computer science applications1707

A note about k-DNF resolution

In this note we show two results about k-DNF resolution. First we prove that there are CNF formulas which require exponential length refutations in resolution extended with parities of size k, but have polynomial length refutations in k-DNF resolution. Then we show that small proofs in tree-like k-DNF resolution and narrow proofs in dag-like resolution have the same proving power, over CNFs. This latter result is clearly implicit in Krajíček (1994) [24] but this direct proof is focused on resolution and provides information about refutation width.

Semi-supervised echo state networks for audio classification

Echo state networks (ESNs), belonging to the wider family of reservoir computing methods, are a powerful tool for the analysis of dynamic data. In an ESN, the input signal is fed to a fixed (possibly large) pool of interconnected neurons, whose state is then read by an adaptable layer to provide the output. This last layer is generally trained via a regularized linear least-squares procedure.

Selection of clinical features for pattern recognition applied to gait analysis

This paper deals with the opportunity of extracting useful information from medical data retrieved directly from a stereophotogrammetric system applied to gait analysis. A feature selection method to exhaustively evaluate all the possible combinations of the gait parameters is presented, in order to find the best subset able to classify among diseased and healthy subjects.

Fundamental limits of low-density spreading NOMA with fading

Spectral efficiency of low-density spreading nonorthogonal multiple access channels in the presence of fading is derived for linear detection with independent decoding as well as optimum decoding. The large system limit, where both the number of users and number of signal dimensions grow with fixed ratio, called load, is considered. In the case of optimum decoding, it is found that low-density spreading underperforms dense spreading for all loads. Conversely, linear detection is characterized by different behaviors in the underloaded vs. overloaded regimes.

Analysis of pure and slotted ALOHA with multi-packet reception and variable packet size

Multiple packet reception (MPR) is becoming a viable reality for wireless random access protocols thanks to advances in the physical layer and new coding techniques. In the simplest $K$ -MPR model, a receiver can resolve up to $K\geq 1$ parallel transmissions. We extend the classical analysis of pure and slotted ALOHA to $K$ -MPR devices with arbitrary degree $K$ for fixed and variable packet size. Through a parsimonious modeling approach, we derive relatively simple analytical expressions.

Monitoring systems for pipeline safety based on FBG sensors

Events like earthquakes, landslides, tsunami and other important occurrences, related to human activities could affect heavily the security of the pipeline constructions. Pipeline used for transportation of gas, petroleum and other hydrocarbons could become dangerous for three main problems that can occur during the operation process:1-Explosions related to malfunction of the system itself; 2-defects of the utilized material; 3-Robbery and sabotage operations.

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma