Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
The Seasonal Dynamics of Vegetation in an Anthropogenically Transformed Natural Environment Based on Multispectral Survey Data
Pattern Recognition and Image Analysis (SPPRIA), Volume 34, Issue 3Pages 418–428https://doi.org/10.1134/S1054661824700822AbstractReconstruction of the anthropogenically transformed environment in order to identify areas of historical environmental management requires a comprehensive analysis of multispectral data. It includes the construction of maps of vegetation indices ...
- abstractJune 2018
Real-time gaze transition entropy
ETRA '18: Proceedings of the 2018 ACM Symposium on Eye Tracking Research & ApplicationsArticle No.: 94, Pages 1–3https://doi.org/10.1145/3204493.3208340In this video, we introduce a real-time algorithm that computes gaze transition entropy. This approach can be employed in detecting higher level cognitive states such as situation awareness. We first compute fixations using our real-time version of a ...
- articleApril 2018
Generation of Alternative Solutions in the Redundancy Management Problem for Hardware Complexes
Automation and Remote Control (ARCO), Volume 79, Issue 4Pages 655–664https://doi.org/10.1134/S0005117918040070We consider the problem of finding a set of alternative configurations of redundant complexes for onboard equipment and give an analytic solution. The redundancy problem is solved by finding admissible values of the "integration" matrix that contains ...
- articleSeptember 2017
An analytic approach to constructing configurations of technical systems
Automation and Remote Control (ARCO), Volume 78, Issue 9Pages 1600–1613https://doi.org/10.1134/S0005117917090053We consider a formalized problem setting for designing possible configurations of a technical system with redundant components and its analytic solution. As the quality criterion for a specific configuration we use the constancy of a given set of ...
- articleSeptember 2016
On the estimation of the second largest eigenvalue of Markov ciphers
Security and Communication Networks (SACN), Volume 9, Issue 13Pages 2093–2099https://doi.org/10.1002/sec.1465Differential cryptanalysis is an effective tool in modern cryptanalysis. The differential chain of a Markov cipher forms a Markov chain, and the second largest eigenvalue SLE of the transition matrix determines the number of iterations such that the ...
-
- research-articleMay 2015
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers
IEEE Transactions on Information Theory (ITHR), Volume 61, Issue 5Pages 2942–2951https://doi.org/10.1109/TIT.2015.2416712Since the linear structure of linear feedback shift registers (LFSRs) has a drawback that may lead to attacks against LFSR-based stream ciphers, feedback with carry shift registers (FCSRs) have been proposed as an alternative to LFSRs for the design of ...
- research-articleFebruary 2015
Inverting a Steady-State
WSDM '15: Proceedings of the Eighth ACM International Conference on Web Search and Data MiningPages 359–368https://doi.org/10.1145/2684822.2685310We consider the problem of inferring choices made by users based only on aggregate data containing the relative popularity of each item. We propose a framework that models the problem as that of inferring a Markov chain given a stationary distribution. ...
- articleJanuary 2015
A direct estimation of high dimensional stationary vector autoregressions
The vector autoregressive (VAR) model is a powerful tool in learning complex time series and has been exploited in many fields. The VAR model poses some unique challenges to researchers: On one hand, the dimensionality, introduced by incorporating ...
- articleJanuary 2015
Controllability of Context-Sensitive Probabilistic Mix-Valued Logical Control Networks with Constraints
This paper addresses the controllability of context-sensitive probabilistic mix-valued logical control networks with constraints on states and controls. First, using the semi-tensor product of matrices, the context-sensitive probabilistic mix-valued ...
- research-articleMarch 2014
Entropy-based statistical analysis of eye movement transitions
ETRA '14: Proceedings of the Symposium on Eye Tracking Research and ApplicationsPages 159–166https://doi.org/10.1145/2578153.2578176The paper introduces a two-step method of quantifying eye movement transitions between Areas of Interests (AOIs). First, individuals' gaze switching patterns, represented by fixated AOI sequences, are modeled as Markov chains. Second, Shannon's entropy ...
- ArticleNovember 2013
An Algorithm for Mining Top K Influential Community Based Evolutionary Outliers in Temporal Dataset
ICTAI '13: Proceedings of the 2013 IEEE 25th International Conference on Tools with Artificial IntelligencePages 524–531https://doi.org/10.1109/ICTAI.2013.84Identifying outlier objects against main community evolution trends is not only meaningful itself for the purpose of finding novel evolution behaviors, but also helpful for better understanding the mainstream of community evolution. With the definition ...
- short-paperAugust 2013
Circular heat map transition diagram
ETSA '13: Proceedings of the 2013 Conference on Eye Tracking South AfricaPages 58–61https://doi.org/10.1145/2509315.2509326Eye tracking experiments are the state-of-the-art technique to study questions of usability of graphical interfaces. Visualizations help to analyse eye tracking data by presenting it in a graphical way. In this paper we contribute a new visualization ...
- ArticleJune 2013
A New Joint Source Channel Decoding Scheme Based on Speech Signal
ICCIS '13: Proceedings of the 2013 International Conference on Computational and Information SciencesPages 1967–1970https://doi.org/10.1109/ICCIS.2013.514The study proposes a joint source channel decoding scheme with the speech source residual redundancy without changing the complexity of the decoding algorithm. As the speech parameter index could be used to calculate the transition probability of the ...
- ArticleDecember 2011
IT blueprint and school
Nowadays, computer is already a common and important device that uses in all institution and use ICT for supporting the business or even as a business enabler. They always keep expanding their ICT to supporting their business in more ways. People need ...
- ArticleOctober 2011
Comparison between two methods to calculate the transition matrix of orbital motion
Two methods to evaluate the state transition matrix are implemented and analyzed to verify the computational cost and the accuracy of both methods. This evaluation represents one of the highest computational costs on the artificial satellite orbit ...
- ArticleSeptember 2011
Automatic birdsong recognition with MFCC based syllable feature extraction
UIC'11: Proceedings of the 8th international conference on Ubiquitous intelligence and computingPages 185–196In this study, an automatic birdsong recognition system based on syllable features was developed. In this system, after syllable segmentation, three syllable features, namely mean, QI and QE, were computed from the MFCCs of each syllable aims at ...
- articleApril 2011
A stable credit rating model based on learning vector quantization
Intelligent Data Analysis (INDA), Volume 15, Issue 2Pages 237–250Credit rating is involved in many financial applications to estimate the creditworthiness of corporations or individuals. In addition to building accurate credit rating models, the stability of models is of significant importance to economic ...
- articleJanuary 2011
On the modelling of DC-DC converters: An enhanced approach
International Journal of Numerical Modelling: Electronic Networks, Devices and Fields (JONM), Volume 24, Issue 1Pages 36–57https://doi.org/10.1002/jnm.759DC-DC converters are nonlinear systems that can exhibit complicated phenomena, which make difficult the system behaviour analysis and the controller design. The validity of any prediction and analysis of the converter behaviour are, mainly, related to ...
- ArticleDecember 2010
IT Blueprint for Education Institution
ACT '10: Proceedings of the 2010 Second International Conference on Advances in Computing, Control, and Telecommunication TechnologiesPages 180–184https://doi.org/10.1109/ACT.2010.41Nowadays, teaching and learning process are changes drastically. Everything changes to be more digitalized and simpler. The way teacher addressing the materials, the way the student record the materials from the teacher, the way to communicate between ...
- ArticleSeptember 2010
Stochastic transition model for discrete agent movements
ACRI'10: Proceedings of the 9th international conference on Cellular automata for research and industryPages 506–512We propose a calibrated two-dimensional cellular automaton model to simulate pedestrian motion behavior. It is a vmax= 4 (3) model with exclusion statistics and random shuffled dynamics. The underlying regular grid structure results in a direction-...