The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Knowledge Heterogeneity is the source of Knowledge Collaboration in Enterprise while the Virtual Practice Community constructed with Web 2.0 technology is a very important way to gain heterogeneous knowledge. Active Cross-border Innovation makes the virtual practice community to be heterogeneous knowledge preference nowadays. However, the appropriate degree of knowledge heterogeneity that can excite...
In this paper we show that a minimal state space realisation in Jordan canonical form for linear continuous-time systems described by rational transfer function could be obtained in a natural and basic way by using the concept of Nerode equivalence. whilst the state space realisation is known, the contribution of this note is that the proposed realisation procedure is directly introduced and not like...
Object proposal, typically served as preprocessing of various multimedia applications, aims to detect the bounding boxes of possible objects in an image. In this paper, we propose a novel object proposal method for RGB-D images based on layered edges, which can effectively eliminate the influence of the mixture of edges from objects and background and improve the accuracy of proposals. Firstly, we...
It is of great significance to choose the adaptive parameters of bistable system which not only ensure the phenomenon stochastic resonance can take palace but make the performance of the output signal optimum. In this paper, A precise parameter-tuned stochastic resonator (PSR) is proposed to improve the receiving performance of binary pulse amplitude modulated (BPAM) signal at low signal-to-noise...
This paper addresses formal safety verification issue of hybrid systems which resort either state-driven or time-driven strategies. Modeling hybrid systems as linear hybrid automata, we provide a formal method for safety verification by constructing barrier certificates whose existence guarantees the soundness of safety specifications. Barrier certificates for safety of state-driven hybrid systems...
With the goal of relieving the workload of pathologists, recently, the development of computerized approaches for gastrointestinal (GI) bleeding detection in wireless capsule endoscopy (WCE) videos has become an active area of research. Existing methods suffer from either low diagnostic accuracy or high computational cost. In this paper, we present an automated bleeding detection strategy that first...
In this paper, the synthesis of sum and difference patterns for monopulse antennas with steering invariant constant beamwidth is considered as an optimization problem, which is solved by a genetic algorithm (GA). The key of the proposed method is to find an optimal set of amplitude excitation using genetic algorithm for sum and difference beam simultaneously, which satisfies the desired half power...
Cyber security has been heavily studied in both industry and academia, but the traditional security technology is still facing unprecedented challenges in the background of massive and complicated network traffic. Game theory as a mathematical model of conflict and cooperation between intelligent rational decision-makers has great potential to improve cyber security. This paper describes a focused...
Malicious software poses a major threat to network security. The sheer volume of it is growing at an exponential pace. Researches have shown that the majority of new malicious samples are just variations of encountered malicious software. Therefore, similarity analysis has been put forward as an effective way to counteract the enormous new instances. Through measuring the similarity degree among instances,...
Online product recommendations (OPRs) which include provider recommendations (PRs) and consumer reviews (CRs) are widely used in electrical environment to enhance customer loyalty. In this paper, the consumer shopping efficiency consists of screening efficiency and evaluation efficiency while the products are also classified as search products and experience products. We extend a rich theoretical...
The quality-of-service (QoS) is a common focus which users and service providers pay close attention to at present. For service providers, it is one of their main targets to find the optimal QoS strategy based on user preferences. However, because of the fuzziness of user preferences and the complexity of service environment, searching an optimal service strategy becomes a difficult problem. In the...
Conventional iris recognition requires controlled conditions (e.g., close acquisition distance and stop-and-stare scheme) and high user cooperation for image acquisition. Non-cooperative acquisition environments introduce many adverse factors such as blur, off-axis, occlusions and specular reflections, which challenge existing iris segmentation approaches. In this paper, we present two iris segmentation...
Structure coverage driven test generation is the key approach for automatic testing at source code level. However, the defect detection ability of the generated test cases should be carefully evaluated since the correlation between coverage and test effectiveness is in doubt. In this paper, we propose a test generation approach based on mutation testing with the intent to derive test cases towards...
There is a trend in increased social involvement in software development process. Facilities supporting distributed software development and management have become a common practice in the community. Public involvement is further promoted by the incorporation of the social network features brought about by GitHub. The "following" and "watching" mechanisms,...
Lack of flexible and cost-effective fault tolerance mechanism is one of major obstacles for enhancing availability and efficiency of cloud application systems. We propose a novel fault tolerance as a service scheme, where cloud applications utilize suitable fault tolerance service as specific added services, such as the live migration of virtual machines, software rejuvenation, and real-time failure...
The integration of formal methods and requirements analysis increases the dependability of safety-critical systems. However it is still very difficult to obtain all of the safety requirements in practice, and formally construct the safety requirements model as well. In this paper, we propose an approach to capture safety requirements and formally describe them by classifying and developing safety...
Telemetry data, containing the data of multiple subsystems such as power system, implies the on-orbit operation status information of the satellite. We can obtain performance characteristics and fault symptom of the satellite subsystems through analyzing these data. Using classification algorithm we can provide normal data for anomaly detection and find the data from various subsystems which have...
In this paper, a novel patch-wise visual saliency model based on Minimum Length Description (MDL) principle is presented. Visual saliency is measured as the unpredicted information of image patch through an order-adaptive predictor under MDL principle. Specifically, each image patch is estimated with a linear combination of several neighboring patches. The number and location of candidate patches...
A speed estimation method for induction motors based on Strong Tracking Extended Kalman Filter (STEKF) is proposed in this paper, implementing optimization of speed sensorless vector control. With this method, the fading factor is introduced into the covariance matrix of the predicted state, which forces the residual sequences orthogonal to each other and tunes the gain matrix online. The estimation...
In this paper, we would investigate a wheel-knife module with feedback torque signal for generation six to eight flat panel cutting. The system of the investigated wheel-knife module was designed by using the servo type because thus type had the following figure merits. (1) The servo type could proceed with the stable cutting motion and its cutting depth would have a uniform value. (2) When the cutting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.