id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1403.3969
Bernhard von Stengel
Rahul Savani, Bernhard von Stengel
Game Theory Explorer - Software for the Applied Game Theorist
null
Computational Management Science 12:1, 5-33 (2015)
10.1007/s10287-014-0206-x
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the "Game Theory Explorer" software tool to create and analyze games as models of strategic interaction. A game in extensive or strategic form is created and nicely displayed with a graphical user interface in a web browser. State-of-the-art algorithms then compute all Nash equilibria of the game after a mouseclick. In tutorial fashion, we present how the program is used, and the ideas behind its main algorithms. We report on experiences with the architecture of the software and its development as an open-source project.
[ { "version": "v1", "created": "Sun, 16 Mar 2014 22:28:32 GMT" } ]
2015-01-07T00:00:00
[ [ "Savani", "Rahul", "" ], [ "von Stengel", "Bernhard", "" ] ]
new_dataset
0.964161
1501.01039
Jack Peterson
Joseph Krug and Jack Peterson
Sidecoin: a snapshot mechanism for bootstrapping a blockchain
3 pages
null
10.13140/2.1.4577.1841
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sidecoin is a mechanism that allows a snapshot to be taken of Bitcoin's blockchain. We compile a list of Bitcoin's unspent transaction outputs, then use these outputs and their corresponding balances to bootstrap a new blockchain. This allows the preservation of Bitcoin's economic state in the context of a new blockchain, which may provide new features and technical innovations.
[ { "version": "v1", "created": "Mon, 5 Jan 2015 23:48:06 GMT" } ]
2015-01-07T00:00:00
[ [ "Krug", "Joseph", "" ], [ "Peterson", "Jack", "" ] ]
new_dataset
0.995092
1501.01075
Omar Abuzaghleh
Omar Abuzaghleh, Miad Faezipour and Buket D. Barkana
Skincure: An Innovative Smart Phone-Based Application To Assist In Melanoma Early Detection And Prevention
appears in Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.6, December 2014
null
10.5121/sipij.2014.5601
null
cs.CV cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Melanoma spreads through metastasis, and therefore it has been proven to be very fatal. Statistical evidence has revealed that the majority of deaths resulting from skin cancer are as a result of melanoma. Further investigations have shown that the survival rates in patients depend on the stage of the infection; early detection and intervention of melanoma implicates higher chances of cure. Clinical diagnosis and prognosis of melanoma is challenging since the processes are prone to misdiagnosis and inaccuracies due to doctors subjectivity. This paper proposes an innovative and fully functional smart-phone based application to assist in melanoma early detection and prevention. The application has two major components; the first component is a real-time alert to help users prevent skin burn caused by sunlight; a novel equation to compute the time for skin to burn is thereby introduced. The second component is an automated image analysis module which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction, and classification. The proposed system exploits PH2 Dermoscopy image database from Pedro Hispano Hospital for development and testing purposes. The image database contains a total of 200 dermoscopy images of lesions, including normal, atypical, and melanoma cases. The experimental results show that the proposed system is efficient, achieving classification of the normal, atypical and melanoma images with accuracy of 96.3%, 95.7% and 97.5%, respectively.
[ { "version": "v1", "created": "Tue, 6 Jan 2015 04:19:55 GMT" } ]
2015-01-07T00:00:00
[ [ "Abuzaghleh", "Omar", "" ], [ "Faezipour", "Miad", "" ], [ "Barkana", "Buket D.", "" ] ]
new_dataset
0.997625
1501.01083
Mohana S H
S.H. Mohana, C.J. Prabhakar
Stem-Calyx Recognition of an Apple using Shape Descriptors
15 pages, 10 figures and 2 tables in Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.6, December 2014
null
10.5121/sipij.2014.5602
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper presents a novel method to recognize stem - calyx of an apple using shape descriptors. The main drawback of existing apple grading techniques is that stem - calyx part of an apple is treated as defects, this leads to poor grading of apples. In order to overcome this drawback, we proposed an approach to recognize stem-calyx and differentiated from true defects based on shape features. Our method comprises of steps such as segmentation of apple using grow-cut method, candidate objects such as stem-calyx and small defects are detected using multi-threshold segmentation. The shape features are extracted from detected objects using Multifractal, Fourier and Radon descriptor and finally stem-calyx regions are recognized and differentiated from true defects using SVM classifier. The proposed algorithm is evaluated using experiments conducted on apple image dataset and results exhibit considerable improvement in recognition of stem-calyx region compared to other techniques.
[ { "version": "v1", "created": "Tue, 6 Jan 2015 05:51:23 GMT" } ]
2015-01-07T00:00:00
[ [ "Mohana", "S. H.", "" ], [ "Prabhakar", "C. J.", "" ] ]
new_dataset
0.998627
1501.01109
Md. Abdullah- Al-Mashud Mashud
M.A.A. Mashud, M. R. Hossain, Mustari Zaman and M.A. Razzaque
PC Guided Automatic Vehicle System
10 pages, International Journal on Cybernetics & Informatics (IJCI);2014
null
10.5121/ijci.2014.3601
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main objective of this paper is to design and develop an automatic vehicle, fully controlled by a computer system. The vehicle designed in the present work can move in a pre-determined path and work automatically without the need of any human operator and it also controlled by human operator. Such a vehicle is capable of performing wide variety of difficult tasks in space research, domestic, scientific and industrial fields. For this purpose, an IBM compatible PC with Pentium microprocessor has been used which performed the function of the system controller. Its parallel printer port has been used as data communication port to interface the vehicle. A suitable software program has been developed for the system controller to send commands to the vehicle.
[ { "version": "v1", "created": "Tue, 6 Jan 2015 08:27:46 GMT" } ]
2015-01-07T00:00:00
[ [ "Mashud", "M. A. A.", "" ], [ "Hossain", "M. R.", "" ], [ "Zaman", "Mustari", "" ], [ "Razzaque", "M. A.", "" ] ]
new_dataset
0.986432
1402.1732
Christian Franck
Christian Franck
Dining Cryptographers with 0.924 Verifiable Collision Resolution
11 pages, 3 figures
Annales UMCS, Informatica. Volume 14, Issue 1, Pages 49-59, ISSN (Online) 2083-3628, October 2014
10.2478/umcsinfo-2014-0007
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dining cryptographers protocol implements a multiple access channel in which senders and recipients are anonymous. A problem is that a malicious participant can disrupt communication by deliberately creating collisions. We propose a computationally secure dining cryptographers protocol with collision resolution that achieves a maximum stable throughput of 0.924 messages per round and which allows to easily detect disruptors.
[ { "version": "v1", "created": "Fri, 7 Feb 2014 18:53:40 GMT" }, { "version": "v2", "created": "Tue, 17 Jun 2014 15:27:13 GMT" }, { "version": "v3", "created": "Sat, 3 Jan 2015 21:06:50 GMT" } ]
2015-01-06T00:00:00
[ [ "Franck", "Christian", "" ] ]
new_dataset
0.973038
1402.2269
Christian Franck
Christian Franck, Jeroen van de Graaf
Dining Cryptographers are Practical
12 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dining cryptographers protocol provides information-theoretically secure sender and recipient untraceability. However, the protocol is considered to be impractical because a malicious participant may disrupt the communication. We propose an implementation which provides information-theoretical security for senders and recipients, and in which a disruptor with limited computational capabilities can easily be detected.
[ { "version": "v1", "created": "Mon, 10 Feb 2014 20:57:37 GMT" }, { "version": "v2", "created": "Mon, 16 Jun 2014 18:08:59 GMT" }, { "version": "v3", "created": "Sat, 3 Jan 2015 21:41:00 GMT" } ]
2015-01-06T00:00:00
[ [ "Franck", "Christian", "" ], [ "van de Graaf", "Jeroen", "" ] ]
new_dataset
0.958484
1410.4145
Shadman Sakib
Shadman Sakib, Anik Chowdhury, Shekh Tanvir Ahamed and Syed Imam Hasan
Maze solving Algorithm for line following robot and derivation of linear path distance from nonlinear path
Published in the Proceedings of 16th International Conference on Computer and Information Technology, Khulna, Bangladesh
null
10.1109/ICCITechn.2014.6997314
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have discussed a unique general algorithm for exploring and solving any kind of line maze with another simple one for simple mazes without loops or loops having highest two branches none of which are inward. For the general algorithm, we need a method to map the whole maze, which is required if the maze is complex. The proposed maze mapping system is based on coordinate system and after mapping the whole maze as a graph in standard 'Adjacency-list representation' method, shortest path and shortest time path was extracted using Dijkstra's algorithm. In order to find the coordinates of the turning points and junctions, linear distance between the points are needed, for which wheel encoder was used. However, due to non-linear movement of robot, the directly measured distance from the encoder has some error and to remove this error an idea is built up which ended by deriving equations that gives us almost exact linear distance between two points from the reading of wheel encoder of the robot moving in a non-linear path.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 17:30:56 GMT" }, { "version": "v2", "created": "Sun, 4 Jan 2015 09:58:31 GMT" } ]
2015-01-06T00:00:00
[ [ "Sakib", "Shadman", "" ], [ "Chowdhury", "Anik", "" ], [ "Ahamed", "Shekh Tanvir", "" ], [ "Hasan", "Syed Imam", "" ] ]
new_dataset
0.991165
1411.6574
David Pastor-Escuredo
David Pastor-Escuredo, Alfredo Morales-Guzm\'an, Yolanda Torres-Fern\'andez, Jean-Martin Bauer, Amit Wadhwa, Carlos Castro-Correa, Liudmyla Romanoff, Jong Gun Lee, Alex Rutherford, Vanessa Frias-Martinez, Nuria Oliver, Enrique Frias-Martinez, Miguel Luengo-Oroz
Flooding through the lens of mobile phone activity
Submitted to IEEE Global Humanitarian Technologies Conference (GHTC) 2014
IEEE Global Humanitarian Technology Conference (GHTC), 2014 IEEE (pp. 279-286)
10.1109/GHTC.2014.6970293
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Natural disasters affect hundreds of millions of people worldwide every year. Emergency response efforts depend upon the availability of timely information, such as information concerning the movements of affected populations. The analysis of aggregated and anonymized Call Detail Records (CDR) captured from the mobile phone infrastructure provides new possibilities to characterize human behavior during critical events. In this work, we investigate the viability of using CDR data combined with other sources of information to characterize the floods that occurred in Tabasco, Mexico in 2009. An impact map has been reconstructed using Landsat-7 images to identify the floods. Within this frame, the underlying communication activity signals in the CDR data have been analyzed and compared against rainfall levels extracted from data of the NASA-TRMM project. The variations in the number of active phones connected to each cell tower reveal abnormal activity patterns in the most affected locations during and after the floods that could be used as signatures of the floods - both in terms of infrastructure impact assessment and population information awareness. The representativeness of the analysis has been assessed using census data and civil protection records. While a more extensive validation is required, these early results suggest high potential in using cell tower activity information to improve early warning and emergency management mechanisms.
[ { "version": "v1", "created": "Mon, 24 Nov 2014 19:01:39 GMT" } ]
2015-01-06T00:00:00
[ [ "Pastor-Escuredo", "David", "" ], [ "Morales-Guzmán", "Alfredo", "" ], [ "Torres-Fernández", "Yolanda", "" ], [ "Bauer", "Jean-Martin", "" ], [ "Wadhwa", "Amit", "" ], [ "Castro-Correa", "Carlos", "" ], [ "Romanoff", "Liudmyla", "" ], [ "Lee", "Jong Gun", "" ], [ "Rutherford", "Alex", "" ], [ "Frias-Martinez", "Vanessa", "" ], [ "Oliver", "Nuria", "" ], [ "Frias-Martinez", "Enrique", "" ], [ "Luengo-Oroz", "Miguel", "" ] ]
new_dataset
0.973394
1412.5512
Tara Brough
Tara Brough, Laura Ciobanu and Murray Elder
Permutations of context-free and indexed languages
13 pages, 5 figures
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the cyclic closure of a language, and its generalisation to the operators $C^k$ introduced by Brandst\"adt. We prove that the cyclic closure of an indexed language is indexed, and that if $L$ is a context-free language then $C^k(L)$ is indexed.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 18:32:05 GMT" }, { "version": "v2", "created": "Sun, 4 Jan 2015 23:27:18 GMT" } ]
2015-01-06T00:00:00
[ [ "Brough", "Tara", "" ], [ "Ciobanu", "Laura", "" ], [ "Elder", "Murray", "" ] ]
new_dataset
0.977561
1501.00512
Massimiliano Dal Mas
Massimiliano Dal Mas
Function of Forgetfulness for the Tedium of Oblivion on Liquidity of Ontology Matching
4 pages, 1 figure; for details see: http://www.maxdalmas.com
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The shallow and fragile knowledge on the Web does not examine in depth the things: it behaves lightly. The conditions created by the Web makes our attention labile and especially fickle, it's unable to concentrate for long as we are trained to "surf" without going though never in depth. The Web also brings with it the added advantage of a nearly availability infinite knowledge but leads to a loss of the ability to retain and evaluate that knowledge within us increasing forgetfulness of knowledge. In this paper we show how the "function of forgetfulness" appears linked to tedium and oblivion of knowledge through the liquidity of ontology matching.
[ { "version": "v1", "created": "Fri, 2 Jan 2015 23:19:01 GMT" } ]
2015-01-06T00:00:00
[ [ "Mas", "Massimiliano Dal", "" ] ]
new_dataset
0.969715
1501.00549
David Pastor-Escuredo
David Pastor-Escuredo, Thierry Savy and Miguel A. Luengo-Oroz
Can Fires, Night Lights, and Mobile Phones reveal behavioral fingerprints useful for Development?
Published in D4D Challenge. NetMob, May 1-3, 2013, MIT
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fires, lights at night and mobile phone activity have been separately used as proxy indicators of human activity with high potential for measuring human development. In this preliminary report, we develop some tools and methodologies to identify and visualize relations among remote sensing datasets containing fires and night lights information with mobile phone activity in Cote D'Ivoire from December 2011 to April 2012.
[ { "version": "v1", "created": "Sat, 3 Jan 2015 09:28:20 GMT" } ]
2015-01-06T00:00:00
[ [ "Pastor-Escuredo", "David", "" ], [ "Savy", "Thierry", "" ], [ "Luengo-Oroz", "Miguel A.", "" ] ]
new_dataset
0.997617
1501.00802
Prateek Dewan
Prateek Dewan and Ponnurangam Kumaraguru
Detecting Malicious Content on Facebook
9 figures, 7 tables
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online Social Networks (OSNs) witness a rise in user activity whenever an event takes place. Malicious entities exploit this spur in user-engagement levels to spread malicious content that compromises system reputation and degrades user experience. It also generates revenue from advertisements, clicks, etc. for the malicious entities. Facebook, the world's biggest social network, is no exception and has recently been reported to face much abuse through scams and other type of malicious content, especially during news making events. Recent studies have reported that spammers earn $200 million just by posting malicious links on Facebook. In this paper, we characterize malicious content posted on Facebook during 17 events, and discover that existing efforts to counter malicious content by Facebook are not able to stop all malicious content from entering the social graph. Our findings revealed that malicious entities tend to post content through web and third party applications while legitimate entities prefer mobile platforms to post content. In addition, we discovered a substantial amount of malicious content generated by Facebook pages. Through our observations, we propose an extensive feature set based on entity profile, textual content, metadata, and URL features to identify malicious content on Facebook in real time and at zero-hour. This feature set was used to train multiple machine learning models and achieved an accuracy of 86.9%. The intent is to catch malicious content that is currently evading Facebook's detection techniques. Our machine learning model was able to detect more than double the number of malicious posts as compared to existing malicious content detection techniques. Finally, we built a real world solution in the form of a REST based API and a browser plug-in to identify malicious Facebook posts in real time.
[ { "version": "v1", "created": "Mon, 5 Jan 2015 09:55:37 GMT" } ]
2015-01-06T00:00:00
[ [ "Dewan", "Prateek", "" ], [ "Kumaraguru", "Ponnurangam", "" ] ]
new_dataset
0.994557
1401.2248
Willi-Hans Steeb WHS
Yorick Hardy and Willi-Hans Steeb
Boolean Functions, Quantum Gates, Hamilton Operators, Spin Systems and Computer Algebra
title extended, construction of spin system added
null
null
null
cs.MS quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the construction of quantum gates (unitary operators) from boolean functions and give a number of applications. Both non-reversible and reversible boolean functions are considered. The construction of the Hamilton operator for a quantum gate is also described with the Hamilton operator expressed as spin system. Computer algebra implementations are provided.
[ { "version": "v1", "created": "Fri, 10 Jan 2014 08:12:46 GMT" }, { "version": "v2", "created": "Wed, 12 Feb 2014 15:45:36 GMT" }, { "version": "v3", "created": "Fri, 14 Nov 2014 08:10:07 GMT" }, { "version": "v4", "created": "Fri, 2 Jan 2015 11:10:05 GMT" } ]
2015-01-05T00:00:00
[ [ "Hardy", "Yorick", "" ], [ "Steeb", "Willi-Hans", "" ] ]
new_dataset
0.998933
1402.6771
Gao Jian
Jian Gao, Yun Gao, Fang-Wei Fu
On Linear Codes over $\mathbb{Z}_4+v\mathbb{Z}_4$
25 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes are considered over the ring $\mathbb{Z}_4+v\mathbb{Z}_4$, where $v^2=v$. Gray weight, Gray maps for linear codes are defined and MacWilliams identity for the Gray weight enumerator is given. Self-dual codes, construction of Euclidean isodual codes, unimodular complex lattices, MDS codes and MGDS codes over $\mathbb{Z}_4+v\mathbb{Z}_4$ are studied. Cyclic codes and quadratic residue codes are also considered. Finally, some examples for illustrating the main work are given.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 02:46:46 GMT" }, { "version": "v2", "created": "Wed, 31 Dec 2014 10:05:51 GMT" } ]
2015-01-05T00:00:00
[ [ "Gao", "Jian", "" ], [ "Gao", "Yun", "" ], [ "Fu", "Fang-Wei", "" ] ]
new_dataset
0.999355
1405.3347
Gao Jian
Jian Gao, XianFang Wang, Fang-Wei Fu
Self-dual codes and quadratic residue codes over the ring $\mathbb{Z}_9+u\mathbb{Z}_9$
12 pages. arXiv admin note: substantial text overlap with arXiv:1402.6771
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new definitions of the Gray weight and the Gray map for linear codes over $\mathbb{Z}_9+u\mathbb{Z}_9$ with $u^2=u$. Some results on self-dual codes over this ring are investigated. Further, the structural properties of quadratic residue codes are also considered. Two self-dual codes with parameters $[22,11,5]$ and $[24,12,9]$ over $\mathbb{Z}_9$ are obtained.
[ { "version": "v1", "created": "Wed, 14 May 2014 02:13:27 GMT" }, { "version": "v2", "created": "Tue, 4 Nov 2014 08:05:59 GMT" }, { "version": "v3", "created": "Wed, 31 Dec 2014 10:00:56 GMT" } ]
2015-01-05T00:00:00
[ [ "Gao", "Jian", "" ], [ "Wang", "XianFang", "" ], [ "Fu", "Fang-Wei", "" ] ]
new_dataset
0.971253
1405.6790
Kyatsandra Nagananda
K. G. Nagananda, Shalinee Kishore and Rick S. Blum
A PMU Scheduling Scheme for Transmission of Synchrophasor Data in Electric Power Systems
9 pages, 6 figures; an extra figure included in the published version. appears in IEEE Transactions on Smart Grid, Special Issue on Cyber Physical Systems and Security for Smart Grid, 2015
null
10.1109/TSG.2014.2388238
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the proposition to install a large number of phasor measurement units (PMUs) in the future power grid, it is essential to provide robust communications infrastructure for phasor data across the network. We make progress in this direction by devising a simple time division multiplexing scheme for transmitting phasor data from the PMUs to a central server: Time is divided into frames and the PMUs take turns to transmit to the control center within the time frame. The main contribution of this work is a scheduling policy based on which PMU transmissions are ordered during a time frame. The scheduling scheme is independent of the approach taken to solve the PMU placement problem, and unlike strategies devised for conventional communications, it is intended for the power network since it is fully governed by the measure of electrical connectedness between buses in the grid. To quantify the performance of the scheduling scheme, we couple it with a fault detection algorithm used to detect changes in the susceptance parameters in the grid. Results demonstrate that scheduling the PMU transmissions leads to an improved performance of the fault detection scheme compared to PMUs transmitting at random.
[ { "version": "v1", "created": "Tue, 27 May 2014 05:29:49 GMT" }, { "version": "v2", "created": "Wed, 31 Dec 2014 15:52:15 GMT" } ]
2015-01-05T00:00:00
[ [ "Nagananda", "K. G.", "" ], [ "Kishore", "Shalinee", "" ], [ "Blum", "Rick S.", "" ] ]
new_dataset
0.99905
1412.8246
Shihyen Chen
Shihyen Chen, Zhuozhi Wang, Kaizhong Zhang
Pattern Matching and Local Alignment for RNA Structures
7 pages. V2: changed first names initials to full names in metadata. V3: added info of conference proceedings, updated email address
Proceedings of the 2002 International Conference on Mathematics and Engineering Techniques in Medicine and Biological Sciences (METMBS), 55-61, 2002
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The primary structure of a ribonucleic acid (RNA) molecule can be represented as a sequence of nucleotides (bases) over the alphabet {A, C, G, U}. The secondary or tertiary structure of an RNA is a set of base pairs which form bonds between A-U and G-C. For secondary structures, these bonds have been traditionally assumed to be one-to-one and non-crossing. This paper considers pattern matching as well as local alignment between two RNA structures. For pattern matching, we present two algorithms, one for obtaining an exact match, the other for approximate match. We then present an algorithm for RNA local structural alignment.
[ { "version": "v1", "created": "Mon, 29 Dec 2014 02:23:39 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2014 06:40:16 GMT" }, { "version": "v3", "created": "Thu, 1 Jan 2015 06:59:26 GMT" } ]
2015-01-05T00:00:00
[ [ "Chen", "Shihyen", "" ], [ "Wang", "Zhuozhi", "" ], [ "Zhang", "Kaizhong", "" ] ]
new_dataset
0.986596
1501.00311
Jun Ping Ng
Jun-Ping Ng and Min-Yen Kan
QANUS: An Open-source Question-Answering Platform
6 pages, 3 figures, demo paper describing QANUS
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we motivate the need for a publicly available, generic software framework for question-answering (QA) systems. We present an open-source QA framework QANUS which researchers can leverage on to build new QA systems easily and rapidly. The framework implements much of the code that will otherwise have been repeated across different QA systems. To demonstrate the utility and practicality of the framework, we further present a fully functioning factoid QA system QA-SYS built on top of QANUS.
[ { "version": "v1", "created": "Thu, 1 Jan 2015 20:51:25 GMT" } ]
2015-01-05T00:00:00
[ [ "Ng", "Jun-Ping", "" ], [ "Kan", "Min-Yen", "" ] ]
new_dataset
0.990366
1412.8544
EPTCS
Sander Uijlen (Radboud Universiteit), Bas Westerbaan (Radboud Universiteit)
A Kochen-Specker system has at least 22 vectors (extended abstract)
In Proceedings QPL 2014, arXiv:1412.8102
EPTCS 172, 2014, pp. 154-164
10.4204/EPTCS.172.11
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At the heart of the Conway-Kochen Free Will theorem and Kochen and Specker's argument against non-contextual hidden variable theories is the existence of a Kochen-Specker (KS) system: a set of points on the sphere that has no 0,1-coloring such that at most one of two orthogonal points are colored 1 and of three pairwise orthogonal points exactly one is colored 1. In public lectures, Conway encouraged the search for small KS systems. At the time of writing, the smallest known KS system has 31 vectors. Arends, Ouaknine and Wampler have shown that a KS system has at least 18 vectors, by reducing the problem to the existence of graphs with a topological embeddability and non-colorability property. The bottleneck in their search proved to be the sheer number of graphs on more than 17 vertices and deciding embeddability. Continuing their effort, we prove a restriction on the class of graphs we need to consider and develop a more practical decision procedure for embeddability to improve the lower bound to 22.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 03:01:38 GMT" } ]
2015-01-03T00:00:00
[ [ "Uijlen", "Sander", "", "Radboud Universiteit" ], [ "Westerbaan", "Bas", "", "Radboud\n Universiteit" ] ]
new_dataset
0.984654
1406.2150
Kyungchun Lee Prof.
Fathurrahman Hilman, Jong-Hyen Baek, Eun-Kyung Chae, and KyungchunLee
ML Detection for MIMO Systems under Channel Estimation Errors
This paper has been withdrawn by the author due to the erroneous simulation results of Figs.1-7
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless communication systems, the use of multiple antennas at both the transmitter and receiver is a widely known method for improving both reliability and data rates, as it increases the former through transmit or receive diversity and the latter by spatial multiplexing. In order to detect signals, channel state information (CSI) is typically required at the receiver; however, the estimation of CSI is not perfect in practical systems, which causes performance degradation. In this paper, we propose a novel maximum likelihood (ML) scheme that is robust to channel information errors. By assuming a bound on the total power of channel estimation errors, we apply an optimization method to estimate the instantaneous covariance of channel estimation errors in order to minimize the ML cost function. To reduce computational complexity, we also propose an iterative sphere decoding scheme based on the proposed ML detection method. Simulation results show that the proposed algorithm provides a performance gain in terms of error probability relative to existing algorithms.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 12:08:21 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2014 05:36:42 GMT" } ]
2014-12-31T00:00:00
[ [ "Hilman", "Fathurrahman", "" ], [ "Baek", "Jong-Hyen", "" ], [ "Chae", "Eun-Kyung", "" ], [ "KyungchunLee", "", "" ] ]
new_dataset
0.99662
1412.8542
EPTCS
Kohei Kishida (University of Oxford)
Stochastic Relational Presheaves and Dynamic Logic for Contextuality
In Proceedings QPL 2014, arXiv:1412.8102
EPTCS 172, 2014, pp. 115-132
10.4204/EPTCS.172.9
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Presheaf models provide a formulation of labelled transition systems that is useful for, among other things, modelling concurrent computation. This paper aims to extend such models further to represent stochastic dynamics such as shown in quantum systems. After reviewing what presheaf models represent and what certain operations on them mean in terms of notions such as internal and external choices, composition of systems, and so on, I will show how to extend those models and ideas by combining them with ideas from other category-theoretic approaches to relational models and to stochastic processes. It turns out that my extension yields a transitional formulation of sheaf-theoretic structures that Abramsky and Brandenburger proposed to characterize non-locality and contextuality. An alternative characterization of contextuality will then be given in terms of a dynamic modal logic of the models I put forward.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 03:01:14 GMT" } ]
2014-12-31T00:00:00
[ [ "Kishida", "Kohei", "", "University of Oxford" ] ]
new_dataset
0.976477
1412.8543
EPTCS
Robin Adams (Radboud University Nijmegen)
QPEL: Quantum Program and Effect Language
In Proceedings QPL 2014, arXiv:1412.8102
EPTCS 172, 2014, pp. 133-153
10.4204/EPTCS.172.10
null
cs.LO cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the syntax and rules of deduction of QPEL (Quantum Program and Effect Language), a language for describing both quantum programs, and properties of quantum programs - effects on the appropriate Hilbert space. We show how semantics may be given in terms of state-and-effect triangles, a categorical setting that allows semantics in terms of Hilbert spaces, C*-algebras, and other categories. We prove soundness and completeness results that show the derivable judgements are exactly those provable in all state-and-effect triangles.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 03:01:23 GMT" } ]
2014-12-31T00:00:00
[ [ "Adams", "Robin", "", "Radboud University Nijmegen" ] ]
new_dataset
0.997948
1412.8545
EPTCS
Kenta Cho (Radboud University Nijmegen)
Semantics for a Quantum Programming Language by Operator Algebras
In Proceedings QPL 2014, arXiv:1412.8102
EPTCS 172, 2014, pp. 165-190
10.4204/EPTCS.172.12
null
cs.LO math.OA quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel semantics for a quantum programming language by operator algebras, which are known to give a formulation for quantum theory that is alternative to the one by Hilbert spaces. We show that the opposite category of the category of W*-algebras and normal completely positive subunital maps is an elementary quantum flow chart category in the sense of Selinger. As a consequence, it gives a denotational semantics for Selinger's first-order functional quantum programming language QPL. The use of operator algebras allows us to accommodate infinite structures and to handle classical and quantum computations in a unified way.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 03:01:51 GMT" } ]
2014-12-31T00:00:00
[ [ "Cho", "Kenta", "", "Radboud University Nijmegen" ] ]
new_dataset
0.993366
1412.8561
Nidhi Lal
Nidhi Kumari Lal, Ashutosh Kumar Singh
Modified Design of Microstrip Patch Antenna for WiMAX Communication System
null
null
10.9781/ijimai.2014.315
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new design for U-shaped microstrip patch antenna is proposed, which can be used in WiMAX communication systems. The aim of this paper is to optimize the performance of microstrip patch antenna. Nowadays, WiMAX communication applications are widely using U-shaped microstrip patch antenna and it has become very popular. Our proposed antenna design uses 4-4.5 GHZ frequency band and it is working at narrowband within this band. RT/DUROID 5880 material is used for creating the substrate of the microstrip antenna. This modified design of the microstrip patch antenna gives high performance in terms of gain and return loss.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 04:20:31 GMT" } ]
2014-12-31T00:00:00
[ [ "Lal", "Nidhi Kumari", "" ], [ "Singh", "Ashutosh Kumar", "" ] ]
new_dataset
0.998695
1412.8639
Kyle Pullicino
Kyle Pullicino
Jif: Language-based Information-flow Security in Java
null
null
null
null
cs.PL cs.CR
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this report, we examine Jif, a Java extension which augments the language with features related to security. Jif adds support for security labels to Java's type system such that the developer can specify confidentiality and integrity policies to the various variables used in their program. We list the main features of Jif and discuss the information flow problem that Jif helps to solve. We see how the information flow problem occurs in real-world systems by looking at two examples: Civitas, a ballot/voting system where voters do not necessarily trust voting agents, and SIF, a web application container implemented using Jif. Finally, we implement a small program that simulates information flow in a booking system containing sensitive data and discuss the usefulness of Jif based on this program.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 14:23:13 GMT" } ]
2014-12-31T00:00:00
[ [ "Pullicino", "Kyle", "" ] ]
new_dataset
0.990372
1412.8700
Rustam Tagiew
Rustam Tagiew
Bewelcome.org -- a non-profit democratic hospex service set up for growth
5 pages, 8 figures, 1 table
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an extensive data-based analysis of the non-profit democratic hospitality exchange service bewelcome.org. We hereby pursuit the goal of determining the factors influencing its growth. It also provides general insights on internet-based hospitality exchange services. The other investigated services are hospitalityclub.org and couchsurfing.org. Communities using the three services are interconnected -- comparing their data provides additional information.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 17:46:06 GMT" } ]
2014-12-31T00:00:00
[ [ "Tagiew", "Rustam", "" ] ]
new_dataset
0.999478
1104.0961
Lionel Levine
Lionel Levine, Katherine E. Stange
How to make the most of a shared meal: plan the last bite first
AMS Latex, 20 pages, 5 figures (1 colour figure); v2 adds references, v3 incorporates referees' comments. To appear in American Math. Monthly
American Mathematical Monthly, 119-7 (2012), 550-565
10.4169/amer.math.monthly.119.07.550
null
cs.GT math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If you are sharing a meal with a companion, how best to make sure you get your favourite mouthfuls? Ethiopian Dinner is a game in which two players take turns eating morsels from a common plate. Each morsel comes with a pair of utility values measuring its tastiness to the two players. Kohler and Chandrasekaharan discovered a good strategy -- a subgame perfect equilibrium, to be exact -- for this game. We give a new visual proof of their result. The players arrive at the equilibrium by figuring out their last move first and working backward. We conclude that it's never too early to start thinking about dessert.
[ { "version": "v1", "created": "Tue, 5 Apr 2011 20:56:17 GMT" }, { "version": "v2", "created": "Tue, 26 Apr 2011 19:10:57 GMT" }, { "version": "v3", "created": "Mon, 26 Sep 2011 21:09:31 GMT" } ]
2014-12-30T00:00:00
[ [ "Levine", "Lionel", "" ], [ "Stange", "Katherine E.", "" ] ]
new_dataset
0.95493
1301.0541
Bartosz Walczak
Tomasz Krawczyk, Arkadiusz Pawlik, Bartosz Walczak
Coloring triangle-free rectangle overlap graphs with $O(\log\log n)$ colors
Minor revision
Discrete Comput.Geom. 53 (2015) 199-220
10.1007/s00454-014-9640-3
null
cs.CG cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, it was proved that triangle-free intersection graphs of $n$ line segments in the plane can have chromatic number as large as $\Theta(\log\log n)$. Essentially the same construction produces $\Theta(\log\log n)$-chromatic triangle-free intersection graphs of a variety of other geometric shapes---those belonging to any class of compact arc-connected sets in $\mathbb{R}^2$ closed under horizontal scaling, vertical scaling, and translation, except for axis-parallel rectangles. We show that this construction is asymptotically optimal for intersection graphs of boundaries of axis-parallel rectangles, which can be alternatively described as overlap graphs of axis-parallel rectangles. That is, we prove that triangle-free rectangle overlap graphs have chromatic number $O(\log\log n)$, improving on the previous bound of $O(\log n)$. To this end, we exploit a relationship between off-line coloring of rectangle overlap graphs and on-line coloring of interval overlap graphs. Our coloring method decomposes the graph into a bounded number of subgraphs with a tree-like structure that "encodes" strategies of the adversary in the on-line coloring problem. Then, these subgraphs are colored with $O(\log\log n)$ colors using a combination of techniques from on-line algorithms (first-fit) and data structure design (heavy-light decomposition).
[ { "version": "v1", "created": "Thu, 3 Jan 2013 20:24:33 GMT" }, { "version": "v2", "created": "Thu, 5 Dec 2013 20:57:27 GMT" }, { "version": "v3", "created": "Thu, 27 Mar 2014 22:25:35 GMT" }, { "version": "v4", "created": "Fri, 26 Dec 2014 13:09:43 GMT" } ]
2014-12-30T00:00:00
[ [ "Krawczyk", "Tomasz", "" ], [ "Pawlik", "Arkadiusz", "" ], [ "Walczak", "Bartosz", "" ] ]
new_dataset
0.994513
1307.3075
Anurag
Anurag, Gurmohan Singh, V. Sulochana
Low Power Dual Edge-Triggered Static D Flip-Flop
Dual-Edge Triggered, Flip-Flop, High Speed, Low Power, Static D Flip-Flop
International Journal of VLSI design & Communication Systems (VLSICS) Vol.4, No.3, June 2013
10.5121/vlsic.2013.4303
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper enumerates new architecture of low power dual-edge triggered Flip-Flop (DETFF) designed at 180nm CMOS technology. In DETFF same data throughput can be achieved with half of the clock frequency as compared to single edge triggered Flip-Flop (SETFF). In this paper conventional and proposed DETFF are presented and compared at same simulation conditions. The post layout experimental results comparison shows that the average power dissipation is improved by 48.17%, 41.29% and 36.84% when compared with SCDFF, DEPFF and SEDNIFF respectively and improvement in PDP is 42.44%, 33.88% and 24.69% as compared to SCDFF, DEPFF and SEDNIFF respectively. Therefore the proposed DETFF design is suitable for low power and small area applications.
[ { "version": "v1", "created": "Thu, 11 Jul 2013 11:53:40 GMT" }, { "version": "v2", "created": "Mon, 8 Dec 2014 10:19:59 GMT" } ]
2014-12-30T00:00:00
[ [ "Anurag", "", "" ], [ "Singh", "Gurmohan", "" ], [ "Sulochana", "V.", "" ] ]
new_dataset
0.965412
1309.4112
Laszlo Kish
L.B. Kish, C.G. Granqvist
On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator
4 pages
Quantum Information Processing, Volume 13, (2014), pp 2213-2219
10.1007/s11128-014-0729-7
null
cs.CR cs.ET
http://creativecommons.org/licenses/by/3.0/
A simple and general proof is given for the information theoretic (unconditional) security of the Kirchhoff-law-Johnson-noise (KLJN) key exchange system under practical conditions. The unconditional security for ideal circumstances, which is based on the Second Law of Thermodynamics, is found to prevail even under slightly non-ideal conditions. This security level is guaranteed by the continuity of functions describing classical physical linear, as well as stable non-linear, systems. Even without privacy amplification, Eve's probability for successful bit-guessing is found to converge towards 0.5 - i.e., the perfect security level - when ideal conditions are approached.
[ { "version": "v1", "created": "Mon, 16 Sep 2013 20:49:16 GMT" } ]
2014-12-30T00:00:00
[ [ "Kish", "L. B.", "" ], [ "Granqvist", "C. G.", "" ] ]
new_dataset
0.990784
1403.6676
Christian Decker
Christian Decker and Roger Wattenhofer
Bitcoin Transaction Malleability and MtGox
null
null
10.1007/978-3-319-11212-1_18
null
cs.CR cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Bitcoin, transaction malleability describes the fact that the signatures that prove the ownership of bitcoins being transferred in a transaction do not provide any integrity guarantee for the signatures themselves. This allows an attacker to mount a malleability attack in which it intercepts, modifies, and rebroadcasts a transaction, causing the transaction issuer to believe that the original transaction was not confirmed. In February 2014 MtGox, once the largest Bitcoin exchange, closed and filed for bankruptcy claiming that attackers used malleability attacks to drain its accounts. In this work we use traces of the Bitcoin network for over a year preceding the filing to show that, while the problem is real, there was no widespread use of malleability attacks before the closure of MtGox.
[ { "version": "v1", "created": "Wed, 26 Mar 2014 14:01:13 GMT" } ]
2014-12-30T00:00:00
[ [ "Decker", "Christian", "" ], [ "Wattenhofer", "Roger", "" ] ]
new_dataset
0.998928
1410.2176
Andrej Gajduk
Andrej Gajduk, Mirko Todorovski, Juergen Kurths, and Ljupco Kocarev
Improving power grid transient stability by plug-in electric vehicles
15 pages, 4 figures, submitted to New Journal of Physics
null
10.1088/1367-2630/16/11/115011
null
cs.SY math.OC nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Plug-in electric vehicles (PEVs) can serve in discharge mode as distributed energy and power resources operating as vehicle-to-grid (V2G) devices and in charge mode as loads or grid-to-vehicle (G2V) devices. It has been documented that PEVs serving as V2G systems can offer possible backup for renewable power sources, can provide reactive power support, active power regulation, load balancing, peak load shaving,% and current harmonic filtering, can provide ancillary services as frequency control and spinning reserves, can improve grid efficiency, stability, reliability, and generation dispatch, can reduce utility operating costs and can generate revenue. Here we show that PEVs can even improve power grid transient stability, that is, stability when the power grid is subjected to large disturbances, including bus faults, generator and branch tripping, and sudden large load changes. A control strategy that regulates the power output of a fleet of PEVs based on the speed of generator turbines is proposed and tested on the New England 10-unit 39-bus power system. By regulating the power output of the PEVs we show that (1) speed and voltage fluctuations resulting from large disturbances can be significantly reduced up to 5 times, and (2) the critical clearing time can be extended by 20-40%. Overall, the PEVs control strategy makes the power grid more robust.
[ { "version": "v1", "created": "Tue, 7 Oct 2014 15:03:19 GMT" } ]
2014-12-30T00:00:00
[ [ "Gajduk", "Andrej", "" ], [ "Todorovski", "Mirko", "" ], [ "Kurths", "Juergen", "" ], [ "Kocarev", "Ljupco", "" ] ]
new_dataset
0.993562
1412.7772
Rodrigo de Lamare
K. Zu and R. C. de Lamare
Coordinate Tomlinson-Harashima Precoding Design for Overloaded Multi-user MIMO Systems
3 figures, 6 pages, ISWCS 2014. arXiv admin note: text overlap with arXiv:1401.4753
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tomlinson-Harashima precoding (THP) is a nonlinear processing technique employed at the transmit side to implement the concept of dirty paper coding (DPC). The perform of THP, however, is restricted by the dimensionality constraint that the number of transmit antennas has to be greater or equal to the total number of receive antennas. In this paper, we propose an iterative coordinate THP algorithm for the scenarios in which the total number of receive antennas is larger than the number of transmit antennas. The proposed algorithm is implemented on two types of THP structures, the decentralized THP (dTHP) with diagonal weighted filters at the receivers of the users, and the centralized THP (cTHP) with diagonal weighted filter at the transmitter. Simulation results show that a much better bit error rate (BER) and sum-rate performances can be achieved by the proposed iterative coordinate THP compared to the previous linear art.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 00:56:53 GMT" } ]
2014-12-30T00:00:00
[ [ "Zu", "K.", "" ], [ "de Lamare", "R. C.", "" ] ]
new_dataset
0.998315
1412.7849
Odemir Bruno PhD
Jo\~ao Batista Florindo, N\'ubia Rosa da Silva, Liliane Maria Romualdo, Fernanda de F\'atima da Silva, Pedro Henrique de Cerqueira Luz, Valdo Rodrigues Herling, Odemir Martinez Bruno
Brachiaria species identification using imaging techniques based on fractal descriptors
7 pages, 5 figures
Computers and Electronics in Agriculture, V 103, Pages 48-54, 2014
10.1016/j.compag.2014.02.005
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of a rapid and accurate method in diagnosis and classification of species and/or cultivars of forage has practical relevance, scientific and trade in various areas of study. Thus, leaf samples of fodder plant species \textit{Brachiaria} were previously identified, collected and scanned to be treated by means of artificial vision to make the database and be used in subsequent classifications. Forage crops used were: \textit{Brachiaria decumbens} cv. IPEAN; \textit{Brachiaria ruziziensis} Germain \& Evrard; \textit{Brachiaria Brizantha} (Hochst. ex. A. Rich.) Stapf; \textit{Brachiaria arrecta} (Hack.) Stent. and \textit{Brachiaria spp}. The images were analyzed by the fractal descriptors method, where a set of measures are obtained from the values of the fractal dimension at different scales. Therefore such values are used as inputs for a state-of-the-art classifier, the Support Vector Machine, which finally discriminates the images according to the respective species.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 18:23:10 GMT" } ]
2014-12-30T00:00:00
[ [ "Florindo", "João Batista", "" ], [ "da Silva", "Núbia Rosa", "" ], [ "Romualdo", "Liliane Maria", "" ], [ "da Silva", "Fernanda de Fátima", "" ], [ "Luz", "Pedro Henrique de Cerqueira", "" ], [ "Herling", "Valdo Rodrigues", "" ], [ "Bruno", "Odemir Martinez", "" ] ]
new_dataset
0.997836
1412.7851
Odemir Bruno PhD
Jo\~ao Batista Florindo and Odemir Martinez Bruno
Fractal descriptors based on the probability dimension: a texture analysis and classification approach
7 pages, 6 figures. arXiv admin note: text overlap with arXiv:1205.2821
Pattern Recognition Letters, Volume 42, Pages 107-114, 2014
10.1016/j.patrec.2014.01.009
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose a novel technique for obtaining descriptors of gray-level texture images. The descriptors are provided by applying a multiscale transform to the fractal dimension of the image estimated through the probability (Voss) method. The effectiveness of the descriptors is verified in a classification task using benchmark over texture datasets. The results obtained demonstrate the efficiency of the proposed method as a tool for the description and discrimination of texture images.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 18:50:31 GMT" } ]
2014-12-30T00:00:00
[ [ "Florindo", "João Batista", "" ], [ "Bruno", "Odemir Martinez", "" ] ]
new_dataset
0.999471
1412.7856
Odemir Bruno PhD
\'Alvaro Gomez Z., Jo\~ao B. Florindo, Odemir M. Bruno
Gabor wavelets combined with volumetric fractal dimension applied to texture analysis
11 pages, 2 figures
Pattern Recognition Letters, V. 36, Pages 135-143, 2014
10.1016/j.patrec.2013.09.023
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Texture analysis and classification remain as one of the biggest challenges for the field of computer vision and pattern recognition. On this matter, Gabor wavelets has proven to be a useful technique to characterize distinctive texture patterns. However, most of the approaches used to extract descriptors of the Gabor magnitude space usually fail in representing adequately the richness of detail present into a unique feature vector. In this paper, we propose a new method to enhance the Gabor wavelets process extracting a fractal signature of the magnitude spaces. Each signature is reduced using a canonical analysis function and concatenated to form the final feature vector. Experiments were conducted on several texture image databases to prove the power and effectiveness of the proposed method. Results obtained shown that this method outperforms other early proposed method, creating a more reliable technique for texture feature extraction.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 19:38:11 GMT" } ]
2014-12-30T00:00:00
[ [ "Z.", "Álvaro Gomez", "" ], [ "Florindo", "João B.", "" ], [ "Bruno", "Odemir M.", "" ] ]
new_dataset
0.98209
1412.7912
Lily Minear
Lily Minear, Eric Zhang
Impact of Energy Consumption on Multipath TCP Enabled Mobiles
4 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple accesses are common for most mobile devices today. This technological advance opens up a new design space for improving the communication performance of mobile devices. Multipath TCP is a TCP extension that enables using multiple network paths between two end systems for a single TCP connection, increasing performance and reliability. Meanwhile, when operating multiple active interfaces, multipath-TCP also consumes substantial more power and drains out bettery faster than using one interface. Thus, enabling Multipath TCP on mobile devices brings in new challenges. In this paper, we theoretically analyze the underlying design choices given by the Multipath TCP. In particular, we theoretically formulate the rela- tion between performance (throughput) and energy consumption for Multipath TCP. We find that sometime the throughput and energy consumption can be concurrently improved.
[ { "version": "v1", "created": "Fri, 26 Dec 2014 07:50:15 GMT" } ]
2014-12-30T00:00:00
[ [ "Minear", "Lily", "" ], [ "Zhang", "Eric", "" ] ]
new_dataset
0.955541
1412.7932
Raunaq Vohra
Kratarth Goel, Raunaq Vohra, Anant Kamath, and Veeky Baths
Home Automation Using SSVEP & Eye-Blink Detection Based Brain-Computer Interface
2 pages, 1 table, published at IEEE SMC 2014
null
10.1109/SMC.2014.6974563
null
cs.HC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel brain computer interface based home automation system using two responses - Steady State Visually Evoked Potential (SSVEP) and the eye-blink artifact, which is augmented by a Bluetooth based indoor localization system, to greatly increase the number of controllable devices. The hardware implementation of this system to control a table lamp and table fan using brain signals has also been discussed and state-of-the-art results have been achieved.
[ { "version": "v1", "created": "Fri, 26 Dec 2014 12:50:07 GMT" } ]
2014-12-30T00:00:00
[ [ "Goel", "Kratarth", "" ], [ "Vohra", "Raunaq", "" ], [ "Kamath", "Anant", "" ], [ "Baths", "Veeky", "" ] ]
new_dataset
0.99546
1412.7935
Christian Decker
Christian Decker and Jochen Seidel and Roger Wattenhofer
Bitcoin Meets Strong Consistency
null
null
null
null
cs.DC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Bitcoin system only provides eventual consistency. For everyday life, the time to confirm a Bitcoin transaction is prohibitively slow. In this paper we propose a new system, built on the Bitcoin blockchain, which enables strong consistency. Our system, PeerCensus, acts as a certification authority, manages peer identities in a peer-to-peer network, and ultimately enhances Bitcoin and similar systems with strong consistency. Our extensive analysis shows that PeerCensus is in a secure state with high probability. We also show how Discoin, a Bitcoin variant that decouples block creation and transaction confirmation, can be built on top of PeerCensus, enabling real-time payments. Unlike Bitcoin, once transactions in Discoin are committed, they stay committed.
[ { "version": "v1", "created": "Fri, 26 Dec 2014 12:58:13 GMT" } ]
2014-12-30T00:00:00
[ [ "Decker", "Christian", "" ], [ "Seidel", "Jochen", "" ], [ "Wattenhofer", "Roger", "" ] ]
new_dataset
0.99968
1412.7965
Martin Homola
Diego Calvanese, \.Ismail \.Ilkan Ceylan, Marco Montali, and Ario Santoso
Adding Context to Knowledge and Action Bases
ARCOE-Logic 2014 Workshop Notes, pp. 25-36
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge and Action Bases (KABs) have been recently proposed as a formal framework to capture the dynamics of systems which manipulate Description Logic (DL) Knowledge Bases (KBs) through action execution. In this work, we enrich the KAB setting with contextual information, making use of different context dimensions. On the one hand, context is determined by the environment using context-changing actions that make use of the current state of the KB and the current context. On the other hand, it affects the set of TBox assertions that are relevant at each time point, and that have to be considered when processing queries posed over the KAB. Here we extend to our enriched setting the results on verification of rich temporal properties expressed in mu-calculus, which had been established for standard KABs. Specifically, we show that under a run-boundedness condition, verification stays decidable.
[ { "version": "v1", "created": "Fri, 26 Dec 2014 18:14:20 GMT" } ]
2014-12-30T00:00:00
[ [ "Calvanese", "Diego", "" ], [ "Ceylan", "İsmail İlkan", "" ], [ "Montali", "Marco", "" ], [ "Santoso", "Ario", "" ] ]
new_dataset
0.994827
1412.8010
Xuan-Son Vu
Xuan-Son Vu and Seong-Bae Park
Construction of Vietnamese SentiWordNet by using Vietnamese Dictionary
accepted on April-9th-2014, best paper award
The 40th Conference of the Korea Information Processing Society, pp. 745-748, April 2014, South Korea
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SentiWordNet is an important lexical resource supporting sentiment analysis in opinion mining applications. In this paper, we propose a novel approach to construct a Vietnamese SentiWordNet (VSWN). SentiWordNet is typically generated from WordNet in which each synset has numerical scores to indicate its opinion polarities. Many previous studies obtained these scores by applying a machine learning method to WordNet. However, Vietnamese WordNet is not available unfortunately by the time of this paper. Therefore, we propose a method to construct VSWN from a Vietnamese dictionary, not from WordNet. We show the effectiveness of the proposed method by generating a VSWN with 39,561 synsets automatically. The method is experimentally tested with 266 synsets with aspect of positivity and negativity. It attains a competitive result compared with English SentiWordNet that is 0.066 and 0.052 differences for positivity and negativity sets respectively.
[ { "version": "v1", "created": "Sat, 27 Dec 2014 01:54:15 GMT" } ]
2014-12-30T00:00:00
[ [ "Vu", "Xuan-Son", "" ], [ "Park", "Seong-Bae", "" ] ]
new_dataset
0.990537
1412.8018
Usman Khan
Sam Safavi and Usman A. Khan
Asymptotic stability of stochastic LTV systems with applications to distributed dynamic fusion
submitted for journal publication
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate asymptotic stability of linear time-varying systems with (sub-) stochastic system matrices. Motivated by distributed dynamic fusion over networks of mobile agents, we impose some mild regularity conditions on the elements of time-varying system matrices. We provide sufficient conditions under which the asymptotic stability of the LTV system can be guaranteed. By introducing the notion of slices, as non-overlapping partitions of the sequence of systems matrices, we obtain stability conditions in terms of the slice lengths and some network parameters. In addition, we apply the LTV stability results to the distributed leader-follower algorithm, and show the corresponding convergence and steady-state. An illustrative example is also included to validate the effectiveness of our approach.
[ { "version": "v1", "created": "Sat, 27 Dec 2014 05:46:37 GMT" } ]
2014-12-30T00:00:00
[ [ "Safavi", "Sam", "" ], [ "Khan", "Usman A.", "" ] ]
new_dataset
0.962945
1412.8395
Cristina Flaut
A. Borumand Saeid, H. Fatemidokht, C. Flaut and M. Kuchaki Rafsanjani
On Codes based on BCK-algebras
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present some new connections between BCK- algebras and binary block codes.
[ { "version": "v1", "created": "Mon, 29 Dec 2014 17:11:06 GMT" } ]
2014-12-30T00:00:00
[ [ "Saeid", "A. Borumand", "" ], [ "Fatemidokht", "H.", "" ], [ "Flaut", "C.", "" ], [ "Rafsanjani", "M. Kuchaki", "" ] ]
new_dataset
0.999627
1412.7626
Ibrahim Abdelaziz
Ibrahim Abdelaziz, Sherif Abdou
AltecOnDB: A Large-Vocabulary Arabic Online Handwriting Recognition Database
The preprint is in submission
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arabic is a semitic language characterized by a complex and rich morphology. The exceptional degree of ambiguity in the writing system, the rich morphology, and the highly complex word formation process of roots and patterns all contribute to making computational approaches to Arabic very challenging. As a result, a practical handwriting recognition system should support large vocabulary to provide a high coverage and use the context information for disambiguation. Several research efforts have been devoted for building online Arabic handwriting recognition systems. Most of these methods are either using their small private test data sets or a standard database with limited lexicon and coverage. A large scale handwriting database is an essential resource that can advance the research of online handwriting recognition. Currently, there is no online Arabic handwriting database with large lexicon, high coverage, large number of writers and training/testing data. In this paper, we introduce AltecOnDB, a large scale online Arabic handwriting database. AltecOnDB has 98% coverage of all the possible PAWS of the Arabic language. The collected samples are complete sentences that include digits and punctuation marks. The collected data is available on sentence, word and character levels, hence, high-level linguistic models can be used for performance improvements. Data is collected from more than 1000 writers with different backgrounds, genders and ages. Annotation and verification tools are developed to facilitate the annotation and verification phases. We built an elementary recognition system to test our database and show the existing difficulties when handling a large vocabulary and dealing with large amounts of styles variations in the collected data.
[ { "version": "v1", "created": "Wed, 24 Dec 2014 08:58:10 GMT" } ]
2014-12-25T00:00:00
[ [ "Abdelaziz", "Ibrahim", "" ], [ "Abdou", "Sherif", "" ] ]
new_dataset
0.999848
1412.7677
Roshan Ragel
C.B Bulumulla and R. G. Ragel
LineCAPTCHA Mobile: A User Friendly Replacement for Unfriendly Reverse Turing Tests for Mobile Devices (ICIAfS14)
The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As smart phones and tablets are becoming ubiquitous and taking over as the primary choice for accessing the Internet worldwide, ensuring a secure gateway to the servers serving such devices become essential. CAPTCHAs play an important role in identifying human users in internet to prevent unauthorized bot attacks. Even though there are numerous CAPTCHA alternatives available today, there are certain drawbacks attached with each alternative, making them harder to find a general solution for the necessity of a CAPTCHA mechanism. With the advancing technology and expertise in areas such as AI, cryptography and image processing, it has come to a stage where the chase between making and breaking CAPTCHAs are even now. This has led the humans with a hard time deciphering the CAPTCHA mechanisms. In this paper, we adapt a novel CAPTCHA mechanism named as LineCAPTCHA to mobile devices. LineCAPTCHA is a new reverse Turing test based on drawing on top of Bezier curves within noisy backgrounds. The major objective of this paper is to report the implementation and evaluation of LineCAPTCHA on a mobile platform. At the same time we impose certain security standards and security aspects for establishing LineCAPTCHAs which are obtained through extensive measures. Independency from factors such as the fluency in English language, age and easily understandable nature of it inclines the usability of LineCAPTCHA. We believe that such independency will favour the main target of LineCAPTCHA, user friendliness and usability.
[ { "version": "v1", "created": "Wed, 24 Dec 2014 14:49:14 GMT" } ]
2014-12-25T00:00:00
[ [ "Bulumulla", "C. B", "" ], [ "Ragel", "R. G.", "" ] ]
new_dataset
0.999454
1412.7680
Roshan Ragel
G. I. Gunarathna, M. A. P. Chamikara and R. G. Ragel
A Fuzzy Based Model to Identify Printed Sinhala Characters (ICIAfS14)
The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Character recognition techniques for printed documents are widely used for English language. However, the systems that are implemented to recognize Asian languages struggle to increase the accuracy of recognition. Among other Asian languages (such as Arabic, Tamil, Chinese), Sinhala characters are unique, mainly because they are round in shape. This unique feature makes it a challenge to extend the prevailing techniques to improve recognition of Sinhala characters. Therefore, a little attention has been given to improve the accuracy of Sinhala character recognition. A novel method, which makes use of this unique feature, could be advantageous over other methods. This paper describes the use of a fuzzy inference system to recognize Sinhala characters. Feature extraction is mainly focused on distance and intersection measurements in different directions from the center of the letter making use of the round shape of characters. The results showed an overall accuracy of 90.7% for 140 instances of letters tested, much better than similar systems.
[ { "version": "v1", "created": "Wed, 24 Dec 2014 14:56:54 GMT" } ]
2014-12-25T00:00:00
[ [ "Gunarathna", "G. I.", "" ], [ "Chamikara", "M. A. P.", "" ], [ "Ragel", "R. G.", "" ] ]
new_dataset
0.973108
1412.7250
Deepan Palguna
Deepan Palguna, David J. Love, Ilya Pollak
Secondary Spectrum Auctions for Markets with Communication Constraints
37 pages
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids.
[ { "version": "v1", "created": "Tue, 23 Dec 2014 04:35:23 GMT" } ]
2014-12-24T00:00:00
[ [ "Palguna", "Deepan", "" ], [ "Love", "David J.", "" ], [ "Pollak", "Ilya", "" ] ]
new_dataset
0.978593
1412.7364
David Gleich
David F. Gleich and Ananth Grama and Yao Zhu
Erasure coding for fault oblivious linear system solvers
null
null
null
null
cs.NA cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dealing with hardware and software faults is an important problem as parallel and distributed systems scale to millions of processing cores and wide area networks. Traditional methods for dealing with faults include checkpoint-restart, active replicas, and deterministic replay. Each of these techniques has associated resource overheads and constraints. In this paper, we propose an alternate approach to dealing with faults, based on input augmentation. This approach, which is an algorithmic analog of erasure coded storage, applies a minimally modified algorithm on the augmented input to produce an augmented output. The execution of such an algorithm proceeds completely oblivious to faults in the system. In the event of one or more faults, the real solution is recovered using a rapid reconstruction method from the augmented output. We demonstrate this approach on the problem of solving sparse linear systems using a conjugate gradient solver. We present input augmentation and output recovery techniques. Through detailed experiments, we show that our approach can be made oblivious to a large number of faults with low computational overhead. Specifically, we demonstrate cases where a single fault can be corrected with less than 10% overhead in time, and even in extreme cases (fault rates of 20%), our approach is able to compute a solution with reasonable overhead. These results represent a significant improvement over the state of the art.
[ { "version": "v1", "created": "Tue, 23 Dec 2014 14:04:34 GMT" } ]
2014-12-24T00:00:00
[ [ "Gleich", "David F.", "" ], [ "Grama", "Ananth", "" ], [ "Zhu", "Yao", "" ] ]
new_dataset
0.9659
cs/0504097
Amit K Awasthi
Amit K Awasthi and Sunder Lal
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Published with ePrint Archive
null
10.13140/2.1.2549.1529
null
cs.CR
null
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al. was based on RSA cryptosystem and certificate based public key setting. The first ring signature scheme based on DLP was proposed by Abe, Ohkubo, and Suzuki. Their scheme is also based on the general certificate-based public key setting too. In 2002, Zhang and Kim proposed a new ID-based ring signature scheme using pairings. Later Lin and Wu proposed a more efficient ID-based ring signature scheme. Both these schemes have some inconsistency in computational aspect. In this paper we propose a new ID-based ring signature scheme and a proxy ring signature scheme. Both the schemes are more efficient than existing one. These schemes also take care of the inconsistencies in above two schemes.
[ { "version": "v1", "created": "Sat, 23 Apr 2005 23:24:31 GMT" } ]
2014-12-24T00:00:00
[ [ "Awasthi", "Amit K", "" ], [ "Lal", "Sunder", "" ] ]
new_dataset
0.998212
1405.0055
Abuzer Yakaryilmaz
Arseny M. Shur and Abuzer Yakaryilmaz
Quantum, Stochastic, and Pseudo Stochastic Languages with Few States
A new version with new results. Previous version: Arseny M. Shur, Abuzer Yakaryilmaz: Quantum, Stochastic, and Pseudo Stochastic Languages with Few States. UCNC 2014: 327-339
null
null
null
cs.FL quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic languages are the languages recognized by probabilistic finite automata (PFAs) with cutpoint over the field of real numbers. More general computational models over the same field such as generalized finite automata (GFAs) and quantum finite automata (QFAs) define the same class. In 1963, Rabin proved the set of stochastic languages to be uncountable presenting a single 2-state PFA over the binary alphabet recognizing uncountably many languages depending on the cutpoint. In this paper, we show the same result for unary stochastic languages. Namely, we exhibit a 2-state unary GFA, a 2-state unary QFA, and a family of 3-state unary PFAs recognizing uncountably many languages; all these numbers of states are optimal. After this, we completely characterize the class of languages recognized by 1-state GFAs, which is the only nontrivial class of languages recognized by 1-state automata. Finally, we consider the variations of PFAs, QFAs, and GFAs based on the notion of inclusive/exclusive cutpoint, and present some results on their expressive power.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 23:29:33 GMT" }, { "version": "v2", "created": "Sat, 20 Dec 2014 11:32:09 GMT" } ]
2014-12-23T00:00:00
[ [ "Shur", "Arseny M.", "" ], [ "Yakaryilmaz", "Abuzer", "" ] ]
new_dataset
0.997131
1410.6142
Mark Riedl
Mark O. Riedl
The Lovelace 2.0 Test of Artificial Creativity and Intelligence
2 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Observing that the creation of certain types of artistic artifacts necessitate intelligence, we present the Lovelace 2.0 Test of creativity as an alternative to the Turing Test as a means of determining whether an agent is intelligent. The Lovelace 2.0 Test builds off prior tests of creativity and additionally provides a means of directly comparing the relative intelligence of different agents.
[ { "version": "v1", "created": "Wed, 22 Oct 2014 18:59:31 GMT" }, { "version": "v2", "created": "Thu, 23 Oct 2014 15:09:53 GMT" }, { "version": "v3", "created": "Mon, 22 Dec 2014 03:24:06 GMT" } ]
2014-12-23T00:00:00
[ [ "Riedl", "Mark O.", "" ] ]
new_dataset
0.978833
1412.6593
Jianjun Yang
Yin Wang, Jianjun Yang, Ju Shen, Juan Guo, Kun Hua
Compression of Video Tracking and Bandwidth Balancing Routing in Wireless Multimedia Sensor Networks
6 pages, 4 figures
null
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has been a tremendous growth in multimedia applications over wireless networks. Wireless Multimedia Sensor Networks(WMSNs) have become the premier choice in many research communities and industry. Many state-of-art applications, such as surveillance, traffic monitoring, and remote heath care are essentially video tracking and transmission in WMSNs. The transmission speed is constrained by big size of video data and fixed bandwidth allocation in constant routing path. In this paper, we present a CamShift based algorithm to compress the tracking of videos. Then we propose a bandwidth balancing strategy in which each sensor node is able to dynamically select the node for next hop with the highest potential bandwidth capacity to resume communication. Key to the strategy is that each node merely maintains two parameters that contains its historical bandwidth varying trend and then predicts its near future bandwidth capacity. Then forwarding node selects the next hop with the highest potential bandwidth capacity. Simulations demonstrate that our approach significantly increases the data received by sink node and decreases the delay on video transmission in Wireless Multimedia Sensor Network environment.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 03:57:47 GMT" } ]
2014-12-23T00:00:00
[ [ "Wang", "Yin", "" ], [ "Yang", "Jianjun", "" ], [ "Shen", "Ju", "" ], [ "Guo", "Juan", "" ], [ "Hua", "Kun", "" ] ]
new_dataset
0.995142
1412.6767
Marina Maslennikova
Marina Maslennikova, Emanuele Rodaro
Representation of (Left) Ideal Regular Languages by Synchronizing Automata
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We follow language theoretic approach to synchronizing automata and \v{C}ern\'{y}'s conjecture initiated in a series of recent papers. We find a precise lower bound for the reset complexity of a principal ideal languages. Also we show a strict connection between principal left ideals and synchronizing automata. We characterize regular languages whose minimal deterministic finite automaton is synchronizing and possesses a reset word belonging to the recognized language.
[ { "version": "v1", "created": "Sun, 21 Dec 2014 11:56:11 GMT" } ]
2014-12-23T00:00:00
[ [ "Maslennikova", "Marina", "" ], [ "Rodaro", "Emanuele", "" ] ]
new_dataset
0.960203
1412.6843
Xingqin Lin
Xingqin Lin and Jeffrey G. Andrews
Connectivity of Millimeter Wave Networks with Multi-hop Relaying
10 pages; 3 figures; submitted to IEEE Wireless Communications Letters
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel stochastic geometry approach to the connectivity of milimeter wave (mmWave) networks with multi-hop relaying. The random positions and shapes of obstacles in the radio environment are modeled as a Boolean model, whose germs are distributed according to a Poisson point process and grains are random rectangles. The derived analytical results shed light on how the connectivity of mmWave networks depends on key system parameters such as the density and size of obstacles as well as relaying route window -- the range of distances in which routing relays are selected. We find that multi-hop relaying can greatly improve the connectivity versus single hop mmWave transmission. We show that to obtain near-optimal connectivity the relaying route window should be about the size of the obstacles.
[ { "version": "v1", "created": "Sun, 21 Dec 2014 23:07:46 GMT" } ]
2014-12-23T00:00:00
[ [ "Lin", "Xingqin", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
new_dataset
0.994578
1412.6892
Jian Sun
Jian Sun and Tianqi Wu and Xianfeng Gu and Feng Luo
Discrete Conformal Deformation: Algorithm and Experiments
34 pages, 22 figures
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a definition of discrete conformality for triangulated surfaces with flat cone metrics and describe an algorithm for solving the problem of prescribing curvature, that is to deform the metric discrete conformally so that the curvature of the resulting metric coincides with the prescribed curvature. We explicitly construct a discrete conformal map between the input triangulated surface and the deformed triangulated surface. Our algorithm can handle the surface with any topology with or without boundary, and can find a deformed metric for any prescribed curvature satisfying the Gauss-Bonnet formula. In addition, we present the numerical examples to show the convergence of our discrete conformality and to demonstrate the efficiency and the robustness of our algorithm.
[ { "version": "v1", "created": "Mon, 22 Dec 2014 07:38:26 GMT" } ]
2014-12-23T00:00:00
[ [ "Sun", "Jian", "" ], [ "Wu", "Tianqi", "" ], [ "Gu", "Xianfeng", "" ], [ "Luo", "Feng", "" ] ]
new_dataset
0.96739
1412.5830
Crist\'obal Camarero
Crist\'obal Camarero and Carmen Mart\'inez and Ram\'on Beivide
Identifying Codes of Degree 4 Cayley Graphs over Abelian Groups
null
null
null
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a wide family of identifying codes over regular Cayley graphs of degree four which are built over finite Abelian groups is presented. Some of the codes in this construction are also perfect. The graphs considered include some well-known graphs such as tori, twisted tori and Kronecker products of two cycles. Therefore, the codes can be used for identification in these graphs. Finally, an example of how these codes can be applied for adaptive identification over these graphs is presented.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 12:07:20 GMT" } ]
2014-12-22T00:00:00
[ [ "Camarero", "Cristóbal", "" ], [ "Martínez", "Carmen", "" ], [ "Beivide", "Ramón", "" ] ]
new_dataset
0.997834
1412.6151
Lucas Leao
Lucas Le\~ao, David Bianchini and Omar Branquinho
FLBRA: Fuzzy Logic Based Routing Algorithm for Indoor Wireless Sensor Networks
12 pages
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 5, October 2014
10.5121/ijcsit.2014.6507
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Considering the context of building management systems with wireless sensor networks monitoring environmental features, this paper presents a proposal of a Fuzzy Logic Based Routing Algorithm (FLBRA) to determine the cost of each link and the identification of the best routes for packet forwarding. We describe the parameters (Received Signal Strength Indicator - RSSI, Standard Deviation of the RSSI and Packet Error Rate - PER) for the cost definition of each path, the sequence of identifying best routes and the results obtained in simulation. As expected in this proposal, the simulation results showed an increase in the packet delivery rate compared to RSSI-based forward protocol (RBF).
[ { "version": "v1", "created": "Tue, 11 Nov 2014 17:51:05 GMT" } ]
2014-12-22T00:00:00
[ [ "Leão", "Lucas", "" ], [ "Bianchini", "David", "" ], [ "Branquinho", "Omar", "" ] ]
new_dataset
0.998871
1412.6291
Maciej Wielgus
Maciek Wielgus
Perona-Malik equation and its numerical properties
My bachelor thesis, Faculty of Mathematics, Informatics and Mechanics, University of Warsaw, 2010
null
null
null
cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work concerns the Perona-Malik equation, which plays essential role in image processing. The first part gives a survey of results on existance, uniqueness and stability of solutions, the second part introduces discretisations of equation and deals with an analysis of discrete problem. In the last part I present some numerical results, in particular with algorithms applied to real images.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 11:17:38 GMT" } ]
2014-12-22T00:00:00
[ [ "Wielgus", "Maciek", "" ] ]
new_dataset
0.998941
1412.6306
Lidia Dobrescu
Adrian-Ioan Lita, Ioan Plotog, Lidia Dobrescu
Multiprocessor System Dedicated to Multi-Rotor Mini-UAV Capable of 3D flying
International Conference of Scientific Paper AFASES 2014 Brasov, 22-24 May 2014
null
null
null
cs.CE
http://creativecommons.org/licenses/by/3.0/
The paper describes an electronic multiprocessor system that assures functionality of a miniature UAV capable of 3D flying. The apparatus consists of six independently controlled brushless DC motors, each having a propeller attached to it. Since the brushless motor requires complex algorithms in order to achieve maximum torque, efficiency and response time a DSP must be used. All the motors are then controlled by a main microprocessor which is capable of reading sensors (Inertial Measurement Unit (IMU)-orientation and GPS), receiving input commands (remote controller or trajectory plan) and sending independent commands to each of the six motors. The apparatus contains a total of eight microcontrollers: the main unit, the IMU mathematical processor and one microcontroller for each of the six brushless DC motors. Applications for such an apparatus could include not only military, but also search-and-rescue, geodetics, aerial photography and aerial assistance.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 11:53:38 GMT" } ]
2014-12-22T00:00:00
[ [ "Lita", "Adrian-Ioan", "" ], [ "Plotog", "Ioan", "" ], [ "Dobrescu", "Lidia", "" ] ]
new_dataset
0.99731
1412.6378
Pierre de Buyl
Bastian Venthur, Benjamin Blankertz
Wyrm, A Pythonic Toolbox for Brain-Computer Interfacing
Part of the Proceedings of the 7th European Conference on Python in Science (EuroSciPy 2014), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2014-04
cs.HC
http://creativecommons.org/licenses/by/3.0/
A Brain-Computer Interface (BCI) is a system that measures central nervous system activity and translates the recorded data into an output suitable for a computer to use as an input signal. Such a BCI system consists of three parts, the signal acquisition, the signal processing and the feedback/stimulus presentation. In this paper we present Wyrm, a signal processing toolbox for BCI in Python. Wyrm is applicable to a broad range of neuroscientific problems and capable for running online experiments in real time and off-line data analysis and visualisation.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 15:34:01 GMT" } ]
2014-12-22T00:00:00
[ [ "Venthur", "Bastian", "" ], [ "Blankertz", "Benjamin", "" ] ]
new_dataset
0.999779
1412.6383
Pierre de Buyl
Christophe Pouzat, Georgios Is. Detorakis
SPySort: Neuronal Spike Sorting with Python
Part of the Proceedings of the 7th European Conference on Python in Science (EuroSciPy 2014), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2014-05
cs.CE q-bio.NC
http://creativecommons.org/licenses/by/3.0/
Extracellular recordings with multi-electrode arrays is one of the basic tools of contemporary neuroscience. These recordings are mostly used to monitor the activities, understood as sequences of emitted action potentials, of many individual neurons. But the raw data produced by extracellular recordings are most commonly a mixture of activities from several neurons. In order to get the activities of the individual contributing neurons, a pre-processing step called spike sorting is required. We present here a pure Python implementation of a well tested spike sorting procedure. The latter was designed in a modular way in order to favour a smooth transition from an interactive sorting, for instance with IPython, to an automatic one. Surprisingly enough - or sadly enough, depending on one's view point -, recoding our now 15 years old procedure into Python was the occasion of major methodological improvements.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 15:40:00 GMT" } ]
2014-12-22T00:00:00
[ [ "Pouzat", "Christophe", "" ], [ "Detorakis", "Georgios Is.", "" ] ]
new_dataset
0.999245
1412.6391
Pierre de Buyl
Davide Monari, Francesco Cenni, Erwin Aertbeli\"en, Kaat Desloovere
Py3DFreeHandUS: a library for voxel-array reconstruction using Ultrasonography and attitude sensors
Part of the Proceedings of the 7th European Conference on Python in Science (EuroSciPy 2014), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2014-07
cs.CV cs.CE
http://creativecommons.org/licenses/by/3.0/
In medical imaging, there is a growing interest to provide real-time images with good quality for large anatomical structures. To cope with this issue, we developed a library that allows to replace, for some specific clinical applications, more robust systems such as Computer Tomography (CT) and Magnetic Resonance Imaging (MRI). Our python library Py3DFreeHandUS is a package for processing data acquired simultaneously by ultra-sonographic systems (US) and marker-based optoelectronic systems. In particular, US data enables to visualize subcutaneous body structures, whereas the optoelectronic system is able to collect the 3D position in space for reflective objects, that are called markers. By combining these two measurement devices, it is possible to reconstruct the real 3D morphology of body structures such as muscles, for relevant clinical implications. In the present research work, the different steps which allow to obtain a relevant 3D data set as well as the procedures for calibrating the systems and for determining the quality of the reconstruction.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 15:47:47 GMT" } ]
2014-12-22T00:00:00
[ [ "Monari", "Davide", "" ], [ "Cenni", "Francesco", "" ], [ "Aertbeliën", "Erwin", "" ], [ "Desloovere", "Kaat", "" ] ]
new_dataset
0.999539
1412.6395
Pierre de Buyl
Esteban Fuentes, Hector E. Martinez
SClib, a hack for straightforward embedded C functions in Python
Part of the Proceedings of the 7th European Conference on Python in Science (EuroSciPy 2014), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2014-08
cs.MS physics.comp-ph
http://creativecommons.org/licenses/by/3.0/
We present SClib, a simple hack that allows easy and straightforward evaluation of C functions within Python code, boosting flexibility for better trade-off between computation power and feature availability, such as visualization and existing computation routines in SciPy. We also present two cases were SClib has been used. In the first set of applications we use SClib to write a port to Python of a Schr\"odinger equation solver that has been extensively used the literature, the resulting script presents a speed-up of about 150x with respect to the original one. A review of the situations where the speeded-up script has been used is presented. We also describe the solution to the related problem of solving a set of coupled Schr\"odinger-like equations where SClib is used to implement the speed-critical parts of the code. We argue that when using SClib within IPython we can use NumPy and Matplotlib for the manipulation and visualization of the solutions in an interactive environment with no performance compromise. The second case is an engineering application. We use SClib to evaluate the control and system derivatives in a feedback control loop for electrical motors. With this and the integration routines available in SciPy, we can run simulations of the control loop a la Simulink. The use of C code not only boosts the speed of the simulations, but also enables to test the exact same code that we use in the test rig to get experimental results. Again, integration with IPython gives us the flexibility to analyze and visualize the data.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 15:51:21 GMT" } ]
2014-12-22T00:00:00
[ [ "Fuentes", "Esteban", "" ], [ "Martinez", "Hector E.", "" ] ]
new_dataset
0.999627
1412.6396
Till Tantau
Till Tantau
Existential Second-Order Logic Over Graphs: A Complete Complexity-Theoretic Classification
Technical report version of a STACS 2015 paper
null
null
null
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Descriptive complexity theory aims at inferring a problem's computational complexity from the syntactic complexity of its description. A cornerstone of this theory is Fagin's Theorem, by which a graph property is expressible in existential second-order logic (ESO logic) if, and only if, it is in NP. A natural question, from the theory's point of view, is which syntactic fragments of ESO logic also still characterize NP. Research on this question has culminated in a dichotomy result by Gottlob, Kolatis, and Schwentick: for each possible quantifier prefix of an ESO formula, the resulting prefix class either contains an NP-complete problem or is contained in P. However, the exact complexity of the prefix classes inside P remained elusive. In the present paper, we clear up the picture by showing that for each prefix class of ESO logic, its reduction closure under first-order reductions is either FO, L, NL, or NP. For undirected, self-loop-free graphs two containment results are especially challenging to prove: containment in L for the prefix $\exists R_1 \cdots \exists R_n \forall x \exists y$ and containment in FO for the prefix $\exists M \forall x \exists y$ for monadic $M$. The complex argument by Gottlob, Kolatis, and Schwentick concerning polynomial time needs to be carefully reexamined and either combined with the logspace version of Courcelle's Theorem or directly improved to first-order computations. A different challenge is posed by formulas with the prefix $\exists M \forall x\forall y$: We show that they express special constraint satisfaction problems that lie in L.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 15:51:33 GMT" } ]
2014-12-22T00:00:00
[ [ "Tantau", "Till", "" ] ]
new_dataset
0.996177
1412.6402
Pierre de Buyl
Rebecca R. Murphy, Sophie E. Jackson, David Klenerman
pyFRET: A Python Library for Single Molecule Fluorescence Data Analysis
Part of the Proceedings of the 7th European Conference on Python in Science (EuroSciPy 2014), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2014-10
cs.CE physics.bio-ph q-bio.BM
http://creativecommons.org/licenses/by/3.0/
Single molecule F\"orster resonance energy transfer (smFRET) is a powerful experimental technique for studying the properties of individual biological molecules in solution. However, as adoption of smFRET techniques becomes more widespread, the lack of available software, whether open source or commercial, for data analysis, is becoming a significant issue. Here, we present pyFRET, an open source Python package for the analysis of data from single-molecule fluorescence experiments from freely diffusing biomolecules. The package provides methods for the complete analysis of a smFRET dataset, from burst selection and denoising, through data visualisation and model fitting. We provide support for both continuous excitation and alternating laser excitation (ALEX) data analysis. pyFRET is available as a package downloadable from the Python Package Index (PyPI) under the open source three-clause BSD licence, together with links to extensive documentation and tutorials, including example usage and test data. Additional documentation including tutorials is hosted independently on ReadTheDocs. The code is available from the free hosting site Bitbucket. Through distribution of this software, we hope to lower the barrier for the adoption of smFRET experiments by other research groups and we encourage others to contribute modules for specific analysis needs.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 16:00:31 GMT" } ]
2014-12-22T00:00:00
[ [ "Murphy", "Rebecca R.", "" ], [ "Jackson", "Sophie E.", "" ], [ "Klenerman", "David", "" ] ]
new_dataset
0.999114
1412.5490
Ashirbani Saha
Ashirbani Saha, Q. M. Jonathan Wu
High Frequency Content based Stimulus for Perceptual Sharpness Assessment in Natural Images
13 pages, 6 figures, 3 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A blind approach to evaluate the perceptual sharpness present in a natural image is proposed. Though the literature demonstrates a set of variegated visual cues to detect or evaluate the absence or presence of sharpness, we emphasize in the current work that high frequency content and local standard deviation can form strong features to compute perceived sharpness in any natural image, and can be considered an able alternative for the existing cues. Unsharp areas in a natural image happen to exhibit uniform intensity or lack of sharp changes between regions. Sharp region transitions in an image are caused by the presence of spatial high frequency content. Therefore, in the proposed approach, we hypothesize that using the high frequency content as the principal stimulus, the perceived sharpness can be quantified in an image. When an image is convolved with a high pass filter, higher values at any pixel location signify the presence of high frequency content at those locations. Considering these values as the stimulus, the exponent of the stimulus is weighted by local standard deviation to impart the contribution of the local contrast within the formation of the sharpness map. The sharpness map highlights the relatively sharper regions in the image and is used to calculate the perceived sharpness score of the image. The advantages of the proposed method lie in its use of simple visual cues of high frequency content and local contrast to arrive at the perceptual score, and requiring no training with the images. The promise of the proposed method is demonstrated by its ability to compute perceived sharpness for within image and across image sharpness changes and for blind evaluation of perceptual degradation resulting due to presence of blur. Experiments conducted on several databases demonstrate improved performance of the proposed method over that of the state-of-the-art techniques.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 17:28:53 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2014 02:57:51 GMT" } ]
2014-12-19T00:00:00
[ [ "Saha", "Ashirbani", "" ], [ "Wu", "Q. M. Jonathan", "" ] ]
new_dataset
0.997101
1412.5697
Zahed Rahmati
Zahed Rahmati, Mohammad Ali Abam, Valerie King, Sue Whitesides
Kinetic $k$-Semi-Yao Graph and its Applications
arXiv admin note: text overlap with arXiv:1307.2700, arXiv:1406.5554
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new proximity graph, called the $k$-Semi-Yao graph ($k$-SYG), on a set $P$ of points in $\mathbb{R}^d$, which is a supergraph of the $k$-nearest neighbor graph ($k$-NNG) of $P$. We provide a kinetic data structure (KDS) to maintain the $k$-SYG on moving points, where the trajectory of each point is a polynomial function whose degree is bounded by some constant. Our technique gives the first KDS for the theta graph (\ie, $1$-SYG) in $\mathbb{R}^d$. It generalizes and improves on previous work on maintaining the theta graph in $\mathbb{R}^2$. As an application, we use the kinetic $k$-SYG to provide the first KDS for maintenance of all the $k$-nearest neighbors in $\mathbb{R}^d$, for any $k\geq 1$. Previous works considered the $k=1$ case only. Our KDS for all the $1$-nearest neighbors is deterministic. The best previous KDS for all the $1$-nearest neighbors in $ \mathbb{R}^d$ is randomized. Our structure and analysis are simpler and improve on this work for the $k=1$ case. We also provide a KDS for all the $(1+\epsilon)$-nearest neighbors, which in fact gives better performance than previous KDS's for maintenance of all the exact $1$-nearest neighbors. As another application, we present the first KDS for answering reverse $k$-nearest neighbor queries on moving points in $ \mathbb{R}^d$, for any $k\geq 1$.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 01:34:32 GMT" } ]
2014-12-19T00:00:00
[ [ "Rahmati", "Zahed", "" ], [ "Abam", "Mohammad Ali", "" ], [ "King", "Valerie", "" ], [ "Whitesides", "Sue", "" ] ]
new_dataset
0.998699
1412.5847
Nicola Caon
Antonio Dorta, Nicola Caon, Jorge Andres Perez Prieto
ConGUSTo: (HT)Condor Graphical Unified Supervising Tool
8 pages, 10 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
HTCondor is a distributed job scheduler developed by the University of Wisconsin-Madison, which allows users to run their applications in other users' machines when they are not being used, thus providing a considerably increase in the overall computational power and a more efficient use of the computing resources. Our institution has been successfully using HTCondor for more than ten years, and HTCondor is nowadays the most used Supercomputing resource we have. Although HTCondor provides a wide range of tools and options for its management and administration, there are currently no tools that can show detailed usage information and statistics in a clear, easy to interpret, interactive set of graphics displays. For this reason, we have developed ConGUSTo, a web-based tool that allows to collect HTCondor usage and statistics data in an easy way, and present them using a variety of tabular and graphics charts.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 13:17:41 GMT" } ]
2014-12-19T00:00:00
[ [ "Dorta", "Antonio", "" ], [ "Caon", "Nicola", "" ], [ "Prieto", "Jorge Andres Perez", "" ] ]
new_dataset
0.999172
1412.6061
Gundram Leifert
Gundram Leifert, Roger Labahn, Tobias Strau{\ss} (University of Rostock - CITlab)
CITlab ARGUS for Arabic Handwriting
http://www.nist.gov/itl/iad/mig/upload/OpenHaRT2013_SysDesc_CITLAB.pdf
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the recent years it turned out that multidimensional recurrent neural networks (MDRNN) perform very well for offline handwriting recognition tasks like the OpenHaRT 2013 evaluation DIR. With suitable writing preprocessing and dictionary lookup, our ARGUS software completed this task with an error rate of 26.27% in its primary setup.
[ { "version": "v1", "created": "Mon, 15 Dec 2014 06:55:28 GMT" } ]
2014-12-19T00:00:00
[ [ "Leifert", "Gundram", "", "University of\n Rostock - CITlab" ], [ "Labahn", "Roger", "", "University of\n Rostock - CITlab" ], [ "Strauß", "Tobias", "", "University of\n Rostock - CITlab" ] ]
new_dataset
0.989986
1402.2415
Pradeep Singla
Pradeep Singla, Devraj Gautam
Reversible Squaring Circuit For Low Power Digital Signal Processing
This paper has been withdrawn by the author due to a crucial sign error in design fig. 3(b)
International Journal of Electronics, Computer & Communication Technology, Volume 4, Issue- 2, Jan-2014
null
null
cs.AR
http://creativecommons.org/licenses/by/3.0/
With the high demand of low power digital systems, energy dissipation in the digital system is one of the limiting factors. Reversible logic is one of the alternate to reduce heat/energy dissipation in the digital circuits and have a very significant importance in bioinformatics, optical information processing, CMOS design etc. In this paper the authors propose the design of new 2- bit binary Squaring circuit used in most of the digital signal processing hardware using Feynman & MUX gate. The proposed squaring circuit having less garbage outputs, constant inputs, Quantum cost and Total logical calculation i.e. less delay as compared to the traditional method of squaring operation by reversible multiplier. The simulating results and quantized results are also shown in the paper which shows the greatest improvement in the design against the previous methodology.
[ { "version": "v1", "created": "Tue, 11 Feb 2014 10:01:15 GMT" }, { "version": "v2", "created": "Wed, 17 Dec 2014 03:35:20 GMT" } ]
2014-12-18T00:00:00
[ [ "Singla", "Pradeep", "" ], [ "Gautam", "Devraj", "" ] ]
new_dataset
0.998252
1412.4999
Medhat H. M. Elsayed Mr.
Medhat H. M. Elsayed, Amr A. El-Sherif, and Amr Mohamed
DDSAT: Distributed Dynamic Spectrum Access Protocol Implementation Using GNURadio and USRP
6 pages, 9 figures, conference paper
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Frequency spectrum is one of the valuable resources in wireless communications. Using cognitive radio, spectrum efficiency will increase by making use of the spectrum holes. Dynamic Spectrum Access techniques allows secondary users to transmit on an empty channel not used by a primary user for a given time. In this paper, a Distributed Dynamic Spectrum Access based TDMA protocol (DDSAT) is designed and implemented on USRP. The proposed protocol performs two main functions: Spectrum Sensing, and Spectrum Management. Spectrum Sensing is performed to find spectrum holes in a co-operative manner using the contributing secondary users. Spectrum Management works distributively on the secondary users to allocate the spectrum holes in a fairly and efficient utilization. The DDSAT protocol is implemented using Software Defined Radio (SDR) and Universal Software Radio Peripheral (USRP). Evaluation and performance tests are conducted to show throughput and fairness of the system.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 13:56:38 GMT" }, { "version": "v2", "created": "Wed, 17 Dec 2014 06:08:34 GMT" } ]
2014-12-18T00:00:00
[ [ "Elsayed", "Medhat H. M.", "" ], [ "El-Sherif", "Amr A.", "" ], [ "Mohamed", "Amr", "" ] ]
new_dataset
0.999214
1412.5231
Rodrigo de Lamare
Y. Cai, R. C. de Lamare, L.L. Yang and M. Zhao
Robust MMSE Precoding for Multiuser MIMO Relay Systems using Switched Relaying and Side Information
7 figures, 11 pages
IEEE Transactions on Vehicular Technology, 2014
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study proposes a novel precoding scheme for multiuser multiple-input multiple-output (MIMO) relay systems in the presence of imperfect channel state information (CSI). The base station (BS) and the MIMO relay station (RS) are both equipped with the same codebook of unitary matrices. According to each element of the codebook, we create a latent precoding matrix pair, namely a BS precoding matrix and an RS precoding matrix. The RS precoding matrix is formed by multiplying the appropriate unitary matrix from the codebook by a power scaling factor. Based on the given CSI and a block of transmit symbols, the optimum precoding matrix pair, within the class of all possible latent precoding matrix pairs derived from the various unitary matrices, is selected by a suitable selection mechanism for transmission, which is designed to minimize the squared Euclidean distance between the pre-estimated received vector and the true transmit symbol vector. We develop a minimum mean square error (MMSE) design algorithm for the construction of the latent precoding matrix pairs. In the proposed scheme, rather than sending the complete processing matrix, only the index of the unitary matrix and its power scaling factor are sent by the BS to the RS. This significantly reduces the overhead. Simulation results show that compared to other recently reported precoding algorithms the proposed precoding scheme is capable of providing improved robustness against the effects of CSI estimation errors and multiuser interference.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 00:25:12 GMT" } ]
2014-12-18T00:00:00
[ [ "Cai", "Y.", "" ], [ "de Lamare", "R. C.", "" ], [ "Yang", "L. L.", "" ], [ "Zhao", "M.", "" ] ]
new_dataset
0.999252
1412.5517
Engelbert Mephu Nguifo
Jocelyn De Goer De Herve, Myoung-Ah Kang, Xavier Bailly, Engelbert Mephu Nguifo
A perceptual hash function to store and retrieve large scale DNA sequences
null
null
null
null
cs.CE q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences. Perceptual hash function presented here is based on a Discrete Cosine Transform Sign Only (DCT-SO). Each nucleotide is encoded as a fixed gray level intensity pixel and the hash is calculated from its significant frequency characteristics. This results to a drastic data reduction between the sequence and the perceptual hash. Unlike cryptographic hash functions, perceptual hashes are not affected by "avalanche effect" and thus can be compared. The similarity distance between two hashes is estimated with the Hamming Distance, which is used to retrieve DNA sequences. Experiments that we conducted show that our approach is relevant for storing massive DNA sequences, and retrieving them.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 18:47:57 GMT" } ]
2014-12-18T00:00:00
[ [ "De Herve", "Jocelyn De Goer", "" ], [ "Kang", "Myoung-Ah", "" ], [ "Bailly", "Xavier", "" ], [ "Nguifo", "Engelbert Mephu", "" ] ]
new_dataset
0.99666
1402.5051
Eran Iceland
Eran Iceland and Alex Samorodnitsky
On Coset Leader Graphs of LDPC Codes
null
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our main technical result is that, in the coset leader graph of a linear binary code of block length n, the metric balls spanned by constant-weight vectors grow exponentially slower than those in $\{0,1\}^n$. Following the approach of Friedman and Tillich (2006), we use this fact to improve on the first linear programming bound on the rate of LDPC codes, as the function of their minimal distance. This improvement, combined with the techniques of Ben-Haim and Lytsin (2006), improves the rate vs distance bounds for LDPC codes in a significant sub-range of relative distances.
[ { "version": "v1", "created": "Thu, 20 Feb 2014 15:49:49 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2014 19:04:49 GMT" } ]
2014-12-17T00:00:00
[ [ "Iceland", "Eran", "" ], [ "Samorodnitsky", "Alex", "" ] ]
new_dataset
0.999692
1411.4044
Todor Ivanov
Todor Ivanov, Raik Niemann, Sead Izberovic, Marten Rosselli, Karsten Tolle, Roberto V. Zicari
Benchmarking DataStax Enterprise/Cassandra with HiBench
arXiv admin note: substantial text overlap with arXiv:1411.3811
null
null
Technical Report No. 2014-2
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report evaluates the new analytical capabilities of DataStax Enterprise (DSE) [1] through the use of standard Hadoop workloads. In particular, we run experiments with CPU and I/O bound micro-benchmarks as well as OLAP-style analytical query workloads. The performed tests should show that DSE is capable of successfully executing Hadoop applications without the need to adapt them for the underlying Cassandra distributed storage system [2]. Due to the Cassandra File System (CFS) [3], which supports the Hadoop Distributed File System API, Hadoop stack applications should seamlessly run in DSE. The report is structured as follows: Section 2 provides a brief description of the technologies involved in our study. An overview of our used hardware and software components of the experimental environment is given in Section 3. Our benchmark methodology is defined in Section 4. The performed experiments together with the evaluation of the results are presented in Section 5. Finally, Section 6 concludes with lessons learned.
[ { "version": "v1", "created": "Fri, 14 Nov 2014 07:17:54 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2014 14:34:47 GMT" } ]
2014-12-17T00:00:00
[ [ "Ivanov", "Todor", "" ], [ "Niemann", "Raik", "" ], [ "Izberovic", "Sead", "" ], [ "Rosselli", "Marten", "" ], [ "Tolle", "Karsten", "" ], [ "Zicari", "Roberto V.", "" ] ]
new_dataset
0.98404
1412.4878
EPTCS
Marco T. Moraz\'an (Seton Hall University), Rosario Antunez (City College of New York)
Functional Automata - Formal Languages for Computer Science Students
In Proceedings TFPIE 2014, arXiv:1412.4738
EPTCS 170, 2014, pp. 19-32
10.4204/EPTCS.170.2
null
cs.FL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An introductory formal languages course exposes advanced undergraduate and early graduate students to automata theory, grammars, constructive proofs, computability, and decidability. Programming students find these topics to be challenging or, in many cases, overwhelming and on the fringe of Computer Science. The existence of this perception is not completely absurd since students are asked to design and prove correct machines and grammars without being able to experiment nor get immediate feedback, which is essential in a learning context. This article puts forth the thesis that the theory of computation ought to be taught using tools for actually building computations. It describes the implementation and the classroom use of a library, FSM, designed to provide students with the opportunity to experiment and test their designs using state machines, grammars, and regular expressions. Students are able to perform random testing before proceeding with a formal proof of correctness. That is, students can test their designs much like they do in a programming course. In addition, the library easily allows students to implement the algorithms they develop as part of the constructive proofs they write. Providing students with this ability ought to be a new trend in the formal languages classroom.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 05:13:41 GMT" } ]
2014-12-17T00:00:00
[ [ "Morazán", "Marco T.", "", "Seton Hall University" ], [ "Antunez", "Rosario", "", "City\n College of New York" ] ]
new_dataset
0.99935
1412.4881
EPTCS
Victor Winter (University of Nebraska at Omaha, USA)
Bricklayer: An Authentic Introduction to the Functional Programming Language SML
In Proceedings TFPIE 2014, arXiv:1412.4738
EPTCS 170, 2014, pp. 33-49
10.4204/EPTCS.170.3
null
cs.CY cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Functional programming languages are seen by many as instrumental to effectively utilizing the computational power of multi-core platforms. As a result, there is growing interest to introduce functional programming and functional thinking as early as possible within the computer science curriculum. Bricklayer is an API, written in SML, that provides a set of abstractions for creating LEGO artifacts which can be viewed using LEGO Digital Designer. The goal of Bricklayer is to create a problem space (i.e., a set of LEGO artifacts) that is accessible and engaging to programmers (especially novice programmers) while providing an authentic introduction to the functional programming language SML.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 05:14:31 GMT" } ]
2014-12-17T00:00:00
[ [ "Winter", "Victor", "", "University of Nebraska at Omaha, USA" ] ]
new_dataset
0.999714
1411.7282
Bo Yuan
Bo Yuan and Keshab K. Parhi
Successive Cancellation List Polar Decoder using Log-likelihood Ratios
accepted by 2014 Asilomar Conference on Signals, Systems, and Computers
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Successive cancellation list (SCL) decoding algorithm is a powerful method that can help polar codes achieve excellent error-correcting performance. However, the current SCL algorithm and decoders are based on likelihood or log-likelihood forms, which render high hardware complexity. In this paper, we propose a log-likelihood-ratio (LLR)-based SCL (LLR-SCL) decoding algorithm, which only needs half the computation and storage complexity than the conventional one. Then, based on the proposed algorithm, we develop low-complexity VLSI architectures for LLR-SCL decoders. Analysis results show that the proposed LLR-SCL decoder achieves 50% reduction in hardware and 98% improvement in hardware efficiency.
[ { "version": "v1", "created": "Wed, 26 Nov 2014 16:16:25 GMT" }, { "version": "v2", "created": "Sat, 13 Dec 2014 04:24:15 GMT" } ]
2014-12-16T00:00:00
[ [ "Yuan", "Bo", "" ], [ "Parhi", "Keshab K.", "" ] ]
new_dataset
0.971807
1412.4130
Christopher Blake
Christopher Blake and Frank R. Kschischang
Energy Consumption of VLSI Decoders
Submitted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Thompson's model of VLSI computation relates the energy of a computation to the product of the circuit area and the number of clock cycles needed to carry out the computation. It is shown that for any family of circuits implemented according to this model, using any algorithm that performs decoding of a codeword passed through a binary erasure channel, as the block length approaches infinity either (a) the probability of block error is asymptotically lower bounded by 1/2 or (b) the energy of the computation scales at least as Omega(n(log n)^(1/2)), and so the energy of successful decoding, per decoded bit, must scale at least as Omega((log n)^(1/2)). This implies that the average energy per decoded bit must approach infinity for any sequence of codes that approaches capacity. The analysis techniques used are then extended to the case of serial computation, showing that if a circuit is restricted to serial computation, then as block length approaches infinity, either the block error probability is lower bounded by 1/2 or the energy scales at least as fast as Omega(n log(n)). In a very general case that allows for the number of output pins to vary with block length, it is shown that the average energy per decoded bit must scale as Omega(n(log n)^(1/5)). A simple example is provided of a class of circuits performing low-density parity-check decoding whose energy complexity scales as O(n^2 log log n).
[ { "version": "v1", "created": "Fri, 12 Dec 2014 21:07:15 GMT" } ]
2014-12-16T00:00:00
[ [ "Blake", "Christopher", "" ], [ "Kschischang", "Frank R.", "" ] ]
new_dataset
0.952235
1412.4168
Mo Zhao
Mo Zhao and Robert H. Blick
In-vivo Network of Sensors and Actuators
16 pages, 16 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An advanced system of sensors/actuators should allow the direct feedback of a sensed signal into an actuation, e.g., an action potential propagation through an axon or a special cell activity might be sensed and suppressed by an actuator through voltage stimulation or chemical delivery. Such a complex procedure of sensing and stimulation calls for direct communication among these sensors and actuators. In addition, minimizing the sensor/actuator to the size of a biological cell can enable the cell-level automatic therapy. For this objective, we propose such an approach to form a peer-to-peer network of \emph{in vivo} sensors/actuators (S/As) that can be deployed with or even inside biological cells. The S/As can communicate with each other via electromagnetic waves of optical frequencies. In comparison with the comparable techniques including the radio-frequency identification (RFID) and the wireless sensor network (WSN), this technique is well adapted for the cell-level sensing-actuating tasks considering the requirements on size, actuation speed, signal-collision avoidance, etc.
[ { "version": "v1", "created": "Sat, 13 Dec 2014 00:08:22 GMT" } ]
2014-12-16T00:00:00
[ [ "Zhao", "Mo", "" ], [ "Blick", "Robert H.", "" ] ]
new_dataset
0.972718
1412.4224
Jiguang He
Jiguang He, Taejoon Kim, Hadi Ghauch, Kunpeng Liu, Guangjian Wang
Millimeter Wave MIMO Channel Tracking Systems
6 pages, 3 figures, conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider channel/subspace tracking systems for temporally correlated millimeter wave (e.g., E-band) multiple-input multiple-output (MIMO) channels. Our focus is given to the tracking algorithm in the non-line-of-sight (NLoS) environment, where the transmitter and the receiver are equipped with hybrid analog/digital precoder and combiner, respectively. In the absence of straightforward time-correlated channel model in the millimeter wave MIMO literature, we present a temporal MIMO channel evolution model for NLoS millimeter wave scenarios. Considering that conventional MIMO channel tracking algorithms in microwave bands are not directly applicable, we propose a new channel tracking technique based on sequentially updating the precoder and combiner. Numerical results demonstrate the superior channel tracking ability of the proposed technique over independent sounding approach in the presented channel model and the spatial channel model (SCM) adopted in 3GPP specification.
[ { "version": "v1", "created": "Sat, 13 Dec 2014 11:40:40 GMT" } ]
2014-12-16T00:00:00
[ [ "He", "Jiguang", "" ], [ "Kim", "Taejoon", "" ], [ "Ghauch", "Hadi", "" ], [ "Liu", "Kunpeng", "" ], [ "Wang", "Guangjian", "" ] ]
new_dataset
0.979812
1412.4321
Mostafa Zaman Chowdhury
Mostafa Zaman Chowdhury, Nirzhar Saha, Sung Hun Chae, and Yeong Min Jang
Handover Call Admission Control for Mobile Femtocells with Free-Space Optical and Macrocellular Backbone Networks
null
Journal of Advanced Smart Convergence Vol.1 No.1 1-10 (2012)
10.7236/JASC2012.1.1.1
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The deployment of mobile femtocellular networks can enhance the service quality for the users inside the vehicles. The deployment of mobile femtocells generates a lot of handover calls. Also, numbers of group handover scenarios are found in mobile femtocellular network deployment. The ability to seamlessly switch between the femtocells and the macrocell networks is a key concern for femtocell network deployment. However, until now there is no effective and complete handover scheme for the mobile femtocell network deployment. Also handover between the backhaul networks is a major concern for the mobile femtocellular network deployment. In this paper, we propose handover control between the access networks for the individual handover cases. Call flows for the handover between the backhaul networks of the macrocell-to-macrocell case are proposed in this paper. We also propose the link switching for the FSO based backhaul networks. The proposed resource allocation scheme ensures the negligible handover call dropping probability as well as higher bandwidth utilization.
[ { "version": "v1", "created": "Sun, 14 Dec 2014 06:17:55 GMT" } ]
2014-12-16T00:00:00
[ [ "Chowdhury", "Mostafa Zaman", "" ], [ "Saha", "Nirzhar", "" ], [ "Chae", "Sung Hun", "" ], [ "Jang", "Yeong Min", "" ] ]
new_dataset
0.994215
1412.4395
Rachel Gauci
Rachel Gauci
Dafny: Statically Verifying Functional Correctness
12 pages, 1 figure
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report presents the Dafny language and verifier, with a focus on describing the main features of the language, including pre- and postconditions, assertions, loop invariants, termination metrics, quantifiers, predicates and frames. Examples of Dafny code are provided to illustrate the use of each feature, and an overview of how Dafny translates programming code into a mathematical proof of functional verification is presented. The report also includes references to useful resources on Dafny, with mentions of related works in the domain of specification languages.
[ { "version": "v1", "created": "Sun, 14 Dec 2014 19:04:47 GMT" } ]
2014-12-16T00:00:00
[ [ "Gauci", "Rachel", "" ] ]
new_dataset
0.994702
1412.4406
Lidia Dobrescu
Lidia Dobrescu
Domotic Embedded System
null
null
null
null
cs.OH
http://creativecommons.org/licenses/by/3.0/
This paper presents an original domotic embedded system for room temperature monitoring. The OpenRemote is the main software interface between the user and the system, but other software components and communication protocols are used, such as 1-Wire protocol for temperature monitoring devices, RS-232 for the central PC unit and OWFS software for remote control using Android mobile devices. The system architecture consists in hardware and software components to remote control a room temperature parameter for energy efficiency increasing.
[ { "version": "v1", "created": "Sun, 14 Dec 2014 20:52:32 GMT" } ]
2014-12-16T00:00:00
[ [ "Dobrescu", "Lidia", "" ] ]
new_dataset
0.999373
1412.4444
Oliver Kosut
Oliver Kosut and Lalitha Sankar
Asymptotics and Non-asymptotics for Universal Fixed-to-Variable Source Coding
32 pages, 1 figure. Submitted to IEEE Transactions on Information Theory, Dec. 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Universal fixed-to-variable lossless source coding for memoryless sources is studied in the finite blocklength and higher-order asymptotics regimes. Optimal third-order coding rates are derived for general fixed-to-variable codes and for prefix codes. It is shown that the non-prefix Type Size code, in which codeword lengths are chosen in ascending order of type class size, achieves the optimal third-order rate and outperforms classical Two-Stage codes. Converse results are proved making use of a result on the distribution of the empirical entropy and Laplace's approximation. Finally, the fixed-to-variable coding problem without a prefix constraint is shown to be essentially the same as the universal guessing problem.
[ { "version": "v1", "created": "Mon, 15 Dec 2014 01:43:36 GMT" } ]
2014-12-16T00:00:00
[ [ "Kosut", "Oliver", "" ], [ "Sankar", "Lalitha", "" ] ]
new_dataset
0.999079
1412.4638
Magnus Skjegstad
Magnus Skjegstad, Anil Madhavapeddy, Jon Crowcroft
Kadupul: Livin' on the Edge with Virtual Currencies and Time-Locked Puzzles
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Devices connected to the Internet today have a wide range of local communication channels available, such as wireless Wifi, Bluetooth or NFC, as well as wired backhaul. In densely populated areas it is possible to create heterogeneous, multihop communication paths using a combination of these technologies, and often transmit data with lower latency than via a wired Internet connection. However, the potential for sharing meshed wireless radios in this way has never been realised due to the lack of economic incentives to do so on the part of individual nodes. In this paper, we explore how virtual currencies such as Bitcoin might be used to provide an end-to-end incentive scheme to convince forwarding nodes that it is profitable to send packets on via the lowest latency mechanism available. Clients inject a small amount of money to transmit a datagram, and forwarding engines compete to solve a time-locked puzzle that can be claimed by the node that delivers the result in the lowest latency. This approach naturally extends congestion control techniques to a surge pricing model when available bandwidth is low. We conclude by discussing several latency-sensitive applications that would benefit for this, such as video streaming and local augmented reality systems.
[ { "version": "v1", "created": "Mon, 15 Dec 2014 15:31:05 GMT" } ]
2014-12-16T00:00:00
[ [ "Skjegstad", "Magnus", "" ], [ "Madhavapeddy", "Anil", "" ], [ "Crowcroft", "Jon", "" ] ]
new_dataset
0.999577
1412.3906
Christian Plessl
Marvin Damschen and Christian Plessl
Easy-to-Use On-the-Fly Binary Program Acceleration on Many-Cores
Part of ADAPT Workshop proceedings, 2015 (arXiv:1412.2347)
null
null
ADAPT/2015/05
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces Binary Acceleration At Runtime (BAAR), an easy-to-use on-the-fly binary acceleration mechanism which aims to tackle the problem of enabling existent software to automatically utilize accelerators at runtime. BAAR is based on the LLVM Compiler Infrastructure and has a client-server architecture. The client runs the program to be accelerated in an environment which allows program analysis and profiling. Program parts which are identified as suitable for the available accelerator are exported and sent to the server. The server optimizes these program parts for the accelerator and provides RPC execution for the client. The client transforms its program to utilize accelerated execution on the server for offloaded program parts. We evaluate our work with a proof-of-concept implementation of BAAR that uses an Intel Xeon Phi 5110P as the acceleration target and performs automatic offloading, parallelization and vectorization of suitable program parts. The practicality of BAAR for real-world examples is shown based on a study of stencil codes. Our results show a speedup of up to 4x without any developer-provided hints and 5.77x with hints over the same code compiled with the Intel Compiler at optimization level O2 and running on an Intel Xeon E5-2670 machine. Based on our insights gained during implementation and evaluation we outline future directions of research, e.g., offloading more fine-granular program parts than functions, a more sophisticated communication mechanism or introducing on-stack-replacement.
[ { "version": "v1", "created": "Fri, 12 Dec 2014 07:44:52 GMT" } ]
2014-12-15T00:00:00
[ [ "Damschen", "Marvin", "" ], [ "Plessl", "Christian", "" ] ]
new_dataset
0.988403
1412.3751
Rama Krishna Bandi
Rama Krishna Bandi, Maheshanand Bhaintwal
Negacyclic codes over Z4+uZ4
18 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study negacyclic codes of odd length and of length $2^k$ over the ring $R=\mathbb{Z}_4+u\mathbb{Z}_4$, $u^2=0$. We give the complete structure of negacyclic codes for both the cases. We have obtained a minimal spanning set for negacyclic codes of odd lengths over $R$. A necessary and sufficient condition for negacyclic codes of odd lengths to be free is presented. We have determined the cardinality of negacyclic codes in each case. We have obtained the structure of the duals of negacyclic codes of length $2^k$ over $R$ and also characterized self-dual negacyclic codes of length $2^k$ over $R$.
[ { "version": "v1", "created": "Thu, 11 Dec 2014 18:28:49 GMT" } ]
2014-12-12T00:00:00
[ [ "Bandi", "Rama Krishna", "" ], [ "Bhaintwal", "Maheshanand", "" ] ]
new_dataset
0.999821
1412.3233
Christian Mayr
Christian Mayr, Johannes Partzsch, Marko Noack, Stefan H\"anzsche, Stefan Scholze, Sebastian H\"oppner, Georg Ellguth, Rene Sch\"uffny
A Biological-Realtime Neuromorphic System in 28 nm CMOS using Low-Leakage Switched Capacitor Circuits
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A switched-capacitor (SC) neuromorphic system for closed-loop neural coupling in 28 nm CMOS is presented, occupying 600 um by 600 um. It offers 128 input channels (i.e. presynaptic terminals), 8192 synapses and 64 output channels (i.e. neurons). Biologically realistic neuron and synapse dynam- ics are achieved via a faithful translation of the behavioural equations to SC circuits. As leakage currents significantly affect circuit behaviour at this technology node, dedicated compensation techniques are employed to achieve biological-realtime operation, with faithful reproduction of time constants of several 100 ms at room temperature. Power draw of the overall system is 1.9 mW.
[ { "version": "v1", "created": "Wed, 10 Dec 2014 09:13:29 GMT" } ]
2014-12-11T00:00:00
[ [ "Mayr", "Christian", "" ], [ "Partzsch", "Johannes", "" ], [ "Noack", "Marko", "" ], [ "Hänzsche", "Stefan", "" ], [ "Scholze", "Stefan", "" ], [ "Höppner", "Sebastian", "" ], [ "Ellguth", "Georg", "" ], [ "Schüffny", "Rene", "" ] ]
new_dataset
0.991122
1307.2584
Emil Bj\"ornson
Emil Bj\"ornson, Jakob Hoydis, Marios Kountouris, M\'erouane Debbah
Massive MIMO Systems with Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits
To appear in IEEE Transactions on Information Theory, 28 pages, 15 figures. The results can be reproduced using the following Matlab code: https://github.com/emilbjornson/massive-MIMO-hardware-impairments
IEEE Transactions on Information Theory, vol. 60, no. 11, pp. 7112-7139, November 2014
10.1109/TIT.2014.2354403
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of large-scale antenna arrays can bring substantial improvements in energy and/or spectral efficiency to wireless systems due to the greatly improved spatial resolution and array gain. Recent works in the field of massive multiple-input multiple-output (MIMO) show that the user channels decorrelate when the number of antennas at the base stations (BSs) increases, thus strong signal gains are achievable with little inter-user interference. Since these results rely on asymptotics, it is important to investigate whether the conventional system models are reasonable in this asymptotic regime. This paper considers a new system model that incorporates general transceiver hardware impairments at both the BSs (equipped with large antenna arrays) and the single-antenna user equipments (UEs). As opposed to the conventional case of ideal hardware, we show that hardware impairments create finite ceilings on the channel estimation accuracy and on the downlink/uplink capacity of each UE. Surprisingly, the capacity is mainly limited by the hardware at the UE, while the impact of impairments in the large-scale arrays vanishes asymptotically and inter-user interference (in particular, pilot contamination) becomes negligible. Furthermore, we prove that the huge degrees of freedom offered by massive MIMO can be used to reduce the transmit power and/or to tolerate larger hardware impairments, which allows for the use of inexpensive and energy-efficient antenna elements.
[ { "version": "v1", "created": "Tue, 9 Jul 2013 20:05:59 GMT" }, { "version": "v2", "created": "Tue, 7 Jan 2014 13:16:35 GMT" }, { "version": "v3", "created": "Tue, 2 Sep 2014 19:05:06 GMT" } ]
2014-12-10T00:00:00
[ [ "Björnson", "Emil", "" ], [ "Hoydis", "Jakob", "" ], [ "Kountouris", "Marios", "" ], [ "Debbah", "Mérouane", "" ] ]
new_dataset
0.997825
1401.6030
Sergey Sysoev
Sergey Sysoev
The Effective Solving of the Tasks from NP by a Quantum Computer
The paper is submitted to the IEEE Transactions on Information Theory journal
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The new model of quantum computation is proposed, for which an effective algorithm of solving any task in NP is described. The work is based and inspired be the Grover's algorithm for solving NP-tasks with quadratic speedup compared to the classical computation model. The provided model and algorithm exhibit the exponential speedup over that described by Grover.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 16:10:16 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 14:35:41 GMT" } ]
2014-12-10T00:00:00
[ [ "Sysoev", "Sergey", "" ] ]
new_dataset
0.975254
1410.8635
Xiao Lu
Xiao Lu, Dusit Niyato, Ping Wang, Dong In Kim, and Zhu Han
Wireless Charger Networking for Mobile Devices: Fundamentals, Standards, and Applications
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless charging is a technique of transmitting power through an air gap to an electrical device for the purpose of energy replenishment. Recently, the wireless charging technology has been significantly advanced in terms of efficiency and functionality. This article first presents an overview and fundamentals of wireless charging. We then provide the review of standards, i.e., Qi and Alliance for Wireless Power (A4WP), and highlight on their communication protocols. Next, we propose a novel concept of wireless charger networking which allows chargers to be connected to facilitate information collection and control. We demonstrate the application of the wireless charger network in user-charger assignment, which clearly shows the benefit in terms of reduced cost for users to identify the best chargers to replenish energy for their mobile devices.
[ { "version": "v1", "created": "Fri, 31 Oct 2014 04:41:57 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 05:46:50 GMT" } ]
2014-12-10T00:00:00
[ [ "Lu", "Xiao", "" ], [ "Niyato", "Dusit", "" ], [ "Wang", "Ping", "" ], [ "Kim", "Dong In", "" ], [ "Han", "Zhu", "" ] ]
new_dataset
0.999041
1411.1822
Manish Gupta
Manoj K. Raut and Manish K. Gupta
On Octonary Codes and their Covering Radii
16 pages, some errors fixed
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces new reduction and torsion codes for an octonary code and determines their basic properties. These could be useful for the classification of self-orthogonal and self dual codes over $\mathbb{Z}_8$. We also focus our attention on covering radius problem of octonary codes. In particular, we determine lower and upper bounds of the covering radius of several classes of Repetition codes, Simplex codes of Type $\alpha$ and Type $\beta$ and their duals, MacDonald codes, and Reed-Muller codes over $\mathbb{Z}_8$.
[ { "version": "v1", "created": "Fri, 7 Nov 2014 04:34:59 GMT" }, { "version": "v2", "created": "Wed, 19 Nov 2014 05:47:18 GMT" }, { "version": "v3", "created": "Tue, 9 Dec 2014 07:17:35 GMT" } ]
2014-12-10T00:00:00
[ [ "Raut", "Manoj K.", "" ], [ "Gupta", "Manish K.", "" ] ]
new_dataset
0.999827
1412.2416
Johannes Stegmann Dr.
Johannes Stegmann
Paradigm shifts. Part II. Reverse Transcriptase. Analysis of reference stability and word frequencies
10 pages, 7 tables, 1 figure, corrections
null
null
null
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The reverse transcription paradigm shift in RNA tumor virus research marked by the discovery of the reverse transcriptase in 1970 was traced using co-citation and title word frequency analysis. It is shown that this event is associated with a break in citation patterns and the occurrence of previously unknown technical terms.
[ { "version": "v1", "created": "Sun, 7 Dec 2014 23:51:35 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 17:22:04 GMT" } ]
2014-12-10T00:00:00
[ [ "Stegmann", "Johannes", "" ] ]
new_dataset
0.983399
1412.2821
Xiu-Li Wang
Xiuli Wang
Zipf's Law and the Frequency of Characters or Words of Oracles
null
null
null
null
cs.CL math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article discusses the frequency of characters of Oracle,concluding that the frequency and the rank of a word or character is fit to Zipf-Mandelboit Law or Zipf's law with three parameters,and figuring out the parameters based on the frequency,and pointing out that what some researchers of Oracle call the assembling on the two ends is just a description by their impression about the Oracle data.
[ { "version": "v1", "created": "Tue, 9 Dec 2014 00:39:16 GMT" } ]
2014-12-10T00:00:00
[ [ "Wang", "Xiuli", "" ] ]
new_dataset
0.988415
1412.2908
Yassine Sadqi
Yassine Sadqi, Ahmed Asimi and Younes Asimi
A Cryptographic Mutual Authentication Scheme for Web Applications
15 pages, 2 figures,International Journal
International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
10.5121/ijnsa.2014.6601
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The majority of current web authentication is built on username/password. Unfortunately, password replacement offers more security, but it is difficult to use and expensive to deploy. In this paper, we propose a new mutual authentication scheme called StrongAuth which preserves most password authentication advantages and simultaneously improves security using cryptographic primitives. Our scheme not only offers webmasters a clear framework which to build secure user authentication, but it also provides almost the same conventional user experience. Security analysis shows that the proposed scheme fulfills the required user authentication security benefits, and can resist various possible attacks.
[ { "version": "v1", "created": "Tue, 9 Dec 2014 10:50:51 GMT" } ]
2014-12-10T00:00:00
[ [ "Sadqi", "Yassine", "" ], [ "Asimi", "Ahmed", "" ], [ "Asimi", "Younes", "" ] ]
new_dataset
0.999168
1412.0321
Jiajun Liu
Jiajun Liu, Kun Zhao, Philipp Sommer, Shuo Shang, Brano Kusy, Raja Jurdak
Bounded Quadrant System: Error-bounded Trajectory Compression on the Go
International Conference on Data Engineering (ICDE) 2015, 12 pages
null
null
null
cs.DS cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Long-term location tracking, where trajectory compression is commonly used, has gained high interest for many applications in transport, ecology, and wearable computing. However, state-of-the-art compression methods involve high space-time complexity or achieve unsatisfactory compression rate, leading to rapid exhaustion of memory, computation, storage and energy resources. We propose a novel online algorithm for error-bounded trajectory compression called the Bounded Quadrant System (BQS), which compresses trajectories with extremely small costs in space and time using convex-hulls. In this algorithm, we build a virtual coordinate system centered at a start point, and establish a rectangular bounding box as well as two bounding lines in each of its quadrants. In each quadrant, the points to be assessed are bounded by the convex-hull formed by the box and lines. Various compression error-bounds are therefore derived to quickly draw compression decisions without expensive error computations. In addition, we also propose a light version of the BQS version that achieves $\mathcal{O}(1)$ complexity in both time and space for processing each point to suit the most constrained computation environments. Furthermore, we briefly demonstrate how this algorithm can be naturally extended to the 3-D case. Using empirical GPS traces from flying foxes, cars and simulation, we demonstrate the effectiveness of our algorithm in significantly reducing the time and space complexity of trajectory compression, while greatly improving the compression rates of the state-of-the-art algorithms (up to 47%). We then show that with this algorithm, the operational time of the target resource-constrained hardware platform can be prolonged by up to 41%.
[ { "version": "v1", "created": "Mon, 1 Dec 2014 01:14:42 GMT" }, { "version": "v2", "created": "Mon, 8 Dec 2014 14:49:37 GMT" } ]
2014-12-09T00:00:00
[ [ "Liu", "Jiajun", "" ], [ "Zhao", "Kun", "" ], [ "Sommer", "Philipp", "" ], [ "Shang", "Shuo", "" ], [ "Kusy", "Brano", "" ], [ "Jurdak", "Raja", "" ] ]
new_dataset
0.983368
1412.2158
Natarajan Meghanathan
Natarajan Meghanathan and Gordon Skelton
A Two-layer Architecture of Mobile Sinks and Static Sensors
11 pages, 1 figure
Proceedings of the 15th International Conference on Advanced Computing and Communication, pp. 249-254, Guwahathi, India, December 2007
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a two-layer mobile sink and static sensor network (MSSSN) architecture for large scale wireless sensor networks. The top layer is a mobile ad hoc network of resource-rich sink nodes while the bottom layer is a network of static resource-constrained sensor nodes. The MSSSN architecture can be implemented at a lower cost with the currently available IEEE 802.11 devices that only use a single halfduplex transceiver. Each sink node is assigned a particular region to monitor and collect data. A sink node moves to the vicinity of the sensor nodes (within a few hops) to collect data. The collected data is exchanged with peer mobile sinks. Thus, the MSSSN architecture provides scalability, extends sensor lifetime by letting them operate with limited transmission range and provides connectivity between isolated regions of sensor nodes. In order to provide fault tolerance, more than one mobile sink could be collecting data from a given region or a mobile sink could collect data from more than one region. In the later half of the paper, we discuss several open research issues that need to be addressed while implementing the MSSSN architecture.
[ { "version": "v1", "created": "Fri, 5 Dec 2014 21:48:12 GMT" } ]
2014-12-09T00:00:00
[ [ "Meghanathan", "Natarajan", "" ], [ "Skelton", "Gordon", "" ] ]
new_dataset
0.999141
1412.2257
Florian Schmidt
Florian Schmidt, Matteo Ceriotti, Niklas Hauser, Klaus Wehrle
HotBox: Testing Temperature Effects in Sensor Networks
18 pages, 6 figures, published as technical report of the Department of Computer Science of RWTH Aachen University
null
null
AIB-2014-14
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-power wireless networks, especially in outside deployments, are exposed to a wide range of temperatures. The detrimental effect of high temperatures on communication quality is well known. To investigate these influences under controlled conditions, we present HotBox, a solution with the following properties: (1) It allows exposition of sensor motes to a wide range of temperatures with a high degree of accuracy. (2) It supports specifying exact spatial orientation of motes which, if not ensured, interferes with repeatable experiment setups. (3) It is reasonably easy to assemble by following the information (code, PCB schematics, hardware list and crafting instructions) available online, facilitating further use of the platforms by other researchers. After presenting HotBox, we will show its performance and prove its feasibility as evaluation platform by conducting several experiments. These experiments additionally provide further insight into the influence of temperature effects on communication performance in low-power wireless networks.
[ { "version": "v1", "created": "Sat, 6 Dec 2014 16:44:19 GMT" } ]
2014-12-09T00:00:00
[ [ "Schmidt", "Florian", "" ], [ "Ceriotti", "Matteo", "" ], [ "Hauser", "Niklas", "" ], [ "Wehrle", "Klaus", "" ] ]
new_dataset
0.992438