Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Recently, an efficient damped pseudo transient analysis method was proposed to find DC solutions for nonlinear circuits. However, the simulation efficiency is still not satisfactory. In this paper, for different kinds of circuits, we get some groups of PTRAN algorithm control parameters values by using a parameter optimization algorithm for pseudo-transient analysis to obtain higher efficiency during...
In this paper, a new type of TSP, i.e. PTSP (Polymorphic Traveling Salesman Problem) is proposed. The problem is discovered from the research of scan field route optimization. As for PTSP, every node is polymorphic, which means each node can have several states, but obtains only a determined state in a determined loop, moreover a path which connects a pair of nodes can be different and have different...
In order to improve localization accuracy in mobile sensor network, based on quadratic programming-unscented Kalman filter (QP-UKF) and multidimensional scaling-MAP (MDS-MAP) methods, this paper studies node localization in mobile sensor networks. First, from the perspective of wireless sensor network overall localization, a nonlinear dynamic relative motion model for sensor network units is established...
Digital-analog hybrid simulation method combines the advantages of both real-time digital simulation and physical simulation, and will be an effective means for the simulation and analysis of future power system. However, the ideal transformer model (ITM), as the most widely used interface algorithm, is easy to encounter instability issues. A novel impedance compensation algorithm based on ITM is...
This paper presents three implementation algorithms of compound elements pseudo-transient analysis to find DC solutions for nonlinear LSI circuits. In former researches, CEPTA was implemented in SPICE-like simulator with the merits that the size of Jacobian matrix is not expanded during the calculation. While the inserted pseudo parts are converted to some certain equivalent circuits, the conventional...
Improved the traditional L-K algorithm by lifting the wavelet multi-resolution algorithm, and the tracking speed of system was greatly enhanced while combined with SURF matching algorithm. On the basis of detecting feature points, reduced the probability of the exterior points. Tracking local feature points by multi resolution wavelet Pyramid optical flow algorithm solved the problems of object deformation,...
Large scale monitoring systems require reliable and efficient routing protocols used to overcome the limitations introduced by battery operated embedded devices, among which, energy consumption is considered the main concern. This topic has gained a lot of interest in the last decade. Due to numerous advantages, clustering is becoming more prevalent as a routing technology in WSN. This paper describes...
In this paper we investigate how different randomization approaches influence the success of horizontal DPA attacks. We use our own ECC design to run the experiments. We applied the following randomization techniques: EC point blinding, key randomization and a combination of both. Our experiments demonstrate the fact that these well-known randomizations of processed data are not effective against...
Real-time Compressive Tracking (CT) uses the compression sensing theory to provide a new research direction for the target tracking field. The algorithm is simple, efficient and real-time. But there are still shortcomings: tracking results prone to drift phenomenon, cannot adapt to tracking the target scale changes. In order to solve these problems, this paper proposes to use the Kalman filter to...
When clustering incomplete datasets, data on cluster border (border data) are more likely to be misclassified. Aiming at this problem, the proposed algorithm focuses on the re-classification of “suspected misclassified” border data (abbreviated as SM border data). Based on the preliminary clustering results of classical FCM-based algorithm for incomplete data and the KNN (k nearest neighbor) principle,...
Adaptive beamforming plays an important role in smart antenna systems. Nonblind adaptive algorithm utilizes the known training sequence to update the weights of antenna array at the cost of low transmission efficiency. Without sending training sequences, blind adaptive algorithm is a solution to implement beamforming and increase the transmission efficiency. Two classic blind algorithms are studied,...
Large scale monitoring systems require reliable and efficient in-network information extraction mechanisms able to effectively track events at the field level. The study of consensus algorithms for distributed data processing has gained a lot of interest in the last decade. Average consensus algorithms used for decentralized sensor fusion in wireless sensor networks, iteratively compute the global...
Orthogonal frequency division multiplexing with index modulation (OFDM-IM), which uses the indices of activated subcarriers to carry additional information bits, is a novel multicarrier transmission technique. In this paper, a profile-based power management relying on maximal minimum Euclidean distance (MED) criterion is proposed. Moreover, a low-complexity subset searching method based on the normalized...
Depth information affects greatly the accuracy of image measurement, 3D reconstruction and image recognition. In general, the methods of obtaining depth information are from 3D laser scanners, structured light, and depth cameras. The traditional method using binocular camera to obtain the depth information of images is based on the disparity between the left and right views, but it also brings some...
Cloud computing has emerged as a powerful and elastic platform for internet service hosting, yet it also draws concerns of the unpredictable performance of cloud-based services due to network congestion. To offer predictable performance, the virtual cluster abstraction of cloud services has been proposed, which enables allocation and performance isolation regarding both computing resources and network...
To address power-thermal-dark silicon issues in many-core chip, run time task-resource and voltage co-allocation with reconfigurable network-on-chip (NoC) framework for energy and hotspots minimization is proposed in this work. At runtime, the global manager with the help of proposed MinEnergy mapping algorithm reconfigures the NoC links bandwidth and nodes voltage-level and power-gated the resources...
Organizations often share business data with third-parties to perform data analytics. However, the business data may contain a lot of customers' private information. One major concern of these organizations is thus to ensure such private information is properly used. In this paper, we present PSpec, a formal language for specifying data usage restrictions in distributed data analytics. Compared with...
This paper considers the problem of improving the convergence rate for multi-agent consensus via a community detection algorithm used to divide the single layer topology into layers of connected subgraphs. This divided topological graph maintains the constraints of the original topological graph. Combining with the consensus protocol, community detection algorithm improves the convergence rate of...
Independent vector analysis (IVA) has exhibited promising applications to complex-valued fMRI data, however model order effects on complex-valued IVA have not yet been studied. As such, we investigate model order effects on IVA using 16 task-based complex-valued fMRI data sets. A noncircular fixed-point complex-valued IVA (non-FIVA) algorithm was utilized. The model orders were varied from 10 to 160...
With the development of computer network technology and popularization, and the technology of data acquisition, data management and data query develop rapidly. People who is in the surging "data ocean", need an intelligent technology badly, to "explore" more valuable "oil "from the "data ocean",so the data mining technology which has been successfully used in...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.