id
stringlengths
9
16
title
stringlengths
4
278
categories
stringlengths
5
104
abstract
stringlengths
6
4.09k
1003.0095
Multiuser MIMO Downlink Beamforming Design Based on Group Maximum SINR Filtering
cs.IT math.IT
In this paper we aim to solve the multiuser multi-input multi-output (MIMO) downlink beamforming problem where one multi-antenna base station broadcasts data to many users. Each user is assigned multiple data streams and has multiple antennas at its receiver. Efficient solutions to the joint transmit-receive beamform...
1003.0120
Learning from Logged Implicit Exploration Data
cs.LG cs.AI
We provide a sound and consistent foundation for the use of \emph{nonrandom} exploration data in "contextual bandit" or "partially labeled" settings where only the value of a chosen action is learned. The primary challenge in a variety of settings is that the exploration policy, in which "offline" data is logged, i...
1003.0146
A Contextual-Bandit Approach to Personalized News Article Recommendation
cs.LG cs.AI cs.IR
Personalized web services strive to adapt their services (advertisements, news articles, etc) to individual users by making use of both content and user information. Despite a few recent advances, this problem remains challenging for at least two reasons. First, web service is featured with dynamically changing pools...
1003.0205
Detecting Weak but Hierarchically-Structured Patterns in Networks
cs.IT cs.LG math.IT math.ST stat.TH
The ability to detect weak distributed activation patterns in networks is critical to several applications, such as identifying the onset of anomalous activity or incipient congestion in the Internet, or faint traces of a biochemical spread by a sensor network. This is a challenging problem since weak distributed pat...
1003.0206
Why has (reasonably accurate) Automatic Speech Recognition been so hard to achieve?
cs.CL
Hidden Markov models (HMMs) have been successfully applied to automatic speech recognition for more than 35 years in spite of the fact that a key HMM assumption -- the statistical independence of frames -- is obviously violated by speech data. In fact, this data/model mismatch has inspired many attempts to modify or ...
1003.0219
Sequential Compressed Sensing
cs.IT math.IT
Compressed sensing allows perfect recovery of sparse signals (or signals sparse in some basis) using only a small number of random measurements. Existing results in compressed sensing literature have focused on characterizing the achievable performance by bounding the number of samples required for a given level of s...
1003.0242
Peak to Average Power Ratio Reduction for Space-Time Codes That Achieve Diversity-Multiplexing Gain Tradeoff
cs.IT math.IT
Zheng and Tse have shown that over a quasi-static channel, there exists a fundamental tradeoff, known as the diversity-multiplexing gain (D-MG) tradeoff. In a realistic system, to avoid inefficiently operating the power amplifier, one should consider the situation where constraints are imposed on the peak to average ...
1003.0248
Outage Probability of General Ad Hoc Networks in the High-Reliability Regime
cs.IT cs.NI math.IT math.ST stat.TH
Outage probabilities in wireless networks depend on various factors: the node distribution, the MAC scheme, and the models for path loss, fading and transmission success. In prior work on outage characterization for networks with randomly placed nodes, most of the emphasis was put on networks whose nodes are Poisson ...
1003.0319
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
cs.AI cs.CR cs.NE
As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performances in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of different implementation versions of the DXA, including the antigen multipl...
1003.0332
On the Optimal Number of Cooperative Base Stations in Network MIMO Systems
cs.IT math.IT
We consider a multi-cell, frequency-selective fading, uplink channel (network MIMO) where K user terminals (UTs) communicate simultaneously with B cooperative base stations (BSs). Although the potential benefit of multi-cell cooperation grows with B, the overhead related to the acquisition of channel state informatio...
1003.0337
Change of word types to word tokens ratio in the course of translation (based on Russian translations of K. Vonnegut novels)
cs.CL
The article provides lexical statistical analysis of K. Vonnegut's two novels and their Russian translations. It is found out that there happen some changes between the speed of word types and word tokens ratio change in the source and target texts. The author hypothesizes that these changes are typical for English-R...
1003.0339
libtissue - implementing innate immunity
cs.AI cs.NE
In a previous paper the authors argued the case for incorporating ideas from innate immunity into articficial immune systems (AISs) and presented an outline for a conceptual framework for such systems. A number of key general properties observed in the biological innate and adaptive immune systems were hughlighted, a...
1003.0358
Deep Big Simple Neural Nets Excel on Handwritten Digit Recognition
cs.NE cs.AI
Good old on-line back-propagation for plain multi-layer perceptrons yields a very low 0.35% error rate on the famous MNIST handwritten digits benchmark. All we need to achieve this best result so far are many hidden layers, many neurons per layer, numerous deformed training images, and graphics cards to greatly speed...
1003.0367
Stopping Set Distributions of Some Linear Codes
cs.IT math.IT
Stopping sets and stopping set distribution of an low-density parity-check code are used to determine the performance of this code under iterative decoding over a binary erasure channel (BEC). Let $C$ be a binary $[n,k]$ linear code with parity-check matrix $H$, where the rows of $H$ may be dependent. A stopping set ...
1003.0381
Modelling and Verification of Multiple UAV Mission Using SMV
cs.LO cs.MA cs.RO
Model checking has been used to verify the correctness of digital circuits, security protocols, communication protocols, as they can be modelled by means of finite state transition model. However, modelling the behaviour of hybrid systems like UAVs in a Kripke model is challenging. This work is aimed at capturing the...
1003.0396
Developing Experimental Models for NASA Missions with ASSL
cs.SE cs.RO
NASA's new age of space exploration augurs great promise for deep space exploration missions whereby spacecraft should be independent, autonomous, and smart. Nowadays NASA increasingly relies on the concepts of autonomic computing, exploiting these to increase the survivability of remote missions, particularly when h...
1003.0400
Collaborative Hierarchical Sparse Modeling
cs.IT math.IT
Sparse modeling is a powerful framework for data analysis and processing. Traditionally, encoding in this framework is done by solving an l_1-regularized linear regression problem, usually called Lasso. In this work we first combine the sparsity-inducing property of the Lasso model, at the individual feature level, w...
1003.0404
Exploration Of The Dendritic Cell Algorithm Using The Duration Calculus
cs.AI cs.LO
As one of the newest members in Artificial Immune Systems (AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to the field of anomaly detection. However, real-time detection, a new challenge to anomaly detection, requires improvement on the real-time cap...
1003.0415
The Sparsity Gap: Uncertainty Principles Proportional to Dimension
cs.IT math.IT
In an incoherent dictionary, most signals that admit a sparse representation admit a unique sparse representation. In other words, there is no way to express the signal without using strictly more atoms. This work demonstrates that sparse signals typically enjoy a higher privilege: each nonoptimal representation of t...
1003.0445
On The Design of Signature Codes in Decentralized Wireless Networks
cs.IT math.IT
This paper addresses a unified approach towards communication in decentralized wireless networks of separate transmitter-receiver pairs. In general, users are unaware of each other's codebooks and there is no central controller to assign the resources in the network to the users. A randomized signaling scheme is intr...
1003.0470
Unsupervised Supervised Learning II: Training Margin Based Classifiers without Labels
cs.LG
Many popular linear classifiers, such as logistic regression, boosting, or SVM, are trained by optimizing a margin-based risk function. Traditionally, these risk functions are computed based on a labeled dataset. We develop a novel technique for estimating such risks using only unlabeled data and the marginal label d...
1003.0487
Scalable Large-Margin Mahalanobis Distance Metric Learning
cs.CV
For many machine learning algorithms such as $k$-Nearest Neighbor ($k$-NN) classifiers and $ k $-means clustering, often their success heavily depends on the metric used to calculate distances between different data points. An effective solution for defining such a metric is to learn it from a set of labeled traini...
1003.0488
On Secure Distributed Data Storage Under Repair Dynamics
cs.IT cs.CR math.IT
We address the problem of securing distributed storage systems against passive eavesdroppers that can observe a limited number of storage nodes. An important aspect of these systems is node failures over time, which demand a repair mechanism aimed at maintaining a targeted high level of system reliability. If an eave...
1003.0514
The finite-dimensional Witsenhausen counterexample
cs.IT cs.CC math.IT math.OC
Recently, a vector version of Witsenhausen's counterexample was considered and it was shown that in that limit of infinite vector length, certain quantization-based control strategies are provably within a constant factor of the optimal cost for all possible problem parameters. In this paper, finite vector lengths ar...
1003.0516
Model Selection with the Loss Rank Principle
cs.LG
A key issue in statistics and machine learning is to automatically select the "right" model complexity, e.g., the number of neighbors to be averaged over in k nearest neighbor (kNN) regression or the polynomial degree in regression with polynomials. We suggest a novel principle - the Loss Rank Principle (LoRP) - for ...
1003.0520
Information embedding meets distributed control
cs.IT math.IT
We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recovers both the embedded message and the modified host signal. This extends the recent work of Sumszyk and Steinberg to the continuous-alphabe...
1003.0529
A Unified Algorithmic Framework for Multi-Dimensional Scaling
cs.LG cs.CG cs.CV
In this paper, we propose a unified algorithmic framework for solving many known variants of \mds. Our algorithm is a simple iterative scheme with guaranteed convergence, and is \emph{modular}; by changing the internals of a single subroutine in the algorithm, we can switch cost functions and target spaces easily. In...
1003.0590
A new model for solution of complex distributed constrained problems
cs.AI
In this paper we describe an original computational model for solving different types of Distributed Constraint Satisfaction Problems (DCSP). The proposed model is called Controller-Agents for Constraints Solving (CACS). This model is intended to be used which is an emerged field from the integration between two para...
1003.0617
Agent Based Approaches to Engineering Autonomous Space Software
cs.MA cs.AI
Current approaches to the engineering of space software such as satellite control systems are based around the development of feedback controllers using packages such as MatLab's Simulink toolbox. These provide powerful tools for engineering real time systems that adapt to changes in the environment but are limited w...
1003.0628
Linguistic Geometries for Unsupervised Dimensionality Reduction
cs.CL
Text documents are complex high dimensional objects. To effectively visualize such data it is important to reduce its dimensionality and visualize the low dimensional embedding as a 2-D or 3-D scatter plot. In this paper we explore dimensionality reduction methods that draw upon domain knowledge in order to achieve a...
1003.0642
Text Region Extraction from Business Card Images for Mobile Devices
cs.CV
Designing a Business Card Reader (BCR) for mobile devices is a challenge to the researchers because of huge deformation in acquired images, multiplicity in nature of the business cards and most importantly the computational constraints of the mobile devices. This paper presents a text extraction method designed in ou...
1003.0645
Binarizing Business Card Images for Mobile Devices
cs.CV
Business card images are of multiple natures as these often contain graphics, pictures and texts of various fonts and sizes both in background and foreground. So, the conventional binarization techniques designed for document images can not be directly applied on mobile devices. In this paper, we have presented a fas...
1003.0659
Particle Filtering on the Audio Localization Manifold
cs.AI cs.SD
We present a novel particle filtering algorithm for tracking a moving sound source using a microphone array. If there are N microphones in the array, we track all $N \choose 2$ delays with a single particle filter over time. Since it is known that tracking in high dimensions is rife with difficulties, we instead inte...
1003.0691
Statistical and Computational Tradeoffs in Stochastic Composite Likelihood
cs.LG
Maximum likelihood estimators are often of limited practical use due to the intensive computation they require. We propose a family of alternative estimators that maximize a stochastic variation of the composite likelihood function. Each of the estimators resolve the computation-accuracy tradeoff differently, and tak...
1003.0696
Exponential Family Hybrid Semi-Supervised Learning
cs.LG
We present an approach to semi-supervised learning based on an exponential family characterization. Our approach generalizes previous work on coupled priors for hybrid generative/discriminative models. Our model is more flexible and natural than previous approaches. Experimental results on several data sets show that...
1003.0723
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
cs.CR cs.CV
Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to jointly verify information in an interactive session, and how su...
1003.0727
On the comparison of volumes of quantum states
quant-ph cs.IT math-ph math.FA math.IT math.MP
This paper aims to study the $\a$-volume of $\cK$, an arbitrary subset of the set of $N\times N$ density matrices. The $\a$-volume is a generalization of the Hilbert-Schmidt volume and the volume induced by partial trace. We obtain two-side estimates for the $\a$-volume of $\cK$ in terms of its Hilbert-Schmidt volume...
1003.0729
On the Secure Degrees-of-Freedom of the Multiple-Access-Channel
cs.IT math.IT
A $K$-user secure Gaussian Multiple-Access-Channel (MAC) with an external eavesdropper is considered in this paper. An achievable rate region is established for the secure discrete memoryless MAC. The secrecy sum capacity of the degraded Gaussian MIMO MAC is proven using Gaussian codebooks. For the non-degraded Gauss...
1003.0735
Compress-and-Forward Performance in Low-SNR Relay Channels
cs.IT math.IT
In this paper, we study the Gaussian relay channels in the low signal-to-noise ratio (SNR) regime with the time-sharing compress-and-forward (CF) scheme, where at each time slot all the nodes keep silent at the first fraction of time and then transmit with CF at a higher peak power in the second fraction. Such a sile...
1003.0746
Automatically Discovering Hidden Transformation Chaining Constraints
cs.AI
Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transformation may be given as input to a second one if metamodels match. However, this simple rule has some obvious limitations. For instance, a transformati...
1003.0776
Properties of the Discrete Pulse Transform for Multi-Dimensional Arrays
cs.CV
This report presents properties of the Discrete Pulse Transform on multi-dimensional arrays introduced by the authors two or so years ago. The main result given here in Lemma 2.1 is also formulated in a paper to appear in IEEE Transactions on Image Processing. However, the proof, being too technical, was omitted ther...
1003.0789
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
cs.AI cs.CR cs.NE
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a Dendritic...
1003.0888
Support Recovery of Sparse Signals
cs.IT math.IT
We consider the problem of exact support recovery of sparse signals via noisy measurements. The main focus is the sufficient and necessary conditions on the number of measurements for support recovery to be reliable. By drawing an analogy between the problem of support recovery and the problem of channel coding over ...
1003.0931
A student's guide to searching the literature using online databases
physics.ed-ph cs.DL cs.IR
A method is described to empower students to efficiently perform general and literature searches using online resources. The method was tested on undergraduate and graduate students with varying backgrounds with scientific literature. Students involved in this study showed marked improvement in their awareness of how...
1003.0953
Information Flow in One-Dimensional Vehicular Ad Hoc Networks
cs.IT math.IT
We consider content distribution in vehicular ad hoc networks. We assume that a file is encoded using fountain code, and the encoded message is cached at infostations. Vehicles are allowed to download data packets from infostations, which are placed along a highway. In addition, two vehicles can exchange packets with...
1003.1010
Verifying Recursive Active Documents with Positive Data Tree Rewriting
cs.DB cs.OH
This paper proposes a data tree-rewriting framework for modeling evolving documents. The framework is close to Guarded Active XML, a platform used for handling XML repositories evolving through web services. We focus on automatic verification of properties of evolving documents that can contain data from an infinite ...
1003.1018
Zipf's law and log-normal distributions in measures of scientific output across fields and institutions: 40 years of Slovenia's research as an example
physics.data-an cs.DB stat.AP
Slovenia's Current Research Information System (SICRIS) currently hosts 86,443 publications with citation data from 8,359 researchers working on the whole plethora of social and natural sciences from 1970 till present. Using these data, we show that the citation distributions derived from individual publications have...
1003.1020
Learning by random walks in the weight space of the Ising perceptron
cond-mat.dis-nn cond-mat.stat-mech cs.LG q-bio.NC
Several variants of a stochastic local search process for constructing the synaptic weights of an Ising perceptron are studied. In this process, binary patterns are sequentially presented to the Ising perceptron and are then learned as the synaptic weight configuration is modified through a chain of single- or double...
1003.1048
Tag Clusters as Information Retrieval Interfaces
cs.IR
The paper presents our design of a next generation information retrieval system based on tag co-occurrences and subsequent clustering. We help users getting access to digital data through information visualization in the form of tag clusters. Current problems like the absence of interactivity and semantics between ta...
1003.1072
An Offline Technique for Localization of License Plates for Indian Commercial Vehicles
cs.CV
Automatic License Plate Recognition (ALPR) is a challenging area of research due to its importance to variety of commercial applications. The overall problem may be subdivided into two key modules, firstly, localization of license plates from vehicle images, and secondly, optical character recognition of extracted li...
1003.1141
From Frequency to Meaning: Vector Space Models of Semantics
cs.CL cs.IR cs.LG
Computers understand very little of the meaning of human language. This profoundly limits our ability to give instructions to computers, the ability of computers to explain their actions to us, and the ability of computers to analyse and process text. Vector space models (VSMs) of semantics are beginning to address t...
1003.1179
View Synthesis from Schema Mappings
cs.DB
In data management, and in particular in data integration, data exchange, query optimization, and data privacy, the notion of view plays a central role. In several contexts, such as data integration, data mashups, and data warehousing, the need arises of designing views starting from a set of known correspondences be...
1003.1251
Minimum Spanning Tree on Spatio-Temporal Networks
cs.DS cs.DB
Given a spatio-temporal network (ST network) where edge properties vary with time, a time-sub-interval minimum spanning tree (TSMST) is a collection of minimum spanning trees of the ST network, where each tree is associated with a time interval. During this time interval, the total cost of tree is least among all the...
1003.1256
Integrating Innate and Adaptive Immunity for Intrusion Detection
cs.AI cs.CR cs.NE
Network Intrusion Detection Systems (NDIS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS's rely on having access to a database of known attack signatures which are written by security experts. ...
1003.1257
On the symbol error probability of regular polytopes
cs.IT math.IT
An exact expression for the symbol error probability of the four-dimensional 24-cell in Gaussian noise is derived. Corresponding expressions for other regular convex polytopes are summarized. Numerically stable versions of these error probabilities are also obtained.
1003.1266
Hitting and commute times in large graphs are often misleading
cs.DS cs.LG math.PR
Next to the shortest path distance, the second most popular distance function between vertices in a graph is the commute distance (resistance distance). For two vertices u and v, the hitting time H_{uv} is the expected time it takes a random walk to travel from u to v. The commute time is its symmetrized version C_{u...
1003.1343
What does Newcomb's paradox teach us?
cs.GT cs.AI math.OC math.PR
In Newcomb's paradox you choose to receive either the contents of a particular closed box, or the contents of both that closed box and another one. Before you choose, a prediction algorithm deduces your choice, and fills the two boxes based on that deduction. Newcomb's paradox is that game theory appears to provide t...
1003.1354
Faster Rates for training Max-Margin Markov Networks
cs.LG cs.CC
Structured output prediction is an important machine learning problem both in theory and practice, and the max-margin Markov network (\mcn) is an effective approach. All state-of-the-art algorithms for optimizing \mcn\ objectives take at least $O(1/\epsilon)$ number of iterations to find an $\epsilon$ accurate soluti...
1003.1399
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
cs.CL
Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires knowledge and understanding of the encoded ideas. This paper presents a way how to create automatically domain vocabulary. Knowledge of domain vocab...
1003.1410
Local Space-Time Smoothing for Version Controlled Documents
cs.GR cs.CL cs.LG
Unlike static documents, version controlled documents are continuously edited by one or more authors. Such collaborative revision process makes traditional modeling and visualization techniques inappropriate. In this paper we propose a new representation based on local space-time smoothing that captures important rev...
1003.1422
Polar Coding for Secure Transmission and Key Agreement
cs.IT cs.CR math.IT
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Ar{...
1003.1450
A New Clustering Approach based on Page's Path Similarity for Navigation Patterns Mining
cs.LG
In recent years, predicting the user's next request in web navigation has received much attention. An information source to be used for dealing with such problem is the left information by the previous web users stored at the web access log on the web servers. Purposed systems for this problem work based on this idea...
1003.1455
A Computational Algorithm based on Empirical Analysis, that Composes Sanskrit Poetry
cs.CL
Poetry-writing in Sanskrit is riddled with problems for even those who know the language well. This is so because the rules that govern Sanskrit prosody are numerous and stringent. We propose a computational algorithm that converts prose given as E-text into poetry in accordance with the metrical rules of Sanskrit pr...
1003.1457
The Comparison of Methods Artificial Neural Network with Linear Regression Using Specific Variables for Prediction Stock Price in Tehran Stock Exchange
cs.NE
In this paper, researchers estimated the stock price of activated companies in Tehran (Iran) stock exchange. It is used Linear Regression and Artificial Neural Network methods and compared these two methods. In Artificial Neural Network, of General Regression Neural Network method (GRNN) for architecture is used. In ...
1003.1458
Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris
cs.CR cs.CV
Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the v...
1003.1460
Ontology Based Query Expansion Using Word Sense Disambiguation
cs.IR
The existing information retrieval techniques do not consider the context of the keywords present in the user's queries. Therefore, the search engines sometimes do not provide sufficient information to the users. New methods based on the semantics of user keywords must be developed to search in the vast web space wit...
1003.1493
Integration of Rule Based Expert Systems and Case Based Reasoning in an Acute Bacterial Meningitis Clinical Decision Support System
cs.AI
This article presents the results of the research carried out on the development of a medical diagnostic system applied to the Acute Bacterial Meningitis, using the Case Based Reasoning methodology. The research was focused on the implementation of the adaptation stage, from the integration of Case Based Reasoning an...
1003.1494
Formal Concept Analysis for Information Retrieval
cs.IR
In this paper we describe a mechanism to improve Information Retrieval (IR) on the web. The method is based on Formal Concepts Analysis (FCA) that it is makes semantical relations during the queries, and allows a reorganizing, in the shape of a lattice of concepts, the answers provided by a search engine. We proposed...
1003.1499
Evaluation of E-Learners Behaviour using Different Fuzzy Clustering Models: A Comparative Study
cs.CY cs.LG
This paper introduces an evaluation methodologies for the e-learners' behaviour that will be a feedback to the decision makers in e-learning system. Learner's profile plays a crucial role in the evaluation process to improve the e-learning process performance. The work focuses on the clustering of the e-learners base...
1003.1500
Hierarchical Approach for Online Mining--Emphasis towards Software Metrics
cs.DB
Several multi-pass algorithms have been proposed for Association Rule Mining from static repositories. However, such algorithms are incapable of online processing of transaction streams. In this paper we introduce an efficient single-pass algorithm for mining association rules, given a hierarchical classification amo...
1003.1504
Indexer Based Dynamic Web Services Discovery
cs.AI
Recent advancement in web services plays an important role in business to business and business to consumer interaction. Discovery mechanism is not only used to find a suitable service but also provides collaboration between service providers and consumers by using standard protocols. A static web service discovery m...
1003.1510
Hierarchical Web Page Classification Based on a Topic Model and Neighboring Pages Integration
cs.LG
Most Web page classification models typically apply the bag of words (BOW) model to represent the feature space. The original BOW representation, however, is unable to recognize semantic relationships between terms. One possible solution is to apply the topic model approach based on the Latent Dirichlet Allocation al...
1003.1511
Clinical gait data analysis based on Spatio-Temporal features
cs.CV
Analysing human gait has found considerable interest in recent computer vision research. So far, however, contributions to this topic exclusively dealt with the tasks of person identification or activity recognition. In this paper, we consider a different application for gait analysis and examine its use as a means o...
1003.1588
On the Failure of the Finite Model Property in some Fuzzy Description Logics
cs.AI
Fuzzy Description Logics (DLs) are a family of logics which allow the representation of (and the reasoning with) structured knowledge affected by vagueness. Although most of the not very expressive crisp DLs, such as ALC, enjoy the Finite Model Property (FMP), this is not the case once we move into the fuzzy case. In...
1003.1598
Information Fusion in the Immune System
cs.AI cs.NE
Biologically-inspired methods such as evolutionary algorithms and neural networks are proving useful in the field of information fusion. Artificial Immune Systems (AISs) are a biologically-inspired approach which take inspiration from the biological immune system. Interestingly, recent research has show how AISs whic...
1003.1655
Inner and Outer Bounds for the Public Information Embedding Capacity Region Under Multiple Access Attacks
cs.IT math.IT
We consider a public multi-user information embedding (watermarking) system in which two messages (watermarks) are independently embedded into two correlated covertexts and are transmitted through a multiple-access attack channel. The tradeoff between the achievable embedding rates and the average distortions for the...
1003.1658
A multivalued knowledge-base model
cs.AI
The basic aim of our study is to give a possible model for handling uncertain information. This model is worked out in the framework of DATALOG. At first the concept of fuzzy Datalog will be summarized, then its extensions for intuitionistic- and interval-valued fuzzy logic is given and the concept of bipolar fuzzy D...
1003.1738
MISO Capacity with Per-Antenna Power Constraint
cs.IT math.IT
We establish in closed-form the capacity and the optimal signaling scheme for a MISO channel with per-antenna power constraint. Two cases of channel state information are considered: constant channel known at both the transmitter and receiver, and Rayleigh fading channel known only at the receiver. For the first case...
1003.1787
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
cs.IT math.IT
Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. We give a proof for the imposs...
1003.1792
A Hybrid System based on Multi-Agent System in the Data Preprocessing Stage
cs.MA
We describe the usage of the Multi-agent system in the data preprocessing stage of an on-going project, called e-Wedding. The aim of this project is to utilize MAS and various approaches, like Web services, Ontology, and Data mining techniques, in e-Business that want to improve responsiveness and efficiency of syste...
1003.1795
A Survey of Na\"ive Bayes Machine Learning approach in Text Document Classification
cs.LG cs.IR
Text Document classification aims in associating one or more predefined categories based on the likelihood suggested by the training set of labeled documents. Many machine learning algorithms play a vital role in training the system with predefined categories among which Na\"ive Bayes has some intriguing facts that i...
1003.1803
Nonlinear Filter Based Image Denoising Using AMF Approach
cs.CV
This paper proposes a new technique based on nonlinear Adaptive Median filter (AMF) for image restoration. Image denoising is a common procedure in digital image processing aiming at the removal of noise, which may corrupt an image during its acquisition or transmission, while retaining its quality. This procedure is...
1003.1810
Reconfigurable Parallel Data Flow Architecture
cs.MA
This paper presents a reconfigurable parallel data flow architecture. This architecture uses the concepts of multi-agent paradigm in reconfigurable hardware systems. The utilization of this new paradigm has the potential to greatly increase the flexibility, efficiency, expandability of data flow systems and to provid...
1003.1814
An Analytical Approach to Document Clustering Based on Internal Criterion Function
cs.IR
Fast and high quality document clustering is an important task in organizing information, search engine results obtaining from user query, enhancing web crawling and information retrieval. With the large amount of data available and with a goal of creating good quality clusters, a variety of algorithms have been deve...
1003.1816
Role of Data Mining in E-Payment systems
cs.DB
Data Mining deals extracting hidden knowledge, unexpected pattern and new rules from large database. Various customized data mining tools have been developed for domain specific applications such as Biomedicine, DNA analysis and telecommunication. Trends in data mining include further efforts towards the exploration ...
1003.1819
Facial Gesture Recognition Using Correlation And Mahalanobis Distance
cs.CV
Augmenting human computer interaction with automated analysis and synthesis of facial expressions is a goal towards which much research effort has been devoted recently. Facial gesture recognition is one of the important component of natural human-machine interfaces; it may also be used in behavioural science, securi...
1003.1826
A GA based Window Selection Methodology to Enhance Window based Multi wavelet transformation and thresholding aided CT image denoising technique
cs.CV
Image denoising is getting more significance, especially in Computed Tomography (CT), which is an important and most common modality in medical imaging. This is mainly due to that the effectiveness of clinical diagnosis using CT image lies on the image quality. The denoising technique for CT images using window-based...
1003.1827
Investigation and Assessment of Disorder of Ultrasound B-mode Images
cs.CV
Digital image plays a vital role in the early detection of cancers, such as prostate cancer, breast cancer, lungs cancer, cervical cancer. Ultrasound imaging method is also suitable for early detection of the abnormality of fetus. The accurate detection of region of interest in ultrasound image is crucial. Since the ...
1003.1888
Biology-Derived Algorithms in Engineering Optimization
math.OC cs.CE cs.NE q-bio.QM
Biology-derived algorithms are an important part of computational sciences, which are essential to many scientific disciplines and engineering applications. Many computational methods are derived from or based on the analogy to natural evolution and biological activities, and these biologically inspired computations ...
1003.1891
Handwritten Arabic Numeral Recognition using a Multi Layer Perceptron
cs.CV
Handwritten numeral recognition is in general a benchmark problem of Pattern Recognition and Artificial Intelligence. Compared to the problem of printed numeral recognition, the problem of handwritten numeral recognition is compounded due to variations in shapes and sizes of handwritten characters. Considering all th...
1003.1894
A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
cs.CV
The work presents a comparative assessment of seven different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron (MLP) based classifier. The seven feature sets employed here consist of shadow features, octant centroids, longest runs, angular distances, effective spans, dynamic ...
1003.1931
Hypergraph model of social tagging networks
physics.soc-ph cs.IR
The past few years have witnessed the great success of a new family of paradigms, so-called folksonomy, which allows users to freely associate tags to resources and efficiently manage them. In order to uncover the underlying structures and user behaviors in folksonomy, in this paper, we propose an evolutionary hyperg...
1003.1954
Estimation of R\'enyi Entropy and Mutual Information Based on Generalized Nearest-Neighbor Graphs
stat.ML cs.AI
We present simple and computationally efficient nonparametric estimators of R\'enyi entropy and mutual information based on an i.i.d. sample drawn from an unknown, absolutely continuous distribution over $\R^d$. The estimators are calculated as the sum of $p$-th powers of the Euclidean lengths of the edges of the `ge...
1003.2005
Control of Complex Maneuvers for a Quadrotor UAV using Geometric Methods on SE(3)
math.OC cs.SY
This paper provides new results for control of complex flight maneuvers for a quadrotor unmanned aerial vehicle (UAV). The flight maneuvers are defined by a concatenation of flight modes or primitives, each of which is achieved by a nonlinear controller that solves an output tracking problem. A mathematical model of ...
1003.2022
Fast space-variant elliptical filtering using box splines
cs.CV cs.CE cs.IT cs.NA math.IT
The efficient realization of linear space-variant (non-convolution) filters is a challenging computational problem in image processing. In this paper, we demonstrate that it is possible to filter an image with a Gaussian-like elliptic window of varying size, elongation and orientation using a fixed number of computat...
1003.2138
Need-based Communication for Smart Grid: When to Inquire Power Price?
cs.IT math.IT
In smart grid, a home appliance can adjust its power consumption level according to the realtime power price obtained from communication channels. Most studies on smart grid do not consider the cost of communications which cannot be ignored in many situations. Therefore, the total cost in smart grid should be jointly...
1003.2142
QoS Routing in Smart Grid
cs.IT math.IT
Smart grid is an emerging technology which is able to control the power load via price signaling. The communication between the power supplier and power customers is a key issue in smart grid. Performance degradation like delay or outage may cause significant impact on the stability of the pricing based control and t...
1003.2218
Supermartingales in Prediction with Expert Advice
cs.LG
We apply the method of defensive forecasting, based on the use of game-theoretic supermartingales, to prediction with expert advice. In the traditional setting of a countable number of experts and a finite number of outcomes, the Defensive Forecasting Algorithm is very close to the well-known Aggregating Algorithm. N...
1003.2226
Interference Focusing for Mitigating Cross-Phase Modulation in a Simplified Optical Fiber Model
cs.IT math.IT
A memoryless interference network model is introduced that is based on non-linear phenomena observed when transmitting information over optical fiber using wavelength division multiplexing. The main characteristic of the model is that amplitude variations on one carrier wave are converted to phase variations on anoth...
1003.2257
Bit Allocation Law for Multi-Antenna Channel Feedback Quantization: Single-User Case
cs.IT math.IT
This paper studies the design and optimization of a limited feedback single-user system with multiple-antenna transmitter and single-antenna receiver. The design problem is cast in form of the minimizing the average transmission power at the base station subject to the user's outage probability constraint. The optimi...