The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a knowledge driven economy information plays an important role. Different entities of society are seeking varied information on a day to day basis. In every walk of life decision makers are taking decisions after careful analysis of relevant information. Hence quality of decisions eventually depends upon quality of information. With the advent of Internet technology the population of online information...
This paper present a convenient method for estimating the trifocal tensor corresponding to three images acquired by 3 cameras and 10-15 point projecting devices. A set of virtual 3D points are made by the laser pointers which are projected onto the working volume by turns. Its images are corresponding points naturally, found with sub-pixel precision. Then the trifocal tensor is computed via rank-4...
Air conditioning (AC) system is a nonlinear, asynchronous and uncertain natured system. In this paper a fuzzy discrete event systems (FDES) is introduced in the research of air conditioning control. A fuzzy automaton for air conditioning system is given. A modeling method is proposed and a control model has been set up for the air conditioning system. Cost optimization is based on set up priorities...
In order to generate high precision registration for airborne video with or without GPS data, this paper presents a new robust method to remove matching failures fast. Rather than registering each frame of the video sequence individually, which is popular in existing applications, our predicted progressive sample consensus (P-PROSAC) algorithm firstly predicts a movement model of camera from previous...
With the rapid development of electric undertaking and the expansion of town scale, ultra-high voltage (such as ac 1000 kv, dc 800 kv) power transmission lines are coming to our lives. And with the development of ultra-high voltage power transmission line, the ultra-high voltage transformer substation will appear in the place with dense population and the electromagnetic pollution of this transmission...
In modern Collaborative Manufacturing, different security mechanisms of systems bring usage complexities and security risks. Grid Security Infrastructure (GSI) enables secure authentication and communication over computer networks. It is designed and developed on the technology of Java GSS-API, JAAS, Kerberos. The key technologies such as integrating with application server are specially discussed...
WiMAX is one of the most promising technologies for broadcast wireless communication and based on the IEEE 802.16 standards. The WiMAX networks support high speed transmission. But some hardware design, such as the IQ (inphase quadrature) imbalance due to direct conversion in RF front-end, limits their throughput. This problem is especially serious in high-order modulation. Most current papers of...
An ideal measure of global functioning for patients with dementia would discriminate at very high and very low levels of functioning and would have linear measurement properties such that a given change in score corresponds to the same amount of change in underlying ability at any part of the ability continuum. Using item response theory methods, linearity of test measurement can be directly assessed...
An approach of implementing time-domain real-time convolution processor into multi-chip FPGA hardware platform is stated and the application of the convolution processor in radar echo signal simulator is introduced. With high speed input data flow, the algorithm of parallel-decomposition and coefficient-partitioned convolution is proposed to meet the real-time requirement. With the decomposition of...
A new method without complex parameter estimate and independent reference source signal was proposed to remove power line interference. The theory of nonnegative matrix factorization (NMF) and the evaluating criteria of similar coefficients and signal to interference ratio (SIR) were used to remove power line interference. Meanwhile, by employing the principle of blind source separation (BSS) and...
In order to mimic complex real-life systems, in this paper, we propose evolving small-world networks based on the modified BA model. In the process of network evolution, the links among the new nodes at each time step are involved, which is different from the classic BA model. The simulation results show our model exhibits the small-world property and the scale-free structure. Since most real networks...
This paper analyzes grid resources organization, elaborates on the fundamental principles of the ant colony algorithm, and proposes a grid resource discovery method based on the ant colony algorithm. We consider users request ontology as ants, take search resource as food, and food source is the node of search target. The process of ants to find food is similar to the process of discovery grid resources.
Characteristics of streaming media service is different from the traditional networked services, e.g. web service, which makes designing the request distribution strategy face additional challenges. By exploiting the high skewness in streaming media access pattern, a variable-duration time-window based scheduling strategy is proposed for clustered streaming media systems, and it can help to improve...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption, which combines traditional pubic key encryption (PKE) with identity-based encryption (IBE) while preserving most of the advantages of each, such as no private key escrow and less PKI infrastructure. In this paper, we propose the security notion of certificate-based signcryption and present a concrete certificate-based...
Grid Computing aims to allow unified access to data, computing power, sensors and other resources through a single virtual laboratory. The development or adaptation of applications for Grid environments is being challenged by the need of scheduling a large number of tasks and resources efficiently. The general problem of optimally mapping tasks to machines in a heterogeneous computing suite has been...
In order to conquer the major challenges of current Web document clustering, i.e. huge volume of documents, high dimensional process, we proposed a simple agglomerative hierarchical k-means clustering (SAHKC) algorithm based on H-K (hierarchical k-means) algorithm, and a new model was used in this paper to describe the Web document, named as multiple feature vector space model (MFVSM). Experimental...
The precision of machine vision calibration is affected by those factors such as the loss of depth information, distortion of camera lens, and errors caused by image processing. In this paper machine vision system is developed by means of BP neural network with self- learning. There are 4 inputs, which are the image coordinates of a match point in left and right camera, and 3 outputs in the network...
Itpsilas a new data business to realize high-speed data transmission over broadcast channel by using traditional broadcast station. To complete this function must rely on the realization of wireless high-speed modem. This paper introduced the character of FX919B and choice of some parameter. It particularly narrated circuit design and programmer about the application of FX919B. This chip realized...
This paper proposes a novel quick development framework based on process/data relationship model (PDRM). With support of PDRM, requirement is described and refined, then transformed into prototype that can provide lively experience for customers, making customers probe system and discover deficiency as early as possible. Once deficiency is discovered, customers can amend requirement and rebuild PDRM,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.