas becomes necessary. This paper presents the properties of a typical IT system landscape related to E/E-PDM, reveals challenges emerging in this context, and elicits requirements for E/E-PDM. Based on this, insights into our framework, which targets at the partial integration of E/E product data, are given. Such an integration will foster E/E product data integration and hence contribute to an improved E/E product quality.
    Print ISSN: 1618-2162
    Electronic ISSN: 1610-1995
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2013-09-14
    Description: The bioinspired approach has been key in combining the disciplines of robotics with neuroscience in an effective and promising fashion. Indeed, certain aspects in the field of neuroscience, such as goal-directed locomotion and behaviour selection, can be validated through robotic artefacts. In particular, swimming is a functionally important behaviour where neuromuscular structures, neural control architecture and operation can be replicated artificially following models from biology and neuroscience. In this article, we present a biomimetic system inspired by the lamprey, an early vertebrate that locomotes using anguilliform swimming. The artefact possesses extra- and proprioceptive sensory receptors, muscle-like actuation, distributed embedded control and a vision system. Experiments on optimised swimming and on goal-directed locomotion are reported, as well as the assessment of the performance of the system, which shows high energy efficiency and adaptive behaviour. While the focus is on providing a robotic platform for testing biological models, the reported system can also be of major relevance for the development of engineering system applications.
    Print ISSN: 0340-1200
    Electronic ISSN: 1432-0770
    Topics: Biology , Computer Science , Physics
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2013-09-14
    Description: The ability to continuously adapt its business processes is a crucial ability for any company in order to survive in today’s dynamic world. In order to accomplish this task, a company needs to profoundly analyze all its business data. This generates the need for data integration and analysis techniques that allow for a comprehensive analysis. A particular challenge when conducting this analysis is the integration of process data generated by workflow engines and operational data that is produced by business applications and stored in data warehouses. Typically, these two types of data are not matched as their acquisition and analysis follows different principles, i.e., a process-oriented view versus a view focusing on business objects. To address this challenge, we introduce a framework that allows to improve business processes considering an integrated view on process data and operational data. We present and evaluate various architectural options for the data warehouse that provides this integrated view based on a specialized federation layer. This integrated view is also reflected in a set of operators that we introduce. We show how these operators ease the definition of analysis queries and how they allow to extract hidden optimization patterns by using data mining techniques.
    Print ISSN: 1865-2034
    Electronic ISSN: 1865-2042
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2013-09-14
    Description: We are concerned with the issue of tracking changes of variable dependencies from multivariate time series. Conventionally, this issue has been addressed in the batch scenario where the whole data set is given at once, and the change detection must be done in a retrospective way. This paper addresses this issue in a sequential scenario where multivariate data are sequentially input and the detection must be done in a sequential fashion. We propose a new method for sequential tracking of variable dependencies. In it we employ a Bayesian network as a representation of variable dependencies. The key ideas of our method are: (1) we extend the theory of dynamic model selection, which has been developed in the batch-learning scenario, into the sequential setting, and apply it to our issue, (2) we conduct the change detection sequentially using dynamic programming per a window where we employ the Hoeffding’s bound to automatically determine the window size. We empirically demonstrate that our proposed method is able to perform change detection more efficiently than a conventional batch method. Further, we give a new framework of an application of variable dependency change detection, which we call Ad Impact Relation analysis (AIR). In it, we detect the time point when a commercial message advertisement has given an impact on the market and effectively visualize the impact through network changes. We employ real data sets to demonstrate the validity of AIR.
    Print ISSN: 1384-5810
    Electronic ISSN: 1573-756X
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2013-09-14
    Description: In this paper, we derive a performance comparison between two training-based schemes for multipleinputmultiple-output systems. The two schemes are the time-division multiplexing scheme and therecently proposed data-dependent superimposed pilot scheme. For both schemes, a closed-form expressionfor the bit error rate (BER) is provided. We also determine, for both schemes, the optimalallocation of power between the pilot and data that minimizes the BER.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Publication Date: 2013-09-17
    Description: Im nationalen Forschungsprojekt „Multifunktionales Batteriespeichersystem (MBS)“ wurden offene Fragen bezüglich der technischen Umsetzbarkeit und der Wirtschaftlichkeit eines netzgekoppelten Batteriespeichersystems mit einer Vanadium-Redox-Flow-Batterie in Kombination mit den Erzeugungsanlagen Photovoltaik und Kleinwindkraft zur intelligenten Vermarktung von erneuerbarer Energie beantwortet (Sterrer et al., Multifunktionales Batteriespeichersystem – MBS-Endbericht. Industrielle Forschung im Rahmen der österreichischen Programmlinie Neue Energie 2020, 3. Ausschreibung, noch nicht veröffentlicht, 2013 ). Die technische Umsetzung und der Demonstrationsbetrieb einer Pilotanlage während zweier Jahre zeigten, dass das Batteriespeichersystem für eine intelligente Vermarktung von erneuerbarer Energie sowie zur Bereitstellung von Systemdienstleistungen zur Netzstabilisierung geeignet ist. Jedoch zeigte die Untersuchung von unterschiedlichen Vermarktungsstrategien für die Pilotanlage, eine Großspeicheranlage und gepoolte PV/Batteriespeicheranlagen sowie deren Erlösmöglichkeiten an den Energiehandels- und Regelenergiemärkten, dass für sämtliche untersuchten Einsatzstrategien in absehbarer Zeit keine positiven Deckungsbeiträge erwirtschaftet werden können. Wenn jedoch die angestrebten Batteriezielkosten von ca. 250 €/kWh bis zum Jahr 2030 erreicht werden, scheint eine zukünftige Umsetzung von Vanadium-Redox-Flow-Batterien, vor allem in Großanlagen (z. B. 10 MW, 100 MWh), für die Teilnahme am Regelenergiemarkt realistisch.
    Print ISSN: 0932-383X
    Electronic ISSN: 1613-7620
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Publication Date: 2013-09-17
    Description: Morphing an existing simulation mesh according to updated geometric parameters in the underlying computer-aided design model is a crucial technique within fully automatic design optimization. By avoiding costly automatic or even manual meshing, it enables the automatic and parallel generation and evaluation of new design variations, e.g., through finite element or computational fluid dynamics simulations. In this paper, we present a simple yet versatile method for high-quality mesh morphing. Building upon triharmonic radial basis functions, our shape deformations minimize distortion and thereby implicitly preserve shape quality. Moreover, the same unified code can morph tetrahedral, hexahedral, or arbitrary polyhedral meshes. We compare our method to other recently proposed techniques and show that ours yields superior results in most cases. We analyze how to explicitly prevent inverted mesh elements by successively splitting the deformation into smaller steps. Finally, we investigate the performance of different linear solvers as well as the use of an incremental least squares solver for the sake of improved scalability.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Publication Date: 2013-09-19
    Description: The vast amount and rapid growth of data on the Web and in document repositories make knowledge extraction and trend analysis a challenging task. A well-proven approach for the unsupervised analysis of large text corpora is dynamic topic modeling. While there is a solid body of research on fundamentals and applications of this technique, visual-interactive analysis systems for allowing end-users to perform analysis tasks using topic models are still rare. In this paper, we present D-VITA, an interactive text analysis system that exploits dynamic topic modeling to detect the latent topic structure and dynamics in a collection of documents. D-VITA supports end-users in understanding and exploiting the topic modeling results by providing interactive visualizations of the topic evolution in document collections and by browsing documents based on keyword search and similarity of their topic distributions. The system was evaluated by a scientific community that used D-VITA for trend analysis in their data sources. The results indicate high usability of D-VITA and its usefulness for productive analysis tasks.
    Print ISSN: 1618-2162
    Electronic ISSN: 1610-1995
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2013-09-19
    Description: Per-cell codebook-based limited feedback is highly desirable in coordinated multi-point (CoMP) systems owing to flexibility and compatibility. Except for the per-cell codeword indices, each user should feed back other information for the central unit to reconstruct global channel direction information (CDI) and estimate channel quality information (CQI) for downlink transmission. In this paper, we analyze the essential feedback information for per-cell codebook-based coherent CoMP systems. To show what should be fed back to estimate the CQI, we first derive a conservative CQI estimation to avoid the outage in transmission, which depends on the quantization accuracy and the norm of the global channel. We then analyze whether the per-cell small-scale fading channel norms are necessary to feed back in obtaining the global channel norm and reconstructing the global CDI. Next, we analyze whether the feedback of phase ambiguity (PA) is necessary. Both the analysis and simulation results show that the global channel norm should be fed back instead of the per-cell channel norms. The benefit of the PA feedback is evident only when the number of base stations is large and the number of antennas at each base station is small.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2013-09-19
    Description: This paper quantifies the approximation capability of radial basis function networks (RBFNs) and their applications in machine learning theory. The target is to deduce almost optimal rates of approximation and learning by RBFNs. For approximation, we show that for large classes of functions, the convergence rate of approximation by RBFNs is not slower than that of multivariate algebraic polynomials. For learning, we prove that, using the classical empirical risk minimization, the RBFNs estimator can theoretically realize the almost optimal learning rate. The obtained results underlie the successful application of RBFNs in various machine learning problems.
    Print ISSN: 0885-6125
    Electronic ISSN: 1573-0565
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2013-09-22
    Description: Software as a Service (SaaS), which offers the possibility to cover both core and non-core business operations of a company, has profoundly transformed traditional outsourcing approaches. As SaaS represents promising solutions for a variety of business processes, it is important to identify a theoretical framework to evaluate SaaS adoption for these two types of operations. We propose an integrative framework to evaluate SaaS adoption by including four perspectives–economic savings, strategic influences, management attitudes toward ownership and vendor’s service quality; and formulate hypotheses to predict the difference in SaaS adoption for core and non-core business operations. We validate our framework using data from 269 companies across different industries in Hong Kong. The results support the integrative framework. Perceived cost advantage has a positive influence on SaaS adoption for non-core business operations, whereas a gap in IT capabilities has a positive influence on SaaS adoption for core business operations. Furthermore, perceived service quality has a positive influence, and management attitude toward ownership and control has a negative influence on SaaS adoption for both types of operations.
    Print ISSN: 1387-3326
    Electronic ISSN: 1572-9419
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2013-09-22
    Description: This paper presents a novel octree-based dual contouring (DC) algorithm for adaptive triangular or tetrahedral mesh generation with guaranteed angle range. First, an adaptive octree is constructed based on the input geometry. Then the octree grid points are adjusted such that we can maintain a minimum distance from the grid points to the input boundary. Finally, an improved DC method is applied to generate triangular and tetrahedral meshes. It is proved that we can guarantee the obtained triangle mesh has an angle range of (19.47°, 141.06°) for any closed smooth curve, and the tetrahedral mesh has a dihedral angle range of (12.04°, 129.25°) for any closed smooth surface. In practice, since the straight line/planar cutting plane assumption inside each octree leaf is not always satisfied, there is a small perturbation for the lower and upper bounds of the proved angle range.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2013-09-22
    Description: We propose methods to integrate data across several genomic platforms using a hierarchical Bayesian analysis framework that incorporates the biological relationships among the platforms to identify genes whose expression is related to clinical outcomes in cancer. This integrated approach combines information across all platforms, leading to increased statistical power in finding these predictive genes, and further provides mechanistic information about the manner in which the gene affects the outcome. We demonstrate the advantages of the shrinkage estimation used by this approach through a simulation, and finally, we apply our method to a Glioblastoma Multiforme dataset and identify several genes potentially associated with the patients' survival. We find 12 positive prognostic markers associated with nine genes and 13 negative prognostic markers associated with nine genes.
    Print ISSN: 1687-4145
    Electronic ISSN: 1687-4153
    Topics: Biology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2013-09-22
    Description: In recent years, algebraic methods, more precisely matrix decomposition approaches, have become a key tool for tackling document summarization problem. Typical algebraic methods used in multi-document summarization (MDS) vary from soft and hard clustering approaches to low-rank approximations. In this paper, we present a novel summarization method AASum which employs the archetypal analysis for generic MDS. Archetypal analysis (AA) is a promising unsupervised learning tool able to completely assemble the advantages of clustering and the flexibility of matrix factorization. In document summarization, given a content-graph data matrix representation of a set of documents, positively and/or negatively salient sentences are values on the data set boundary. These extreme values, archetypes, can be computed using AA. While each sentence in a data set is estimated as a mixture of archetypal sentences, the archetypes themselves are restricted to being sparse mixtures, i.e., convex combinations of the original sentences. Since AA in this way readily offers soft clustering, we suggest to consider it as a method for simultaneous sentence clustering and ranking. Another important argument in favor of using AA in MDS is that in contrast to other factorization methods, which extract prototypical, characteristic, even basic sentences, AA selects distinct (archetypal) sentences and thus induces variability and diversity in produced summaries. Experimental results on the DUC generic summarization data sets evidence the improvement of the proposed approach over the other closely related methods.
    Print ISSN: 0219-1377
    Electronic ISSN: 0219-3116
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2013-09-24
    Description: As the geostationary orbit (GEO) is congested in the commercial Ku band, the adjacent satellites willreceive the interference from small aperture terminals which have a wide field of view. To reducethe interference toward the adjacent satellites, code division multiple access (CDMA) with spreadspectrum needs to be adopted in the satellite communications on-the-move system. However, themutual interference between CDMA users leads to the performance loss, which is not acceptable forthe power-sensitive small aperture terminals, and the computation complexity is still an intractableproblem when the conventional iterative minimum mean square error (MMSE) scheme is employedto suppress the multiple access interference (MAI) in satellite systems especially that is coded bylow-density parity-check (LDPC) code. Moreover, the long transmission delays of different userscaused by the long transmission distance require the robustness of the interference suppression forthe asynchronous case. In this paper, a joint chip-level algorithm for CDMA multiuser detectionand LDPC decoding with a new and simple iterative structure based on belief propagation (BP)for satellite systems is developed, which integrates the iterations of multiuser detection and theiterations of LDPC decoding with factor graphs. Through analysis and simulations, it is verified thatthe proposed algorithm is robust to the asynchronous CDMA satellite system, and with the similariterative complexity, the performance of the proposed algorithm outperforms that of the conventionaliterative MMSE scheme in the asynchronous CDMA satellite system.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2013-09-26
    Description: In this paper, we propose the use of bit-interleaved coded modulation in alternate-relaying decode-and-forward cooperative communication systems. At the destination, we exploit the interference signal, which results from the simultaneous transmission of data streams through both direct and one of the relay channels to develop an optimal detector. It is shown that the proposed detector can be implemented by parallel concatenating maximum \textit{a posteriori} (MAP) algorithms and demappers to the decoders. The detector exchanges soft information between the decoders and the MAP algorithms in an iterative way for performance improvement. The proposed optimal detector requires a long delay as the destination has to receive and store the entire frame before performing data detection. To avoid this, a sub-optimal detector is also proposed. Unlike the optimal detector, the sub-optimal one exploits two consecutive received packets to decode one packet. It turns out that the sub-optimal detector has less reduced delay, complexity, memory size, and bandwidth loss with a slight increase of the bit-error-rate. Extensive simulation results are presented to demonstrate the effectiveness of the proposed detectors.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2013-09-26
    Description: Opportunistic routing (OR) protocols for ad hoc networks basically consist of selecting a few forwardersbetween the source and destination and prioritizing their transmission. The performance ofOR protocols depends on how these two steps are performed. The aim was to reduce the numberof transmissions to deliver packets to the destination. In this paper, we first present a mathematicalmodel to compute the total number of packets including duplicate packets generated by OR protocols.We use the model to analyse well-known OR protocols and understand the reason behind theirincrease in number of transmissions. Next, we propose an OR scheme transmission-aware opportunisticad hoc routing (TOAR) protocol, which attempts to minimize retransmissions. Our proposedOR protocol uses tree structures to select forwarders and prioritize them. The use of tree structureshelps in identifying primary forwarders which carry packets farthest to the destination during eachtransmission round. TOAR also helps in choosing secondary forwarders which will transmit packetsmissed out by the forwarder. The optimized selection of forwarders results in significant reduction inretransmissions, a smaller forwarder list set, and improvement in goodput.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2013-09-27
    Description: The meccano method is a novel and promising mesh generation technique for simultaneously creating adaptive tetrahedral meshes and volume parameterizations of a complex solid. The method combines several former procedures: a mapping from the meccano boundary to the solid surface, a 3-D local refinement algorithm and a simultaneous mesh untangling and smoothing. In this paper we present the main advantages of our method against other standard mesh generation techniques. We show that our method constructs meshes that can be locally refined using the Kossaczky bisection rule and maintaining a high mesh quality. Finally, we generate volume T-mesh for isogeometric analysis, based on the volume parameterization obtained by the method.
    Print ISSN: 0177-0667
    Electronic ISSN: 1435-5663
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2013-09-27
    Description: Additional contents in web pages, such as navigation panels, advertisements, copyrights and disclaimer notices, are typically not related to the main subject and may hamper the performance of Web data mining. They are traditionally taken as noises and need to be removed properly. To achieve this, two intuitive and crucial kinds of information—the textual information and the visual information of web pages—is considered in this paper. Accordingly, Text Density and Visual Importance are defined for the Document Object Model (DOM) nodes of a web page. Furthermore, a content extraction method with these measured values is proposed. It is a fast, accurate and general method for extracting content from diverse web pages. And with the employment of DOM nodes, the original structure of the web page can be preserved. Evaluated with the CleanEval benchmark and with randomly selected pages from well-known Web sites, where various web domains and styles are tested, the effect of the method is demonstrated. The average F1-scores with our method were 8.7 % higher than the best scores among several alternative methods.
    Print ISSN: 0219-1377
    Electronic ISSN: 0219-3116
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2013-09-28
    Description: This study addresses mechanisms for the generation and selection of visual behaviors in anamniotes. To demonstrate the function of these mechanisms, we have constructed an experimental platform where a simulated animal swims around in a virtual environment containing visually detectable objects. The simulated animal moves as a result of simulated mechanical forces between the water and its body. The undulations of the body are generated by contraction of simulated muscles attached to realistic body components. Muscles are driven by simulated motoneurons within networks of central pattern generators. Reticulospinal neurons, which drive the spinal pattern generators, are in turn driven directly and indirectly by visuomotor centers in the brainstem. The neural networks representing visuomotor centers receive sensory input from a simplified retina. The model also includes major components of the basal ganglia, as these are hypothesized to be key components in behavior selection. We have hypothesized that sensorimotor transformation in tectum and pretectum transforms the place-coded retinal information into rate-coded turning commands in the reticulospinal neurons via a recruitment network mimicking the layered structure of tectal areas. Via engagement of the basal ganglia, the system proves to be capable of selecting among several possible responses, even if exposed to conflicting stimuli. The anatomically based structure of the control system makes it possible to disconnect different neural components, yielding concrete predictions of how animals with corresponding lesions would behave. The model confirms that the neural networks identified in the lamprey are capable of responding appropriately to simple, multiple, and conflicting stimuli.
    Print ISSN: 0340-1200
    Electronic ISSN: 1432-0770
    Topics: Biology , Computer Science , Physics
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2013-09-28
    Description: Salamanders have captured the interest of biologists and roboticists for decades because of their ability to locomote in different environments and their resemblance to early representatives of tetrapods. In this article, we review biological and robotic studies on the kinematics (i.e., angular profiles of joints) of salamander locomotion aiming at three main goals: (i) to give a clear view of the kinematics, currently available, for each body part of the salamander while moving in different environments (i.e., terrestrial stepping, aquatic stepping, and swimming), (ii) to examine what is the status of our current knowledge and what remains unclear, and (iii) to discuss how much robotics and modeling have already contributed and will potentially contribute in the future to such studies.
    Print ISSN: 0340-1200
    Electronic ISSN: 1432-0770
    Topics: Biology , Computer Science , Physics
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2013-09-28
    Description: In the streams of the Mediterranean island of Crete (Greece), olive mill wastewater (OMW) has been reported to reduce biodiversity up to 85 %. Mere conduction of impact assessment based on pollutant concentrations, however, cannot reveal how impacted areas may be connected to the pollution sources. In this study, we developed a new methodology which allows for a dynamic cause-effect linking of pollution sources and impacted areas through the pathways of OMW. Risk is hierarchically assessed and mapped at three different scales and more specifically, at the source scale (targeting olive mill units and their waste tanks), at the receptor scale (targeting potential impacted sites in the streams) and at the watershed scale (which is the scale of overall water management). The approach is based mainly on remote sensing data without taking account of groundwater regimes or field measurements. Involvement of local experts for recognizing spatial features of interest and selecting appropriate risk parameters was proved necessary and efficient in order to model the stream pollution risk realistically. Potential impacted sites in the stream network were occasionally verified by a field survey. The results comprise a set of risk maps at the three different scales. The constructed digital geo-database can be updated or modified and thus is considered to be a dynamic tool for future environmental management in the service of the local community.
    Print ISSN: 1865-0473
    Electronic ISSN: 1865-0481
    Topics: Geosciences , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2013-09-28
    Description: We consider mining unusual patterns from a set  $T$ T of target texts. A typical method outputs unusual patterns if their observed frequencies are far from their expectation estimated under an assumed probabilistic model. However, it is difficult for the method to deal with the zero frequency and thus it suffers from data sparseness. We employ another set  $B$ B of background texts to define a composition   $xy$ xy to be peculiar if both $x$ x and  $y$ y are more frequent in  $B$ B than in  $T$ T and conversely $xy$ xy is more frequent in  $T$ T . $xy$ xy is unusual because $x$ x and  $y$ y are infrequent in  $T$ T while $xy$ xy is unexpectedly frequent compared to  $xy$ xy in  $B$ B . To find frequent subpatterns and infrequent patterns simultaneously, we develop a fast algorithm using the suffix tree and show that it scales almost linearly under practical settings of parameters. Experiments using DNA sequences show that found peculiar compositions basically appear in rRNA while patterns found by an existing method seem not to relate to specific biological functions. We also show that discovered patterns have similar lengths at which the distribution of frequencies of fixed length substrings begins to skew. This fact explains why our method can find long peculiar compositions.
    Print ISSN: 0219-1377
    Electronic ISSN: 0219-3116
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2013-09-30
    Description: PageRank is typically computed from the power of transition matrix in a Markov Chain model. It is therefore computationally expensive, and efficient approximation methods to accelerate the computation are necessary, especially when it comes to large graphs. In this paper, we propose two sampling algorithms for PageRank efficient approximation: Direct sampling and Adaptive sampling. Both methods sample the transition matrix and use the sample in PageRank computation. Direct sampling method samples the transition matrix once and uses the sample directly in PageRank computation, whereas adaptive sampling method samples the transition matrix multiple times with an adaptive sample rate which is adjusted iteratively as the computing procedure proceeds. This adaptive sample rate is designed for a good trade-off between accuracy and efficiency for PageRank approximation. We provide detailed theoretical analysis on the error bounds of both methods. We also compare them with several state-of-the-art PageRank approximation methods, including power extrapolation and inner–outer power iteration algorithm. Experimental results on several real-world datasets show that our methods can achieve significantly higher efficiency while attaining comparable accuracy than state-of-the-art methods.
    Print ISSN: 0219-1377
    Electronic ISSN: 0219-3116
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    facet.materialart.
    Unknown
    Springer
    Publication Date: 2013-09-30
    Description: LOF is a well-known approach for density-based outlier detection and has received much attention recently. It is important to design a privacy-preserving LOF outlier detection algorithm as the data on which LOF runs is typically spilt among multiple participants and no one is willing to disclose his sensitive information due to legal or moral considerations. This is, however, a hard problem since participants need to find the maximum one of the distances between an object and its k -Nearest Neighbors ( k -NN) without learning the information of these objects. In this paper, we propose an efficient protocol for privacy-preserving LOF outlier detection. We first employ a shuffle protocol to permute the distance vectors owned by different participants. Then, we design a secure selection method to obtain the garbled k -NN indexes and shares of k -distance for given objects. For each object, we make use of the k -distance of all objects to construct a vector, based on which the permute protocol is executed again to obtain new shares of k -distance. Finally, the shares corresponding to the garbled k -NN indexes are selected as the expected result. Our protocol ensures that all the intermediates are shared between multiple participants and thus avoid information leaking. In addition, our protocol is efficient as we prove that the computation and communication complexity of our protocol is bounded by $O(n^2)$ O ( n 2 ) .
    Print ISSN: 0219-1377
    Electronic ISSN: 0219-3116
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2013-10-01
    Description: A set of wireless mobile terminals, which cooperate by routing packets to each other creates a Mobile Ad-hoc Network (MANET). MANETs are continuing to grow their interest in research environment and they are attracting attention for their potential use in several fields such as collaborative computing and disaster recovery environments. Considering mobility of the terminals, the topology changes rapidly and routing becomes a key process for operation of MANETs. In this paper, we analyze the performance of Better Approach To MANET (BATMAN) routing protocol in an outdoor bridge environment considering mobility and vertical communication. We implement two scenarios on our testbed and evaluate the performance in terms of throughput and packetloss.
    Print ISSN: 0010-485X
    Electronic ISSN: 1436-5057
    Topics: Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...