A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
An experimental survey of no-reference video quality assessment methods
2016
International Journal of Pervasive Computing and Communications
., looking at the effects of video compression algorithms) or are affected by synthetic network impairments (i.e. via simulated network conditions). ...
Our study helps identifying the conditions under which simple metrics may be used effectively and indicates an avenue to control the quality of streaming systems. ...
Herein we experimentally survey the most popular algorithms, identifying their operational conditions. ...
doi:10.1108/ijpcc-01-2016-0008
fatcat:udvnf4vuqnhqvc5hoiac3wl76a
On-Device Machine Learning: An Algorithms and Learning Theory Perspective
[article]
2020
arXiv
pre-print
In addition to summarizing the state-of-the-art, the survey also identifies a number of challenges and next steps for both the algorithmic and theoretical aspects of on-device learning. ...
This reformulation allows tools, techniques, and algorithms from a wide variety of research areas to be compared equitably. ...
Most of these algorithms involve modifying the fast gradient methods developed in
Data Compression. ...
arXiv:1911.00623v2
fatcat:fokmxmy3x5g7ne7yggm4zpyqta
Comparison of Efficient Parallel Index Algorithms used for RDF Data Store
2014
International Journal of Computer Applications
Further, GPU multicores are available at commodity rates thus providing an option for cheap and low-power alternatives. ...
Moreover, with the proliferation of internet and its easy access on myriad devices, has resulted in huge amount of data generation. Initially, such data was considered disconnected and not related. ...
Using an step to lightweight data exchange is a compressed (binary) RDF serialization format called HDT. ...
doi:10.5120/18842-0229
fatcat:dkp6g3i33vak5n3kua2a76h7i4
A Comprehensive Review on the NILM Algorithms for Energy Disaggregation
[article]
2021
arXiv
pre-print
There exists an API, NILMTK, a reproducible benchmark algorithm for the same. ...
This paper provides a survey of the effective NILM system frameworks and reviews the performance of the benchmark algorithms in a comprehensive manner. ...
DATA SETS AND ALGORITHMS The following section elaborates on the data sets that have been used for the purpose of this research experiment and the algorithms that were implemented using the NILM-TK API ...
arXiv:2102.12578v2
fatcat:hnbkxaq3gngabdfualkftu372a
Data reduction algorithm for correlated data in the smart grid
2021
IET Smart Grid
Thus, a data compression technique called DRACO (data reduction algorithm for correlated data) that shows a reasonable compression ratio while using network resources efficiently is designed and developed ...
analysed. ...
A study [12] has compared a number of data compression algorithms for smart meters by analysing their processing time and compression efficiency. ...
doi:10.1049/stg2.12010
fatcat:mhh6bnemyja4bfgiyotbm4eaxi
An Enhanced Satellite Image Compression Using Hybrid (DWT, DCT and SVD) Algorithm
2021
American Journal of Computer Science and Technology
Compression involves the reduction of the amount of bits used in representing an image and consequently reducing the size of that image without losing any detail from the image. ...
This work, proposed an hybrid Discrete Wavelet Transform, Discrete Cosine Transform and Singular Value Decomposition (DCT-DWT-SVD)based techniques for satellite image compression. ...
The study provided an experimental survey for the SVD as an efficient transform in image processing applications. ...
doi:10.11648/j.ajcst.20210401.11
fatcat:xvrlp7wrm5gibmolxzvkaj5sjq
Mobile follower robot as an assistive device for home oxygen therapy – evaluation of tether control algorithms
2015
ROBOMECH Journal
Two different control algorithms were studied using dynamic simulation and motion capture experiments with healthy subjects. ...
In further experiments with H.O.T. patients, including a questionnaire survey, it was confirmed that Follow the Leader control was capable of following the user's trajectory more accurately than Pseudo-Joystick ...
Acknowledgements The authors would like to express our deepest gratitude to the members and staff of Meeting for the Pulmonary Rehabilitation Studies in Hokushin and Hokushin Flying Disc Club. ...
doi:10.1186/s40648-014-0026-3
fatcat:vuhwwh4rg5d4ngw4w4mwufiqba
Implementing the LZ-index
2009
ACM Journal of Experimental Algorithmics
If a text of u characters over an alphabet of size σ is compressible to n symbols using the LZ78 algorithm, then the LZ-index takes 4n log 2 n(1 + o(1)) bits of space (that is, 4 times the entropy of the ...
The LZ-index is a theoretical proposal of a lightweight data structure for text indexing, based on the Ziv-Lempel trie. ...
A recent article [Navarro and Mäkinen 2007] surveys most of the theoretical advances, and in particular serves as an update of the account of existing indexes given here. ...
doi:10.1145/1412228.1412230
fatcat:eexvoesbjrfhzebyfuru2mknpe
Succinct Trees in Practice
[chapter]
2010
2010 Proceedings of the Twelfth Workshop on Algorithm Engineering and Experiments (ALENEX)
We experiment over various types of real-life trees and of traversals, and conclude that the latter technique stands out as an excellent practical combination of space occupancy, time performance, and ...
BP and DFUDS require a balanced parentheses representation that supports the core operations findopen, findclose, and enclose, for which we implement and compare three major algorithmic proposals. ...
It can be seen that FF and LOUDS (with its lightweight brute-force algorithm) sharply dominate the space/time tradeoff. ...
doi:10.1137/1.9781611972900.9
dblp:conf/alenex/ArroyueloCNS10
fatcat:seuus2ui6zc3vep3ssbpqtzljy
Digital Soil Mapping of Soil Organic Matter with Deep Learning Algorithms
2022
ISPRS International Journal of Geo-Information
The performance of the proposed LSM-ResNet was compared to a traditional machine learning algorithm, the random forest (RF) algorithm, and a training set (80%) and a test set (20%) were created to test ...
The method was tested with Landsat5, the meteorological data from WorldClim, and the 1602 sampling points set from Xinxiang, China. ...
[72] reported values for the spatial correlation range of organic matter between 240 and 270 m using data from an experimental site in the Czech Republic. Similarly, Jian-Bing et al. ...
doi:10.3390/ijgi11050299
fatcat:lg5xq2itljhrbbw2kxtlv6g574
Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
2020
Cryptography
The algorithm is evaluated via computing experiments and evaluation results, as well as comparison with similar works, demonstrate good imperceptibility qualities of the proposed scheme. ...
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. ...
doi:10.3390/cryptography4040035
fatcat:lmwle3pgl5fvxgpvui6pmuzq7u
Geometric Midpoint Algorithm for Device-Free Localization in Low-Density Wireless Sensor Networks
2021
Electronics
Second, a geometric midpoint algorithm is proposed to estimate the location of the target. Finally, simulations and experiments were performed to validate the proposed scheme. ...
The experimental results show that the proposed GM algorithm outperforms the geometric filter algorithm, which is a state-of-the-art DFL method that yields tracking root-mean-square errors up to 0.86 m ...
using simulation analyses and experimental evaluations. ...
doi:10.3390/electronics10232924
fatcat:baeh66dhmbblzoxu4ujgyqdgri
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
2021
Computer Networks
This contribution allows an automated optimization of the attack, avoiding the need to manually perform various types of analyses with different POI combinations. ...
We showcase our approach on several experimental use cases, including attacks on unprotected and protected AES implementations. ...
Algorithmic complexity The computation time of an algorithm depends strongly on the particular computer executing it and its implementation. ...
doi:10.1016/j.comnet.2021.108405
fatcat:mzdhdpvnfvamfdbc3nktsvs7p4
D2.3 Power models, energy models and libraries for energy-efficient concurrent data structures and algorithms
[article]
2018
arXiv
pre-print
2.1 on investigating and modeling the trade-off between energy and performance of concurrent data structures and algorithms. ...
It reports i) the latest results of Task 2.2-2.4 on providing programming abstractions and libraries for developing energy-efficient data structures and algorithms and ii) the improved results of Task ...
Libraries of concurrent data structures and algorithms We describe a set of implemented concurrent search trees as well as their energy and performance analyses. • In the previous deliverable, we have ...
arXiv:1801.10556v2
fatcat:y5n53z4gz5de3lzrmvd7soa26y
A Survey on Issues of Decision Tree and Non-Decision Tree Algorithms
2016
International Journal of Artificial Intelligence and Applications for Smart Devices
For these and other reasons, decision tree methodology can provide an important tool in every data mining researcher, practitioner's tool box. ...
Even though classification has been studied widely in the past, many of the algorithms are designed only for memory-resident data, thus limiting their suitability for data mining large data sets. ...
Experimental verification on large datasets signifies that the space and time performance of the tree construction algorithm scales with the data size and number of processors. ...
doi:10.14257/ijaiasd.2016.4.1.02
fatcat:atql2wwaffej3czppm3o444jqm
« Previous
Showing results 1 — 15 out of 2,753 results