The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Algorithm Scientific Software Integration and System Transition Team (ASSISTT) at NESDIS STAR (National Environmental Satellite Data and Information Service, Center for Satellite Applications and Research) has designed, developed and implemented a Near Real-Time (NRT) processing system to process algorithms for scientists and other stakeholders. The system generates products using the STAR Algorithm...
Pattern recognition (PR) based myoelectric hand control has become a research focus in the field of rehabilitative engineer and intelligent control. However, the state of the art method is hardly adopted for clinical use because of signal interfered by shift, fatigue and user-unfriendly of retraining. The aim of this study is to evaluate the performance of different kinds of online algorithms in classifying...
Star sensor could work independently ignoring the outside interference, but the disadvantages of star sensor are low output frequency and the limitation in cloudy or rainy day. SINS/CNS integrated navigation system exactly makes up for the deficiencies. However, the practical environment of the surface ship with SINS/CNS integrated navigation system is complicated. It will make the star spots in the...
Many recent studies on fault localization based on program slicing have mainly focused on static slicing techniques, while the research on fault localization using dynamic slicing tool is insufficient. One reason is that dynamic slicing tools are less available than static ones. In our paper, we present the use of the dynamic slicing tool, JSlice, which is a dynamic slicing tool available for Java...
This article investigates the cooperative H∞ filtering problem of multi-agent systems. The filter input consists of relative states among neighboring agents and the individual states of a few agents. A topology graph is applied to represent the communication links among agents. The filtering error system is composed of the original system state, filter system state and the estimation error of relative...
Protocol feature words are byte subsequences within traffic payload that can distinguish application protocols, and they form the building blocks of many constructions of deep packet analysis rules in network management, measurement, and security systems. However, how to systematically and efficiently extract protocol feature words from network traffic remains a challenging issue. Existing n-gram...
Combinatorial encryption algorithm is advanced. Combinatorial encryption method makes use of the variety of ordinal in universal combination code. Firstly, the theory of universal combinatorial coding is expatiated. Secondly, researches are done in combinatorial encryption characteristic, key generating method, encryption and decryption algorithms. At last, key space is analyzed. Combinatorial encryption...
Protocol feature words are byte subsequences within traffic payload that can distinguish application protocols, and they form the building blocks of many constructions of deep packet analysis rules in network management, measurement, and security systems. However, how to systematically and efficiently extract protocol feature words from network traffic remains a challenging issue. Existing approaches...
SOA migration is a complicated task. To ensure the migration performance, some directions on modeling migration approaches are needed. A user-oriented SOA migration model is proposed in this paper. The model is defined as a 6-tuple. The detailed descriptions on each tuple are addressed. Especially, the concrete algorithm on matching scheme and final SOA migration scheme are provided. The model can...
There are overshoot critical shock not high precision problems at the strip of correction work, the parameters repeated is debugging dull. This paper presents the design and simulation of intelligent PID corrective control algorithm based on MATLAB, achieving the optimization of control parameters and simulation auhentication algorithm application efficiency and control precision are improved.
AprioriAll and AprioriSome are very famous algorithms for mining sequential patterns, which are used to find motifs on a fixed min-support number. In this paper, we contribute a new algorithm that can find all motifs on any min-support numbers.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.