Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
It is difficult to locate the single-phase-earth fault in neutral ineffectively grounded systems, because the fault current is weak. Aimed at this problem, this paper proposes a new fault section location method based on the relative entropy degree. The proposed method computes the relative entropy degree of every feeder section, and then determines the state of the sections. For the faulty section,...
DDoS attacks bring huge threaten to network, how to effectively detect DDoS is a hot topic of information security. Currently, there are some methods designed to detect DDoS attacks, but the detection rate of them is low. Moreover, DDoS detection is easily misled by flash crowd traffic. In this paper, a new method to detect DDoS attacks based on RDF-SVM algorithm is proposed. By considering the importance...
Based on the analysis of the surface characteristics of solar cells, solar cells surface defects detection scheme based on machine vision is proposed. It is compared between the pefect solar cell and the battery to be detected, and then surface defects is analyzed. The first, the contours tracking is realised, and the defects of the cells, such as holes, fragments and breakage are determined. Secondly,...
Some enterprises would place their core business system in the enterprise network and cut off the connection with the external network, in order to prevent network attacks from outside. Enterprises often need to move business data from the external network to the enterprise network. There will be needs of across-network transmission. In this paper, a one-way transmission technology in network isolation...
To solve the problem of multi-UAV collision avoidance, propose the solution framework of multi-UAV collision avoidance based on the reinforcement learning. Firstly, four elements of state space, action space, the environment model and return value in the multi UAV cooperative collision avoidance problem were analyzed in depth. For the environment model, modeling it from two aspects of the UAV dynamic...
Active shape model is widely used for facial feature localization. Regarding the traditional ASM algorithm can't describe the object shape precisely, an improved ASM algorithm is proposed. At first, we establish shape model and use PCA (Principle Component Analysis) to transform high-dimensional data to lower dimensions. Another work is to establish local texture model giving sample points with different...
Neural network based deep learning algorithm is a study hotspot in artificial intelligence. Moreover, embedded artificial intelligence and mobile computing are becoming more and more important in industry. For these applications, not only high performance computing is required, but also low power consumption restriction cannot be ignored. DSP has special hardware architecture with characteristics...
Fast and robust 3D reconstruction of facial geometric structure from a single image is a challenging task with numerous applications, but there exist two problems when applied "in the wild": the 3D estimates are unstable for different photos of the same subject; the 3D estimates are over-regularized and generic. In response, a robust method for regressing discriminative 3D morphable face...
For applications in robot manipulate with object, get the pose of objects is very important for controller's subsequent operations, especially in PCB feeding and blanking field, the grasp success rate will be enhanced if robot can get a exact pose of objects that relative to end manipulator. So in this paper we utilize the CNN model to build on a neural network for 3 tasks: object recognition, location...
In recent years, the statistical inference and algorithm for the complex diffusion process of incomplete data have become a hot topic that scholars of probability and statisticians are concerned with and calls for further study. Based upon the all-directional, multi-angle random dynamic information flow research, this article expands the information flow research in the ordinary information space...
Analyzed the principle of single camera stereo vision sensor based on the two plane mirrors. Established the measurement model of three-dimensional points, calibrated the internal and external parameters, and the corresponding experiment has been done. Compared the results got by the method in this paper with the one got by the traditional two cameras stereo vision sensor, the experimental results...
This paper presents a rapidly and lower neural networks to treat those waste water index that is difficult to be measured. Model called soft sensor is composited two parts: one is used to estimate the principal linear output, the other one is used to adjust estimated error to obtain better accuracy. Selection of features that effects greatly computation scale and predict accuracy is discussed also...
With he rapid development of the mobile Internet industry, information security based on trusted computing is also becoming increasingly serious. Considering that most of the existing research is based on the static security measure, and based on the server and PC side, a security operation environment measurement framework based on mobile terminal is proposed in this paper to alleviate the information...
Viterbi algorithm (VA) applied to time frequency (TF) distribution is a highly performed instantaneous frequency (IF) estimator, but it suffers from switch problem (SP) at the intersected points of multi-components on the TF plane. In order to suppress the SP in VA, an improved VA (IVA) in this paper assumes the IF variation trends between two adjacent IF points are not large, then a new penalty function...
For safe and reliable operation of lithium-ion batteries on electric vehicles (EVs), the online monitoring and states estimation of the batteries is necessary. To make it convenient for every vehicle owner to monitor the battery status of their vehicles anytime and anywhere, we designed a real-time Android-based monitoring system for lithium-ion batteries on EVs, which achieves an integration monitoring...
A method for fault location based on correlative characteristic values (CCVs) in resonant grounded system is presented. In this method, zero-sequence current signals of two different data windows are extracted for each feeder terminal unit (FTU) after a single-phase-to-ground fault occurs. Then, their correlation coefficient which is called CCV of each FTU is calculated. Furthermore, CCVs of all FTUs...
In view of the shortcomings of the traditional clustering algorithm in intrusion detection system, this paper proposes a method of selecting the initial clustering center based on density, which can overcome the problem of K value in ordinary K-Means. The improved intrusion detection model can achieve good clustering effect. Compared with the traditional K-Means, it is found that the improved algorithm...
Aimed at abnormal score from evaluation experts, real data from Shanghai double-blind sampling system of graduate dissertation and thesis between 2013 and 2014 have been in depth analysis and mining. Some basic judgment rules of abnormal score are summed up, and monitoring model for abnormal score is proposed. By the least squares method and the multiple regression models, the equation of monitoring...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.