submitted by

**tapi**18 minutes agoSimulation is a very powerful tool for hardware designers. It generally allows the preliminary evaluation of a chip’s performance before its final tape out. As security against side-channel attacks is an increasingly important issue for cryptographic devices, simulation also becomes a desirable option for preliminary evaluation in this case. However, its relevance highly depends on the proper...

submitted by

**Hicivilmiff**31 minutes agoNoxious stimuli in our environment are often accompanied by input from other sensory modalities that can affect the processing of these stimuli and the perception of pain. Stimuli from these other modalities may distract us from pain and reduce its perceived strength. Alternatively, they can enhance the saliency of the painful input, leading to an increased pain experience. We discuss factors t...

submitted by

**moecal213**33 minutes agoWe study double auction market design where the market maker wants to maximize its total revenue by buying low from the sellers and selling high to the buyers. We consider a Bayesian setting where buyers and sellers have independent probability distributions on the values of products on the market. For the simplest setting, each seller has one kind of indivisible good with a bounded (integer) a...

submitted by

**sandro**33 minutes agoRna interactions are fundamental in many cellular processes, where two or more rna molecules can be involved. Multiple rna interactions are also believed to be much more complex than pairwise interactions. Recently, multiple rna interaction prediction has been formulated as a maximization problem. Here we extensively examine this optimization problem under several biologically meaningful intera...

submitted by

**NoahAle**33 minutes agoWe give an algorithm which in O ( n log 2 n ) time counts all distinct squares in a labeled tree. There are two main obstacles to overcome. The first one is that the number of distinct squares in a tree is Ω ( n 4 / 3 ) (see Crochemore et al., CPM 2012), which differs substantially from the case of classical strings for which there are only linearly many distinct squares. We o...

submitted by

**tokeyoaden**33 minutes agoWe study the following combinatorial problem. Let B be the set of balls such that each ball is in one of two colors, and let k ≥ 2 be an integer. A query consists of selecting k balls from the set B and the answer to the query is either that (i) all balls have the same color, or (ii) there exist two balls of different colors and a pair of those is pointed out. The goal is to design a strate...

submitted by

**BraylMic**33 minutes agoSuppose that each member of a set of agents has a preference list of a subset of houses, possibly involving ties, and each agent and house has their capacity denoting the maximum number of houses/agents (respectively) that can be matched to him/her/it. We want to find a matching M, called popular, for which there is no other matching M ′ such that more agents prefer M ′ to M...

submitted by

**brucedurham**1 hour agoThe static pull-in instability of beam-type microelectromechanical systems (MEMS) is theoretically investigated. Two engineering cases including cantilever and double cantilever microbeam are considered. Considering the midplane stretching as the source of the nonlinearity in the beam behavior, a nonlinear size-dependent Euler-Bernoulli beam model is used based on a modified couple stress theor...

submitted by

**SoloMat**2 hours agoGenerator maintenance scheduling (GMS) determines the outage periods of generating units in a one-year or two-year planning horizon for regular safety inspection. This paper introduces a new practical GMS for centralized electrical power systems in which, in contrary to previous studies, the outage periods are scheduled based on operational hours of units. Predefined minimum and maximum operati...

submitted by

**cilibe**2 hours agoIn this research the parallel machine scheduling problem with preemption by considering a constant transportation delay for migrated jobs and minimization of makespan as the criterion i.e., P m pmtn(delay) C max is investigated. It is assumed that when a preempted job resumes on another machine, it is required a delay between the processing time of the job on these two machines. This delay i...

submitted by

**corlahomilenck**2 hours agoHelper data schemes are a security primitive used for privacy-preserving biometric databases and physical unclonable functions. One of the oldest known helper data schemes is the code offset method (COM). We propose an extension of the COM: the helper data are accompanied by many instances of fake helper data that are drawn from the same distribution as the real one. While the adversary has no ...

submitted by

**boyscam**2 hours agoOne of the most critical sources of variation in face recognition is facial expressions, especially in the frequent case where only a single sample per person is available for enrollment. that improve the accuracy in the presence of such variations are still required for a reliable authentication system. In this paper, we address this problem with an analysis-by-synthesis-based scheme, in which...

submitted by

**tamradd**2 hours agoPer pixel adaptive Gaussian mixture models (GMMs) have become a popular choice for the detection of change in the video surveillance domain because of their ability to cope with many challenges characteristic for surveillance systems in real time with low memory requirements. Since their first introduction in the surveillance domain, GMM has been enhanced in many directions. In this paper, we p...

submitted by

**RossChris**2 hours agoThe linear canonical transform (LCT) has been shown to be a powerful tool for optics and signal processing. This paper investigates new sampling relations in the LCT domain. Firstly, the relationship between linear canonical series (LCS) and LCT is introduced. The LCS expansion coefficients are the sampled values of LCT. Then, based on the conventional Fourier series and LCS, two new sampling r...

submitted by

**DaytoIsaia**2 hours agoA novel Gabor filter structural similarity algorithm (GFSSIM) is proposed for facial expression recognition (FER) on noisy images. Low-resolution facial images with low SNRs are specifically dealt with FER system. The features are extracted using 40 Gabor filters, and a feature subset is selected for classification. The test image is classified based on proposed GFSSIM algorithm. The experiment...

Pages: 1