The major operational problem in one-way vehicle sharing systems is the vehicle stock imbalance problem. In this paper, we address this problem by proposing a new approach for dynamically allocating vehicles to users ...
详细信息
ISBN:
(纸本)9781509018475
The major operational problem in one-way vehicle sharing systems is the vehicle stock imbalance problem. In this paper, we address this problem by proposing a new approach for dynamically allocating vehicles to users based on “incentivization” schemes which use reservations to coordinate supply-and-demand mismatches and price incentives for rewarding users, if they accept to pick up their vehicle from an oversupplied station and/or to drop off it to an under-supplied station. The system incentivizes users based on the priorities of vehicle relocations from station to station, taking into account the fluctuating demand for vehicles and parking places at different stations over time. We present two different schemes for incentivizing users to act in favour of the system. Both schemes consider budget constraints and are truthful and budget-feasible. We extensively evaluated our approach through simulations and observed significant improvements in the number of completed trips and system revenue.
Aiming at the minimization of numerical dispersion effects in finite-difference time-domain (FDTD) simulations, we investigate the potential of introducing frequency-dependent coefficients in the approximations of dif...
详细信息
ISBN:
(纸本)9781509022342
Aiming at the minimization of numerical dispersion effects in finite-difference time-domain (FDTD) simulations, we investigate the potential of introducing frequency-dependent coefficients in the approximations of differential operators. The proposed methodology exploits some previous results on optimized finite-differences, but initially avoids the necessity for selecting a specific optimization point. Herein, the operators' coefficient formulae are approximated by a low-order polynomial, which is transformed into a finite-difference counterpart using the Helmholtz equation. This modifies the initial spatial stencil and improves performance over all frequencies, which can be further controlled with the least-squares method, leading to various new FDTD schemes of augmented reliability.
Human action recognition is one of the most important issues in computer vision. In this paper, the main idea is to design a general approach to recognize the human behavior. This approach is based on a pre-collected ...
详细信息
ISBN:
(纸本)9781509024629
Human action recognition is one of the most important issues in computer vision. In this paper, the main idea is to design a general approach to recognize the human behavior. This approach is based on a pre-collected action database, which extracted by the depth images and forms the sequences of skeletons, and trained by the proposed Action Forests (AF) model. AF extends the random forest algorithm by using different decision functions to fit the skeletal features in 3D space. The system achieves the real-time classification result without the limitation of background and camera position. In the experiments, we collected several human behavior with single-character actions and two-character interactions to train the AF model. The skeleton features were retrieved from the depth sensor Kinect. We investigated the effect of several training parameters in AF. In conclusion, AF can learn the skeletal features efficiently and runs at 30 frames per second on action classification with high accuracy.
Timing errors in the memory elements of a design are of increasing importance in nanometer technology microprocessor cores. In this work, we present a flip-flop oriented timing error detection and correction technique...
详细信息
ISBN:
(纸本)9781509061143
Timing errors in the memory elements of a design are of increasing importance in nanometer technology microprocessor cores. In this work, we present a flip-flop oriented timing error detection and correction technique. It exploits a transition detector at the input of the flip-flop for error detection along with an asynchronous local error correction scheme to provide timing error tolerance. To validate the proposed approach, it has been applied in the design of a 32-bit MIPS microprocessor core which was fabricated in a 65nm CMOS technology.
In this paper we present the results from some versions of a new initialization scheme for the k-Means algorithm. k- Means is probably the most fundamental clustering algorithm, with application in lots of _elds, such...
详细信息
In this work, we consider a V2V commnunication system operating over high relative speeds. In this scenario, the wireless channel is characterized by double selectivity, which results into intercarrier interference (I...
详细信息
This paper proposes a novel approach for human activity recognition based on body part histograms and Hidden Markov Models. From a depth video frame, body parts are segmented first using a trained random forest. Then,...
详细信息
ISBN:
(纸本)9781509061235
This paper proposes a novel approach for human activity recognition based on body part histograms and Hidden Markov Models. From a depth video frame, body parts are segmented first using a trained random forest. Then, a histogram for each body part is combined to represent histogram features for a depth image. The depth video activity features are then applied on hidden Markov models for training and recognition. The proposed method was superior when compared with other conventional approaches.
The 2's complement representation is widely adopted, since compared to the other signed number systems has the advantage of simpler addition and single representation of zero. Sing-magnitude representation is used...
详细信息
The 2's complement representation is widely adopted, since compared to the other signed number systems has the advantage of simpler addition and single representation of zero. Sing-magnitude representation is used in digital signal processors for the representation of digital signals for low-power purposes. The 1's complement representation compared to the 2's complement one has the advantages of the simpler conversion to and from the sign-magnitude representation, simpler negation and that truncation of negative numbers is equivalent to that of the sign-magnitude representation. Therefore, the design of efficient arithmetic units for this system should be examined. In this work 1's complement modified Booth multipliers with complexity similar to that of the 2's complement ones are proposed.
A nanogranular thin film structure with concentration Co(c=0.2)Bi(1-c), and thickness 25 nm, exhibits: (i) a progressive crossing of Hall coefficient RH(B) curves from negative at lower fields to positive sign at high...
A nanogranular thin film structure with concentration Co(c=0.2)Bi(1-c), and thickness 25 nm, exhibits: (i) a progressive crossing of Hall coefficient RH(B) curves from negative at lower fields to positive sign at higher fields between 5K and 200K, and (ii) the perpendicular magnetoresistance (PMR), ρ⊥(B,T)/ρ⊥(B=0,T), curves are separated, exhibiting two different components above and below |B|≈2T. The low field PMR component can be described by the two band-model of bulk Bi. The effect of the low-field PMR component increases from 5K up to 300K by: Δρ⊥(ΔB=2T,300K)≈3Δρ⊥(ΔB=2T,5K), following the same trend with RH(B,T) curves. Below 100K and for |B|≥2T the second component in PMR curves can be simulated by a power law: ρ i (B)=bBκ , with an exponent κ: 1.3 ≤ κ < 2, which can be understood as a result of the two band-model equation. However, above 100K and for |B|≥2T this second PMR component becomes linear in B: ρ i (B)=bB, up to 300K. This behavior coincides with the temperature and field regions where the RH(B) curves reverse the sign of Hall coefficient. Such a linear MR with B can be related to an edge-resistance: Redge ~ B ⊥, providing evidence for an edge conduction channel in grain boundaries of Co and Bi that competes the bulk component of bulk Bi, over the temperature and field regions.
The current age is called the age of information technology. The security of transmitting and storing this information are facing a huge challenge. Traditional and classical methods are not suitabel to protect this in...
详细信息
ISBN:
(纸本)9781509025534
The current age is called the age of information technology. The security of transmitting and storing this information are facing a huge challenge. Traditional and classical methods are not suitabel to protect this information, especially when the type of this information is a part of multimedia such as image, audio and video. This type of information needs the high level of security. For that purpose, many researchers designed novel and smart techniques and methods. In this paper suggests a new algorithm to investiage the quality of encryption based on genetic algorithm to find out an optimization solution for security, robustness, quality and speed of encryption algorithm. In this method, the genetic algorithm has been incorportaed within encryption algorithm to find a optimization solution minimize possible time and maximize the performance algorithm.
暂无评论