Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Wollongong

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2071 - 2100 of 4868

Full-Text Articles in Physical Sciences and Mathematics

Rotor Position And Speed Estimation Of A Variable Structure Direct-Torque-Controlled Ipm Synchronous Motor Drive At Very Low Speeds Including Standstill, Saad M. Sayeef, Gilbert Foo, Muhammad F. Rahman Jan 2010

Rotor Position And Speed Estimation Of A Variable Structure Direct-Torque-Controlled Ipm Synchronous Motor Drive At Very Low Speeds Including Standstill, Saad M. Sayeef, Gilbert Foo, Muhammad F. Rahman

Faculty of Informatics - Papers (Archive)

The performance of a speed sensorless variable structure direct-torque-controlled interior permanent magnet synchronous motor drive at very low speeds including standstill is investigated in this paper. The rotor position and speed are estimated using a high-frequency (HF) signal injection algorithm at low speeds and a sliding observer at medium to high speeds. The changeover between these two algorithms is performed using a weighting function which smoothly hands over the estimated rotor position information for stator flux and torque estimation purposes. Experiments were performed to test the effectiveness of the proposed HF signal injection algorithm, and results show that the sensorless …


Automating Dimensional Tolerancing Using Ripple Down Rules (Rdr), Ghassan Beydoun, Achim Hoffmann, Ramsey Hamade Jan 2010

Automating Dimensional Tolerancing Using Ripple Down Rules (Rdr), Ghassan Beydoun, Achim Hoffmann, Ramsey Hamade

Faculty of Informatics - Papers (Archive)

We propose to use a knowledge based approach to assist in mechanical design focusing on dimensional tolerancing. To illustrate our approach, we capture the knowledge which human designers utilize in order to specify dimensional tolerances on shafts and mating holes in order to meet desired classes of fit as set by relevant engineering standards. The software system we developed would help mechanical designers become more effective in the time-consuming dimensioning and tolerancing process of their designs in the future. In doing this, the paper makes a twofold contribution to the field of knowledge acquisition: firstly, interface was adjusted to receive …


The Curvhdr Method For Gating Flow Cytometry Samples, Ulrike Naumann, George Luta, Matthew P. Wand Jan 2010

The Curvhdr Method For Gating Flow Cytometry Samples, Ulrike Naumann, George Luta, Matthew P. Wand

Faculty of Informatics - Papers (Archive)

Background: High-throughput flow cytometry experiments produce hundreds of large multivariate samples of cellular characteristics. These samples require specialized processing to obtain clinically meaningful measurements. A major component of this processing is a form of cell subsetting known as gating. Manual gating is timeconsuming and subjective. Good automatic and semi-automatic gating algorithms are very beneficial to highthroughput flow cytometry.

Results: We develop a statistical procedure, named curvHDR, for automatic and semi-automatic gating. The method combines the notions of significant high negative curvature regions and highest density regions and has the ability to adapt well to human-perceived gates. The underlying …


Towards Green Business Process Management, Konstantin Hoesch-Klohe, Aditya K. Ghose, Lam-Son Le Jan 2010

Towards Green Business Process Management, Konstantin Hoesch-Klohe, Aditya K. Ghose, Lam-Son Le

Faculty of Informatics - Papers (Archive)

There is a global consensus on the need to reduce our collective carbon footprint. While much research attention has focused on developing alternative energy sources, automotive technologies or waste disposal techniques, we often ignore the fact that the ability to optimize (existing) operations to reduce their emissions impact is fundamental to this exercise. We believe that by transforming the problem into the domain of Business Process Management (BPM) we can leverage the rich expertise in this field to address issues associated with identifying areas for improvement, understanding the implication and performing carbon footprint minimization. We will use the term “Green …


Business Rules Discovery From Process Design Repositories, Jantima Polpinij, Aditya K. Ghose, Hoa Khanh Dam Jan 2010

Business Rules Discovery From Process Design Repositories, Jantima Polpinij, Aditya K. Ghose, Hoa Khanh Dam

Faculty of Informatics - Papers (Archive)

Traditional process mining approaches focus on extracting process constraints or business rules from repositories of process instances. In this context, process designs or process models tend to be overlooked although they contain information that are valuable for the process of discovering business rules. This paper will propose an alternative approach to process mining in terms of using process designs as the mining resources. We propose a number of techniques for extracting business rules from repositories of business process designs or models, leveraging the well-known Apriori algorithm. Such business rules are then used as a prior knowledge for further analysing, verifying, …


Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou Jan 2010

Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou

Faculty of Informatics - Papers (Archive)

Random Testing (RT) is a fundamental software testing technique. Adaptive Random Testing (ART) improves the fault-detection capability of RT by employing the location information of previously executed test cases. Compared with RT, test cases generated in ART are more evenly spread across the input domain. ART has conventionally been applied to programs that have only numerical input types, because the distance between numerical inputs is readily measurable. The vast majority of computer programs, however, involve non-numerical inputs. To apply ART to these programs requires the development of effective new distance measures. Different from those measures that focus on the concrete …


A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin Jan 2010

A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin

Faculty of Informatics - Papers (Archive)

An image classification technique, which has recently been introduced for visual pattern recognition, is successfully applied for human gait classification based on radar Doppler signatures depicted in the time-frequency domain. The proposed method has three processing stages. The first two stages are designed to extract Doppler features that can effectively characterize humanmotion based on the nature of arm swings, and the third stage performs classification. Three types of arm motion are considered: free-arm swings, one-arm confined swings, and no-arm swings. The last two arm motions can be indicative of a human carrying objects or a person in stressed situations. The …


Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu Jan 2010

Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu

Faculty of Informatics - Papers (Archive)

The goal of federated identity management is to allow principals, such as identities and attributes, to be shared across trust boundaries based on established policies. Since current Single Sign-On (SSO) mechanism excessively relies on the specifications of Circle of Trust (CoT), the need for service collaboration from different domains is being addressed on CoT. For the motivating issue of the cross-domain SSO mechanism, we need an emergent dynamic trust list for calculating the trust parties, thus, the CoT specifications require an initial effort on enrolling members automatically to adapt to the dynamic open environment. In this paper, we propose a …


Implementing Reactive Bdi Agents With User-Given Constraints And Objectives, Aniruddha Dasgupta, Aditya K. Ghose Jan 2010

Implementing Reactive Bdi Agents With User-Given Constraints And Objectives, Aniruddha Dasgupta, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

CASO is an agent-oriented programming language based on AgentSpeak(L), one of the most influential abstract languages based on the beliefs-desires-intentions (BDI) architecture. For many applications, it is more convenient to let the user provide in real time, a more elaborate specification consisting of constraints and preferences over possible goal states. Then, let the system discover a plan for the most desirable among the feasible goal states. CASO incorporates constraints and objectives into the symbolic approach of reactive BDI model which lead to better expressive capabilities as well as more efficient computation. Jason is a fully-fledged interpreter for a much improved …


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Jan 2010

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Faculty of Informatics - Papers (Archive)

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


Soliton Steering By Longitudinal Modulation Of The Nonlinearity In Waveguide Arrays, Gaetano Assanto, Luis A. Cisneros, Antonmaria A. Minzoni, Benjamin D. Skuse, Noel F. Smyth, Annette L. Worthy Jan 2010

Soliton Steering By Longitudinal Modulation Of The Nonlinearity In Waveguide Arrays, Gaetano Assanto, Luis A. Cisneros, Antonmaria A. Minzoni, Benjamin D. Skuse, Noel F. Smyth, Annette L. Worthy

Faculty of Informatics - Papers (Archive)

We show how discrete solitary waves in one and two-dimensional waveguide arrays can be steered across the lattice via the introduction of a longitudinal periodic modulation of the nonlinear response. Through parametric energy transfer from the modulation to the solitary wave, the latter can increase its width and overcome the Peierls-Nabarro potential to propagate freely.


Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose Jan 2010

Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

In the health system inefficiency leads to poor use of scarce expensive resources. Lengthy patient treatment waiting time can result from inefficiency in scheduling. The use of state-of-the art multi-agent and distributed computing technologies can provide a solution to address this problem. However, distributed optimisation in such a multi-agent setting poses an important challenge that requires protocols to enable agents to optimise shared objectives without necessarily revealing all of their private constraints. In this study we show that if the problem is expressed as a Dynamic Distributed Constraint Optimisation Problem a powerful algorithm such as SBDO can be deployed to …


Finding Distinctive Facial Areas For Face Recognition, Ce Zhan, Wanqing Li, Philip O. Ogunbona Jan 2010

Finding Distinctive Facial Areas For Face Recognition, Ce Zhan, Wanqing Li, Philip O. Ogunbona

Faculty of Informatics - Papers (Archive)

One of the key issues for local appearance based face recognition methods is that how to find the most discriminative facial areas. Most of the existing methods take the assumption that anatomical facial components, such as the eyes, nose, and mouth, are the most useful areas for recognition. Other more elaborate methods locate the most salient parts within the face according to a pre-specified criterion. In this paper, a novel method is proposed to identify the discriminative facial areas for face recognition. Unlike the existing methods that only analyze the given face, the proposed method identifies the distinctive areas of …


Experimental Evaluation Of Ieee 802.11s Path Selection Protocols In A Mesh Testbed, Jerry Chun-Ping Wang, Brett Hagelstein, Mehran Abolhasan Jan 2010

Experimental Evaluation Of Ieee 802.11s Path Selection Protocols In A Mesh Testbed, Jerry Chun-Ping Wang, Brett Hagelstein, Mehran Abolhasan

Faculty of Informatics - Papers (Archive)

IEEE 802.11s is an upcoming standard that defines how wireless devices can interconnect in a multi-hop configuration. While there are several protocol stacks based on the IEEE 802.11s draft standard, there has not been a formal study or comparison examining their practical performance. This paper evaluates the routing performance of open80211s in a real-world mesh testbed. The experiments benchmark open80211s against two established network layer routing protocols - OLSR and B.A.T.M.A.N.. The experimental results show that open80211s does not outperform existing routing protocols in practice. This indicates that more design and development effort is required for IEEE 802.11s to yield …


Network Reconfiguration Using Psat For Loss, Essa-J-Abdul Zehra, Mahmoud Moghavvemi, Maher M.I. Hasim, Kashem Muttaqi Jan 2010

Network Reconfiguration Using Psat For Loss, Essa-J-Abdul Zehra, Mahmoud Moghavvemi, Maher M.I. Hasim, Kashem Muttaqi

Faculty of Informatics - Papers (Archive)

Network reconfiguration in distribution system is realized by changing the status of sectionalizing switches, and is usually done for the purpose of loss reduction. Loss reduction can result in substantial benefits for a utility. Other benefits from loss reduction include increased system capacity, and possible deferment or elimination of capital expenditures for system improvements and expansion. There is also improved voltage regulation as a result of reducing feeder voltage drop. Research work included by this paper focuses on using branch exchange method to minimize losses and solve the problems over different radial configuration. Solution’s algorithm for loss minimization has been …


The Detection Of Steam Injection Based On Video Surveillance, Yipeng Guo, Shu Wang, Ming Zhu, Jiangtao Xi Jan 2010

The Detection Of Steam Injection Based On Video Surveillance, Yipeng Guo, Shu Wang, Ming Zhu, Jiangtao Xi

Faculty of Informatics - Papers (Archive)

In this paper, we focus on the visual features of steam injection and propose an integrated algorithm to detect it based on video surveillance. The proposed method is depended on three decision rules which are the attribute of gray level and the feature of frequent flicker rate of steam injection, and the similarity structure between background image and current frame. The block-based approach is applied to all three decision rules. The experimental results show that the algorithm provides a reliable detection method which is useful in many cases such as the alarm on the leakage of a heating pipe.


The Electrical Performance Of Modern Compact Fluorescent Lamps, Sean T. Elphick, Philip Ciufo, Sarath Perera Jan 2010

The Electrical Performance Of Modern Compact Fluorescent Lamps, Sean T. Elphick, Philip Ciufo, Sarath Perera

Faculty of Informatics - Papers (Archive)

Compact Fluorescent Lamps (CFL) are highly non-linear devices which are likely to experience very high growth in penetration levels, especially in domestic environments, in Australia over the next 2 – 3 years. This will occur due to the decision taken by the Australian Federal Government to ban the sale of incandescent light globes after 2009 as measures towards meeting the needs for demand side management and climate change abatement. While CFL technology has been in existence since the late 1980s penetration levels are now increasing to a point where the total CFL load cannot be considered negligible compared to other …


Phase Transition On The Toeplitz Algebra Of The Affine Semigroup Over The Natural Numbers, Marcelo Laca, Iain F. Raeburn Jan 2010

Phase Transition On The Toeplitz Algebra Of The Affine Semigroup Over The Natural Numbers, Marcelo Laca, Iain F. Raeburn

Faculty of Informatics - Papers (Archive)

We show that the group of orientation-preserving affine transformations of the rational numbers is quasi-lattice ordered by its subsemigroup NN×. The associated Toeplitz C-algebra T(NN×) is universal for isometric representations which are covariant in the sense of Nica. We give a presentation of T(NN×) in terms of generators and relations, and use this to show that the C-algebra QN recently introduced by Cuntz is the boundary quotient of in the sense of Crisp and Laca. The Toeplitz algebra T …


Scale Loss And Mortality In Angled-And-Released Eastern Sea Garfish (Hyporhamphus Australis), Paul A. Butcher, Matt K. Broadhurst, Karina C. Hall, Brian R. Cullis, Robert G. Nicoll Jan 2010

Scale Loss And Mortality In Angled-And-Released Eastern Sea Garfish (Hyporhamphus Australis), Paul A. Butcher, Matt K. Broadhurst, Karina C. Hall, Brian R. Cullis, Robert G. Nicoll

Faculty of Informatics - Papers (Archive)

The eastern sea garfish (Hyporhamphus australis) is an endemic Australian marine teleost that is angled in large numbers throughout its distribution. Most fish are retained, although some are released, mainly because of size-grading in response to bag limits. Owing to their fragility, there are concerns that few released fish survive. To investigate this assumption, 185 angled and 90 control eastern sea garfish were released in groups of five into holding cages, then monitored for up to 24 h. One control and 93 angled fish died, providing an adjusted angled mortality rate of 49.2%. All fish that ingested their hooks (n¼7) …


Object Detection Using Non-Redundant Local Binary Patterns, Duc Thanh Nguyen, Zhimin Zong, Philip Ogunbona, Wanqing Li Jan 2010

Object Detection Using Non-Redundant Local Binary Patterns, Duc Thanh Nguyen, Zhimin Zong, Philip Ogunbona, Wanqing Li

Faculty of Informatics - Papers (Archive)

Local Binary Pattern (LBP) as a descriptor, has been successfully used in various object recognition tasks because of its discriminative property and computational simplicity. In this paper a variant of the LBP referred to as Non-Redundant Local Binary Pattern (NRLBP) is introduced and its application for object detection is demonstrated. Compared with the original LBP descriptor, the NRLBP has advantage of providing a more compact description of object’s appearance. Furthermore, the NRLBP is more discriminative since it reflects the relative contrast between the background and foreground. The proposed descriptor is employed to encode human’s appearance in a human detection task. …


Message From The Dean Of The Faculty, Philip Ogunbona Jan 2010

Message From The Dean Of The Faculty, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

The Faculty of Informatics at the University of Wollongong is proud to be co-hosting the 2010 IEEE International Symposium on Technology and Society. It is very fitting that this symposium is being held at the University of Wollongong where a purpose-built faculty has been created to educate graduates who will become leaders and provide technological solutions to the complex problems in the information and communication industry and society at large.


Human Detection Using Local Shape And Non-Redundant Binary Patterns, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona Jan 2010

Human Detection Using Local Shape And Non-Redundant Binary Patterns, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

Motivated by the advantages of using shape matching technique in detecting objects in various postures and viewpoints and the discriminative power of local patterns in object recognition, this paper proposes a human detection method combining both shape and appearance cues. In particular, local shapes of the body parts are detected using template matching. Based on body parts' shapes, local appearance features are extracted. We introduce a novel local binary pattern (LBP) descriptor, called Non-Redundant LBP (NRLBP), to encode local appearance of human. The proposed method was evaluated and compared with other state-of-the-art human detection methods on two commonly used datasets: …


Business Relationships In China: Lessons About Deep Trust, A. Kriz, Byron W. Keating Jan 2010

Business Relationships In China: Lessons About Deep Trust, A. Kriz, Byron W. Keating

Faculty of Informatics - Papers (Archive)

Trust is acknowledged as a central tenet of business relationships. Yet for all the attention it receives, rarely has trust been investigated in the Chinese business setting. This paper uses an emic approach to unearth some within- culture ‘truths’ about Chinese notions of trust in business exchange. The findings of this research suggest that deep trust (xinren), which is driven by reciprocal help and emotional bonding, is critical for doing business in China. A conceptual framework is provided to assist Western businesspersons to better understand the Chinese concept of trust as well as the interplay between its key antecedents.


Unpacking The Rfid Investment Decision, Byron W. Keating, Tim R. Coltman, Samuel Fosso Wamba, Valerie Baker Jan 2010

Unpacking The Rfid Investment Decision, Byron W. Keating, Tim R. Coltman, Samuel Fosso Wamba, Valerie Baker

Faculty of Informatics - Papers (Archive)

Mandates aside, there are many reasons why firms decide to move forward with or delay investment in RFID technology. In this paper we use a theoretically based, easy to implement methodology to empirically derive a relative importance scale of those factors that influence the decision to invest in RFID technology. More specifically, we compare the factors that matter most and least to a sample of firms that have adopted RFID technology with a sample of firms that have yet to embrace RFID technology. The theoretical and practical implications are that both RFID adopters and non adopters are driven by the …


Head-Tracking Haptic Computer Interface For The Blind, Simon Meers, Koren Ward Jan 2010

Head-Tracking Haptic Computer Interface For The Blind, Simon Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

In today’s heavily technology-dependent society, blind and visually impaired people are becoming increasingly disadvantaged in terms of access to media, information, electronic commerce, communications and social networks. Not only are computers becoming more widely used in general, but their dependence on visual output is increasing, extending the technology further out of reach for those without sight. For example, blindness was less of an obstacle for programmers when command-line interfaces were more commonplace, but with the introduction of Graphical User Interfaces (GUIs) for both development and final applications, many blind programmers were made redundant (Alexander, 1998; Siegfried et al., 2004). Not …


Unveiling The Potential Of Rfid-Enabled Intelligent Patient Management : Results Of A Delphi Study, S. F. Wamba, E. W. T. Ngai Jan 2010

Unveiling The Potential Of Rfid-Enabled Intelligent Patient Management : Results Of A Delphi Study, S. F. Wamba, E. W. T. Ngai

Faculty of Informatics - Papers (Archive)

Information technology (IT) in general, and radio frequency identification (RFID) technology in particular, are considered as key enablers of healthcare sector transformation in terms of better quality of care, improved patient management, and increased healthcare efficiency and effectiveness. There is, however, a shortage of studies on the impact of RFID technology on patient management-related processes. This study intends to fill this knowledge gap in literature by unveiling the potential of RFID-enabled intelligent patient management. Twelve patient management-related processes are identified, followed by the assessment of the impact of RFID on the said processes by a panel of experts using a …


Realigning Service Operations Strategy At Dhl Express, Tim R. Coltman, John Gattorna, Stuart Whiting Jan 2010

Realigning Service Operations Strategy At Dhl Express, Tim R. Coltman, John Gattorna, Stuart Whiting

Faculty of Informatics - Papers (Archive)

This paper describes the approach that DHL used to respond to aggressive revenue and profit targets set by its Asia-Pacific regional management board. DHL’s reaction to these targets was to redefine its strategic service vision by systematically aligning its internal support functions with distinct buyer behavior structures. Specifically, we developed a model based on the tangible and intangible factors that directly influence a customer’s choice of a third-party logistics provider. Next, we reverse engineered the service provider’s delivery system to align with each customer’s preferred buying behavior. DHL’s share of wallet and profitability immediately improved, enabling the company to maintain …


Dimensionality Reduction Using Compressed Sensing And Its Application To A Large-Scale Visual Recognition Task, Son Lam Phung, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Jie Yang Jan 2010

Dimensionality Reduction Using Compressed Sensing And Its Application To A Large-Scale Visual Recognition Task, Son Lam Phung, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Jie Yang

Faculty of Informatics - Papers (Archive)

This paper presents a novel algorithm for the dimensionality reduction which employs compressed sensing (CS) to improve the generalization capability of a classifier, especially for large-scale data. Compared to traditional dimensionality reduction methods, the proposed algorithm makes no use of the problem-dependent parameters, nor does it require additional computation for the eigenvalue decomposition like PCA or LDA. Mathematically, the derived algorithm regards the input features as the dictionary in CS, and selects the features that minimize the residual output error iteratively, thus the resulting features have a direct correspondence to the performance requirements of the given problem. Furthermore, the proposed …


On The Analysis Of Background Subtraction Techniques Using Gaussian Mixture Models, Abdesselam Bouzerdoum, Azeddine Beghdadi, Son Lam Phung, Philippe L. Bouttefroy Jan 2010

On The Analysis Of Background Subtraction Techniques Using Gaussian Mixture Models, Abdesselam Bouzerdoum, Azeddine Beghdadi, Son Lam Phung, Philippe L. Bouttefroy

Faculty of Informatics - Papers (Archive)

In this paper, we conduct an investigation into background subtraction techniques using Gaussian Mixture Models (GMM) in the presence of large illumination changes and background variations. We show that the techniques used to date suffer from the trade-off imposed by the use of a common learning rate to update both the mean and variance of the component densities, which leads to a degeneracy of the variance and creates “saturated pixels”. To address this problem, we propose a simple yet effective technique that differentiates between the two learning rates, and imposes a constraint on the variance so as to avoid the …


A Training Algorithm For Sparse Ls-Svm Using Compressive Sampling, Jie Yang, Son Lam Phung, Abdesselam Bouzerdoum Jan 2010

A Training Algorithm For Sparse Ls-Svm Using Compressive Sampling, Jie Yang, Son Lam Phung, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

Least Squares Support Vector Machine (LS-SVM) has become a fundamental tool in pattern recognition and machine learning. However, the main disadvantage is lack of sparseness of solutions. In this article Compressive Sampling (CS), which addresses the sparse signal representation, is employed to find the support vectors of LS-SVM. The main difference between our work and the existing techniques is that the proposed method can locate the sparse topology while training. In contrast, most of the traditional methods need to train the model before finding the sparse support vectors. An experimental comparison with the standard LS-SVM and existing algorithms is given …