2016 Annual Conference on Information Science and Systems (CISS)最新文献

筛选
英文 中文
Computational mapping of brain networks 大脑网络的计算映射
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7513716
M. Moreno-Ortega, D. Javitt, A. Kangarlu
{"title":"Computational mapping of brain networks","authors":"M. Moreno-Ortega, D. Javitt, A. Kangarlu","doi":"10.1109/CISS.2016.7513716","DOIUrl":"https://doi.org/10.1109/CISS.2016.7513716","url":null,"abstract":"Magnetic resonance imaging (MRI) has developed into an indispensible diagnostic tool in medicine. MRI has also demonstrated immense potential for researchers who are making progress in every aspect of this modality expanding its applications into uncharted territories. Computational techniques have made major contributions to MRI enabling detection of minute signals from human brain. Functional MRI (fMRI) offers imaging of the mind as well as the brain in the same session. Complex computational tools are used to visualize brain networks that offer a new powerful tool to study the brain and its disorders. Functional connectivity (fc) maps using resting state fMRI (rsfMRI) is computed by detecting temporal synchronicity of neuronal activation patterns of anatomically separated brain regions. But, a great deal of technological advancement, both in hardware and software, had to be made to make computation of brain networks possible. The critical technologies that made computational modeling of functional brain networks possible were high quality gradients for implementation of distortion free fMRI, faster pulse sequences and radio frequency (RF) coils to capture the fluctuation frequency of neuronal activity, and complex post processing computation of brain networks. rsfMRI is capable of detecting brain function that mediate high cognitive processes in normal brain. We aim to ultimately detect the disruption of this mediation in psychiatric patients. We have already obtained functional connectivity in normal subjects using fMRI data during resting state. We did this as a function of spatial resolution to explore the required computational sources and susceptibility effects on the sensitivity of fMRI to anatomic specialization. We provide a conceptual summary of the role of computational techniques in fMRI data analysis. In exploring this question, ultimately MRI's capability in accessing information at the neuronal level comes to surface. We use latest computational tools for analysis of data from human brain and offer a vision for future developments that could revolutionize the use of computational techniques in making neuropsychiatry a quantitative practice.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129000988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Bacterial Foraging Algorithm for color image enhancement 一种用于彩色图像增强的自适应细菌觅食算法
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460467
O. Verma, R. Chopra, Abhinav Gupta
{"title":"An Adaptive Bacterial Foraging Algorithm for color image enhancement","authors":"O. Verma, R. Chopra, Abhinav Gupta","doi":"10.1109/CISS.2016.7460467","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460467","url":null,"abstract":"A new approach in spatial domain is presented for the enhancement of color images using an Adaptive Bacterial Foraging Algorithm (ABFA). The image may be classified as under-exposed or over-exposed depending upon the value of exposure. A new objective function is formulated which makes use of the fuzzy entropy. This objective function is optimized using ABFA which allows the step-size of the bacterial colony to vary dynamically over the generations. The lifetime of the bacterial colony is described by generations which are split into two phases; exploration and exploitation based on the value of step-size. Smaller step-sizes correspond to exploitation phases in which the entire bacterial colony is trying to exploit a region of interest while larger step-sizes correspond to exploration phases in which the entire bacterial colony is trying to explore the search space to find regions of interest which can then be exploited by reducing the step-size. This method is applicable on both over-exposed and under-exposed images. The proposed algorithm is found to be better and much more simplified than the existing Bacterial Foraging Algorithm (BFA) in fuzzy domain for color image enhancement upon comparison.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128701073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Two-sided change detection under unknown initial state 未知初始状态下的双面变化检测
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460539
James Falt, S. Blostein
{"title":"Two-sided change detection under unknown initial state","authors":"James Falt, S. Blostein","doi":"10.1109/CISS.2016.7460539","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460539","url":null,"abstract":"The problem of detecting a change in distribution of a sequence of independent and identically distributed (IID) random variables is addressed. Unlike previous approaches to sequential change detection, which assume a known initial probability density function (PDF) for the sequence, in this paper we address the case where the initial distribution of the sequence is unknown. An optimal stopping approach based on Bayesian hypothesis testing with exponential delay cost is proposed. The tradeoffs among average detection delay, probability of false alarm and probability of detecting a change in the incorrect direction are investigated. It is shown that the proposed test's probability of change detection in the incorrect direction can be made arbitrarily small without significantly increasing average detection delay for change times larger than a minimum value determined by the hypothesis testing problem itself. The proposed test also has a recursive algorithm to track the minimum risk hypotheses with fixed complexity per sample. Simulation results confirm the derived properties and reveal that the average delay, after an initial transient period, approaches that of the CUSUM test, which is delay-optimal if the initial state were known.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115408697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Differentially private multi-party computation 差分私有多方计算
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460489
P. Kairouz, Sewoong Oh, P. Viswanath
{"title":"Differentially private multi-party computation","authors":"P. Kairouz, Sewoong Oh, P. Viswanath","doi":"10.1109/CISS.2016.7460489","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460489","url":null,"abstract":"We study the problem of multi-party computation under approximate (ε,δ) differential privacy. We assume an interactive setting with k parties, each possessing a private bit. Each party wants to compute a function defined on all the parties' bits. Differential privacy ensures that there remains uncertainty in any party's bit even when given the transcript of interactions and all the other parties' bits. This paper is a follow up to our work, where we studied multi-party computation under (ε, 0) differential privacy. We generalize the results and prove that a simple non-interactive randomized response mechanism is optimal. Our optimality result holds for all privacy levels (all values of ε and δ), heterogenous privacy levels across parties, all types of functions to be computed, all types of cost metrics, and both average and worst-case (over the inputs) measures of accuracy.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121714110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Energy-efficient resource allocation for SWIPT in multiple access channels 多通道SWIPT的节能资源分配
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460509
T. A. Zewde, M. C. Gursoy
{"title":"Energy-efficient resource allocation for SWIPT in multiple access channels","authors":"T. A. Zewde, M. C. Gursoy","doi":"10.1109/CISS.2016.7460509","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460509","url":null,"abstract":"In this paper, we study optimal resource allocation strategies for simultaneous information and power transfer (SWIPT) focusing on the system energy efficiency. We consider two-user multiple access channels in which energy harvesting (EH) and information decoding (ID) nodes are spatially separated. We formulate optimization problems that maximize system energy efficiency while taking harvested energy constraints into account. These are concave-linear fractional problems, and hence Karush-Kuhn-Tucker (KKT) conditions are necessary and sufficient to obtain globally optimal solution. Solving these optimization problems, we provide analytical expressions for optimal transmit power allocation among the source nodes, and identify the corresponding energy efficiency. We confirm the theoretical analysis via numerical results. Furthermore, we also characterize the effect of circuit power consumption on the system's efficiency as the harvested energy demand varies.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116767962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Doubly opportunistic beamforming for downlink multiuser MIMO 下行多用户MIMO的双机会波束形成
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460479
Junyoung Nam, Young-Jo Ko
{"title":"Doubly opportunistic beamforming for downlink multiuser MIMO","authors":"Junyoung Nam, Young-Jo Ko","doi":"10.1109/CISS.2016.7460479","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460479","url":null,"abstract":"We develop a novel opportunistic beamforming scheme referred to as doubly opportunistic beamforming (DOBF), which is doubly selective in both users and beams based on a new type of channel state information (CSI) feedback to improve the limited feedback downlink system performance. DOBF benefits from very flexible scheduling at the transmitter, compared to the conventional opportunistic beamforming. We provide new findings as to how much the inaccurate signal to interference and noise ratio (SINR) estimation due to lack of scheduling information at the receivers affects the performance of zero-forcing beamforming (ZFBF) with limited feedback. On the contrary, DOBF does not suffer from such a SINR inaccuracy problem. Rather surprisingly, numerical results show that our scheme can noticeably outperform even ZFBF under a comparable amount of CSI feedback load when spatially correlated fading and performance degradation due to limited scheduling information are taken into account.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134178398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Controlling information flow and energy use via adaptive synaptogenesis 通过适应性突触发生控制信息流和能量使用
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460559
W. Levy, Harang Ju, R. Baxter, C. Colbert
{"title":"Controlling information flow and energy use via adaptive synaptogenesis","authors":"W. Levy, Harang Ju, R. Baxter, C. Colbert","doi":"10.1109/CISS.2016.7460559","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460559","url":null,"abstract":"The adaptive synaptogenesis algorithm is a mathematically defined, random process that, in its present form, creates a feedforward network of excitatory synapses without supervision. The algorithm is fully local and consists of three separate modification processes: random synapse formation, modification of an existing synapse's strength (both strengthening and weakening), and shedding of very weak synapses. The algorithm is shown to have desirable stability properties; further, the algorithm can be parameterized to control the synaptic energy use by a neuron and to control the net information received by a neuron. In addition to the fundamental mathematics on which the algorithm is based, the interaction of parameter settings with characterized random inputs are described. Finally, specific extensions of the algorithm are suggested.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction of granular time-series energy consumption for manufacturing jobs from analysis and learning of historical data 通过对历史数据的分析和学习,预测制造业工作的粒度时间序列能耗
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460575
C. Duerden, L. Shark, G. Hall, Joe Howe
{"title":"Prediction of granular time-series energy consumption for manufacturing jobs from analysis and learning of historical data","authors":"C. Duerden, L. Shark, G. Hall, Joe Howe","doi":"10.1109/CISS.2016.7460575","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460575","url":null,"abstract":"In the manufacturing sector, the consideration of energy consumption during the scheduling and execution of jobs can offer significant benefits from an infrastructural and financial perspective. While numerous methods have been proposed for predicting the energy consumption of manufacturing machinery, they typically do not treat them as dynamic pieces of equipment which can lead to issues with long term accuracy. Furthermore, these models produce predictions at a high level of abstraction which can lead to sub-optimal utilization. This paper addresses these shortcomings and presents a new methodology based around the usage and inference of historical energy data. Multiple energy profiles for identical jobs are stored along with information regarding the machines mechanical conditions, allowing the system to compensate for machine-related changes to the energy consumption. Where historical data is lacking, analysis of how the machine's condition affects job energy consumption over time, allows for the use of Support Vector Regression to generate temporary synthetic energy profiles compensated for probable machine conditions.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of an underlay control channel for NC-OFDM-based networks 基于nc - ofdm网络的底层控制通道的设计与实现
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460506
Ratnesh Kumbhkar, G. Sridharan, N. Mandayam, I. Seskar, S. Kompella
{"title":"Design and implementation of an underlay control channel for NC-OFDM-based networks","authors":"Ratnesh Kumbhkar, G. Sridharan, N. Mandayam, I. Seskar, S. Kompella","doi":"10.1109/CISS.2016.7460506","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460506","url":null,"abstract":"This paper designs an underlay control channel for noncontiguous-OFDM-based cognitive networks. Noncontiguous OFDM (NC-OFDM) provides a fast and flexible manner of accessing disjoint parts of the spectrum and is ideally suited for dynamic spectrum access. While similar to OFDM, NC-OFDM explicitly restricts transmission to only certain subcarriers that are free of incumbent transmissions. In particular, this paper considers designing a control channel for a cognitive network consisting of multiple point-to-point (p2p) links that operate over a wide bandwidth that might encompass some primary transmissions. In such a scenario, control channel becomes vital not only to share basic transmission parameters but also to aid timing and frequency recovery of NC-OFDM transmission; a nontrivial problem in itself. The proposed design is a low-power underlay transmission that spans the entire bandwidth regardless of any incumbent transmissions and uses direct sequence spread spectrum (DSSS). The control channel operates in one of two modes. The first mode aids timing and frequency recovery through a two-step process, while the second mode is used for control data transmission. To enable multiple access, the p2p links use orthogonal pseudo-noise (PN) sequences. The proposed control channel is implemented on USRPs in the ORBIT testbed using GNU Radio. Experimental results suggest robust timing and frequency offset recovery even in the presence of concurrent primary transmissions and support for about 10 to 20kbps over a 1 MHz bandwidth at an uncoded symbol-error-rate of about 10-2 under typical operating conditions.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multiperiod subscription pricing for cellular wireless entrants 蜂窝无线进入者的多期订阅定价
2016 Annual Conference on Information Science and Systems (CISS) Pub Date : 2016-03-16 DOI: 10.1109/CISS.2016.7460523
Xinyi Hu, Y. Shan, G. Kesidis, S. Sarkar, R. Dhar, S. Fdida
{"title":"Multiperiod subscription pricing for cellular wireless entrants","authors":"Xinyi Hu, Y. Shan, G. Kesidis, S. Sarkar, R. Dhar, S. Fdida","doi":"10.1109/CISS.2016.7460523","DOIUrl":"https://doi.org/10.1109/CISS.2016.7460523","url":null,"abstract":"We consider a two-player game involving a large incumbent (or incumbent oligopoly) and small entrant into a cellular-wireless access provider marketplace. The entrant's customers must pay roaming charges. We assume that the roaming charges are transparent to the user and regulated to prevent an incumbent from creating barriers to entry in the marketplace. To be able to reckon suitable (regulated) roaming charges, in this paper we consider a potentially stricter model of competition than [7] (though still not all subscribers to the lowest-cost provider), and a revenue function for the entrant that considers future revenue streams when its deployment is greater and its customers therefore do not roam as much, i.e., a multiperiod/longitudinal revenue model.","PeriodicalId":346776,"journal":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127785844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信