Your search
Results 295 resources
-
Researches in real-time scheduling often assume that the performance of a computing resource does not change overtime. However, as system softwares and system architectures become increasingly complex, resource performance degradation over time becomes more evident. In this paper, we study the schedulability of a hard real-time task set on a resource which has performance degradation over time with a known pattern and use both cold and warm periodic rejuvenations as countermeasures. Such resource model is referred to as P2D-resource model for performance degradation and periodic rejuvenation with dual-levels. In this paper, we study (1) the formal specification of the P2D-resource model, (2) P2D-resource supply analysis, and (3) task set utilization bounds of a P2D-resource under Earliest Deadline First (EDF) and Rate Monotonic (RM) scheduling policies.
-
Measurements of parameters in electricity grids are frequently captured as average values over some time interval. In scenarios of distributed measurements such as in distribution grids, offsets of local clocks can result in misaligned averaging intervals. This paper investigates the properties of the so-called time alignment error of such measurands that is caused by shifts of the averaging interval. We extend a previously derived Markov-modulated model and provide an approximation of the variance of the time alignment error. The model accounts for slow-decaying correlation structure found in actual traces of electrical measures. We compare results of three electrical measures for 20 traces with numerical results and simulations from the the fitted Markov model. © 2019 IEEE.
-
This work proposes a new approach in addressing Economic Load Dispatch (ELD) optimization problem in power unit systems using nature-inspired metaheuristics search algorithms. Solving such a problem requires a degree of maximization of the economic pact of a power network system, where this is possible with some existing population-based metaheuristic search algorithms. The key issue to be handled here is how to maximize the economic benevolence of a power network under a variety of operational constraints, taking into account the reduction in the generated fuel cost as well as the aggregate power loss in the transmission power network system. Some nature-inspired metaheuristics will be explored. Meanwhile, we shall focus our attention on a newly developed nature-inspired search algorithm, referred to as the Crow Search Algorithm or CSA for short, as well as the Differential Evolution (DE) that is commonly known as a metaheuristic. The CSA emerged to light by simulating the intelligent flocking behavior of crows. The practicability of the proposed approach-based CSA was conducted to common types of power generators, including three and six buses (nodes) in addition to the IEEE 30-bus standard system. The results of the presented approaches were compared to other results developed using existing nature-inspired metaheuristic algorithms like particle swarm optimization and genetic algorithms and also compared to traditional approaches such as quadratic programming method. The results reported here support that CSA has achieved an outstanding performance in solving the problem of ELD in power systems, demonstrating their good optimization capabilities through arriving at a combination of power loads that consummate the constraints of the ELD problem while simultaneously lessening the entire fuel cost. The experimental results also showed that the CSA solutions were capable of maximizing the reliability of the power supplied to the customers, and also reducing both the generated power cost and the loss of power in the transmission power systems.
-
Regrettably, a large proportion of likely patients with sleep apnea are underdiagnosed. Obstructive sleep apnea (OSA) is one of the main causes of hypertension, type II diabetes, stroke, coronary artery disease, and heart failure. OSA affects not only adults but also children where it forms one of the sources of learning disabilities for children. This study aims to provide a classification model for one of the well-known sleep disorders known as OSA, which causes a serious malady that affects both men and women. OSA affects both genders with different scope. Men versus women diagnosed with OSA are about 8:1. In this research, logistic regression (LR) and artificial neural networks were applied successfully in several classification applications with promising results, particularly in the bio-statistics area. LR was used to derive a membership probability for a potential OSA system from a range of anthropometric features including weight, height, body mass index (BMI), hip, waist, age, neck circumference, modified Friedman, snoring, Epworth sleepiness scale (ESS), sex, and daytime sleepiness. We developed two models to predict OSA, one for men and one for women. The proposed sleep apnea diagnosis model has yielded accurate classification results and possibly a prototype software module that can be used at home. These findings shall reduce the patient’s need to spend a night at a laboratory and make the study of sleep apnea to implement at home.
-
A smartphone-based fall detection system has two major advantages over a traditional fall detection system that comes as a separate device: (1) the phone can automatically send messages to or call the emergency contact person when a fall is detected and (2) a user does not need to carry an extra device. This paper presents a novel two-step fall detection method which uses data extracted from smartphone sensors to detect falls. A fall can happen in many ways. A person can fall while he/she is walking, jogging, sitting, or even sleeping. Patterns of all falls are not the same. It is important to identify the type of falls to precisely distinguish it from non-falls (normal activities). Hence, our method first identifies the correct type of falls by performing multi-class classification. In the second step, this method produces a binary decision based on the multiclass prediction. We collected data from 10 users to evaluate our proposed fall detection method. Each user performed five normal activities-namely, walking, jogging, standing, sitting, lying, and also fell after performing each activity. We performed experiments with five common smartphone sensors: accelerometer, gyroscope, magnetometer, gravity, and linear acceleration. We tested five machine learning classifiers-namely, Support Vector Machine, K-Nearest Neighbor, Decision Tree, Random Forest, and Naive Bayes. Our two-step fall detection method achieved the maximum accuracy of 95.65% and the maximum area under ROC curve (AUC) of 0.93, both with the gyroscope sensor and Support Vector Machine classifier.
-
We outline a novel method of user authentication for smart mobile devices, such as smartphones or tablets and propose movement pattern based authentication as an alternate to current methods that relies on a pin or drawn-pattern. While the current methods are vulnerable against common attacks (e.g., smudge attacks, shoulder surfing), our method, in contrast, is more resilient against the attacks of these kinds because it utilizes sensory data given off by the device during a preset movement for authentication. In our experiment, we recorded the values given off by four physical observational sensors: (1) accelerometer, (2) linear accelerometer, (3) gyroscope and (4) tilt sensor, which each had three axes, over a set of movements. We experimented with 10 arbitrary movement-patterns and gathered 12 samples of each (net 120 samples) to test with. We developed our own method of authentication, through which we performed 35,650 authentication attempts and found a 20.36% Equal Error Rate.
-
Design of a serial fusion based multi-biometric verification system requires fixing several parameters, such as reject thresholds at each stage of the architecture and the order in which each individual verifier is placed within the multi-stage system. Selecting the order of verifier is a crucial parameter to fix because of its high impact on verification errors. A wrong choice of verifier order might lead to tremendous user inconvenience by denying a large number of genuine users and might cause severe security breach by accepting impostors frequently. Unfortunately, this design issue has been poorly investigated in multi-biometric literature. In this paper, we address this design issue by performing experiments using three different serial fusion based multi-biometric verification schemes. We did our experiments on publicly available NIST multi-modal dataset. We tested 24 orders—all possible orders originated from four individual verifiers—on a four-stage biometric verification system. Our experimental results show that the verifier order “best-to-worst”, where the best performing individual verifier is placed in the first stage, the next best performing individual verifier is placed in the second stage, and so on, is the top performing order. In addition, we have proposed a modification to the traditional architecture of serial fusion based multi-biometric verification systems. With rigorous experiments on the NIST multi-modal dataset and using three serial fusion based multi-biometric verification schemes, we demonstrated that our proposed architecture significantly improves the performance of serial fusion based multi-biometric verification systems.
-
Measurements of parameters in electricity grids are frequently average values over some time interval. In scenarios of distributed measurements such as in distribution grids, offsets of local clocks can result in the averaging interval being misaligned. This paper investigates the properties of the so-called time alignment error of such measurands that is caused by shifts of the averaging interval. A Markov model is derived that allows for numerically calculating the expected value and other distribution properties of this error. Actual consumption measurements of an office building are used to study the behavior of this time alignment error, and to compare the results from the trace with numerical results and simulations from a fitted Markov model. For increasing averaging interval offset, the time alignment error approaches a normal distribution, whose parameters can be calculated or approximated from the Markov model.
-
The traditional architecture of serial fusion based multi-biometric verification systems places an average performing or the worst performing individual verifier in the final stage. Because the final stage gives the verification decision using a single threshold and takes on the most confusing samples which are rejected by all previous stages, an average or the worst performing individual verifier may incur high verification errors in the final stage, which may negatively impact the performance of the whole system. Unfortunately, it is not possible to place a strong individual verifier in the final stage of a traditional architecture because if we place a strong individual verifier in the final stage, we will have to place a weak individual verifier in an earlier stage. Studies show that placing a weak individual verifier in an earlier stage worsens the performance of the whole system by giving more wrong decision earlier. Hence, the challenge is-how can we place the best performing individual verifier in the first stage and at the same time not place an average or the worst performing individual verifier in the final stage? In this paper, we address this challenge. We have come up with a very simple but effective solution. We have proposed a modification to the traditional architecture of serial fusion based multi-biometric verification systems. With rigorous experiments on the NIST multi-modal dataset and using three serial fusion based multi-biometric verification schemes, we demonstrated that our proposed architecture significantly improves the performance of serial fusion based multi-biometric verification systems. © 2018 IEEE.
-
Twitter users often crave more followers to increase their social popularity. While a variety of factors have been shown to attract the followers, very little work has been done to analyze the mechanism how Twitter users follow or unfollow each other. In this paper, we apply game theory to modeling the follow-unfollow mechanism on Twitter. We first present a two-player game which is based on the Prisoner’s Dilemma, and subsequently evaluate the payoffs when the two players adopt different strategies. To allow two players to play multiple rounds of the game, we propose a multi-stage game model. We design a Twitter bot analyzer which follows or unfollows other Twitter users by adopting the strategies from the multi-stage game. We develop an algorithm which enables the Twitter bot analyzer to automatically collect and analyze the data. The results from analyzing the data collected in our experiment show that the follow-back ratios for both of the Twitter bots are very low, which are 0.76%0.76%0.76\% and 0.86%0.86%0.86\%. This means that most of the Twitter users do not cooperate and only want to be followed instead of following others. Our results also exhibit the effect of different strategies on the follow-back followers and on the non-following followers as well.
-
This textbook covers digital design, fundamentals of computer architecture, and assembly language. The book starts by introducing basic number systems, character coding, basic knowledge in digital design, and components of a computer. The book goes on to discuss information representation in computing; Boolean algebra and logic gates; sequential logic; input/output; and CPU performance. The author also covers ARM architecture, ARM instructions and ARM assembly language which is used in a variety of devices such as cell phones, digital TV, automobiles, routers, and switches. The book contains a set of laboratory experiments related to digital design using Logisim software; in addition, each chapter features objectives, summaries, key terms, review questions and problems. The book is targeted to students majoring Computer Science, Information System and IT and follows the ACM/IEEE 2013 guidelines. • Comprehensive textbook covering digital design, computer architecture, and ARM architecture and assembly • Covers basic number system and coding, basic knowledge in digital design, and components of a computer • Features laboratory exercises in addition to objectives, summaries, key terms, review questions, and problems in each chapter
-
Understanding the impact of network traffic properties on performance behavior in bottleneck links or larger networks is of primary interest to traffic analysts and network designers. Among the contributing factors, variance and correlation properties have been thoroughly studied and a large set of individual results have been obtained. However, these individual contributing factors are not sufficient to predict performance behavior. In this paper we review a unifying and versatile class of ON/OFF models through which the relationship among these parameters can be characterized and their influence on network performance be understood. The analytic performance results from the model show that there is a radically different queueing behavior when the ON period duration follows truncated power-tail distributions (even if truncated), as opposed to model variants where these distribution types are used for the OFF periods. All these models create correlation functions that only decay slowly. This motivates the development of a simple data analysis scheme to distinguish performance relevant correlation. The scheme is described both for interarrival and count processes of traffic data and its effectiveness is shown using real data traces.
-
In this paper, we study the influence from the sentiment of regular tweets on retweeting. We propose a method to calculate the sentiment score for each tweet and each Twitter user. This method enables us to place the tweets and retweets into the same time period to explore the sentiment factor. We adopt the correlation coefficient between the sentiment scores of regular tweets and those of retweets to measure the influence. We categorize the Twitter users in three different ways to investigate three factors, which are the number of followers, betweenness centrality and the types of accounts. Community detection and machine learning are integrated into our approach. We find that the difference for correlation coefficients exists between different levels of the number of followers, and different types of users. Our method sheds a light on better predicting the dynamics of tweets diffusion by including the sentiment factor into the prediction model. © 2017 IEEE.
-
Selecting the order of verifier in a serial fusion based multi-biometric system is a crucial parameter to fix because of its high impact on verification errors. A wrong choice of verifier order might lead to tremendous user inconvenience by denying a large number of genuine users and might cause severe security breach by accepting impostors frequently. Unfortunately, this design issue has been poorly investigated in multi-biometric literature. In this paper, we address this design issue by performing experiments using three different serial fusion based multi-biometric verification schemes, in particular (1) symmetric scheme, (2) SPRT-based scheme, and (3) Marcialis et al.’s scheme. We experimented on publicly available NIST-BSSR1 multi-modal database. We tested 24 orders—all possible orders originated from four individual verifiers—on a four-stage biometric verification system. Our experimental results show that the verifier order “best-to-worst”, where the best performing individual verifier is placed in the first stage, the next best performing individual verifier is placed in the second stage, and so on, is the top performing order for all three serial fusion schemes mentioned above.
Explore
Department
- Computer Science
- Chemistry (1)
- History (1)
- Mathematics (1)
- Physics (6)
- Psychology (2)
- Public Health (1)
Resource type
- Book (12)
- Book Section (11)
- Conference Paper (126)
- Journal Article (133)
- Report (13)
Publication year
- Between 1900 and 1999 (53)
-
Between 2000 and 2026
(242)
- Between 2000 and 2009 (35)
- Between 2010 and 2019 (87)
- Between 2020 and 2026 (120)