The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper reports a 3.0 THz detector which can detect the terahertz wave radiated by a quantum cascade laser (QCL) working at pulse mode. The detector was implemented in a 65 nm silicon CMOS process. The chip size is 1.5×l.5 mm2 including bonding pads. THz detector using FET is based on plasma wave theory proposed by Dyakonov and Shur which allows detection of THz radiations far beyond the FET devices...
In this paper, we investigate a weakly-supervised object detection framework. Most existing frameworks focus on using static images to learn object detectors. However, these detectors often fail to generalize to videos because of the existing domain shift. Therefore, we investigate learning these detectors directly from boring videos of daily activities. Instead of using bounding boxes, we explore...
We report temperature-dependence and temporal stability studies of AlxIn1−xAsySb1−y-based avalanche photodiodes (APDs). Multiplication gain and breakdown voltage of AlxIn1−xAsySb1−y APDs have shown low gain-temperature coefficients for a wide range of temperature.
Energy storage system (ESS) are playing a more important role in renewable energy integration, especially in micro grid system. In this paper, the integrated scheme of energy storage system is designed. And a demonstration project of 1MWh energy storage power station which was accessed to a photovoltaic system was built. The structure of the storage system was given. Two control strategies of the...
It is promising for service robots to be able to accomplish natural language tasks given by human automatically. In this paper, we propose a flexible framework, which is aimed at resolving Chinese service tasks into executable sequences of primitive actions. Firstly, we collect a number of service tasks described in free-form Chinese natural language. We then build the intelligent space corpus by...
In this paper, the suboptimal control problem is addressed for a class of discrete time-varying systems subjected to the stochastic communication protocol (SCP). The measurements provided by the sensors are transmitted through the communication channel and then fed into the controller. The SCP is utilized to select the sensor getting access to the communication media. In presence of the nonlinearities,...
Objective: This study aimed to explore and compare the effects of augmented reality (AR) and virtual reality (VR) on induced anxiety in set-up scenes for claustrophobia treatment and determine which device functions better. Methodology: Healthy individuals were selected as subjects. During the experiment, the AR and VR scenes were introduced in sequence. The social anxiety scale was assessed after...
The object of this paper is to propose a new method to measure driver's preview time by field tests. 17 drivers, male and female are included, with different driving experiences were recruited to execute simulator tests along a 21-km winding road. The data of driver, vehicle, road, and traffic environment were recorded. The characteristic of driver's eye movement was investigated for each driver....
Large-scale disasters (such as earthquake, flood, tornado) may cause severe network failures, leading to massive disruptions and data loss. Particularly, the aftermaths of disasters may further threaten the residual network and impact the existing/survived service connections. In this paper, we study a reliability based restoration scheme for recovering the impacted (disrupted and/or reliability-decreased)...
Signal detection, especially the blind detection in non-cooperative systems is an essential topic in the field of communication. Time-frequency analysis is a commonly used method which aims to construct a density function of time and frequency to reveal the frequency components in signals and the evolution of the frequency of signals with time. In this paper, the template matching method is applied...
In view of the influence of Non-Line of Sight (NLOS) in wireless localization, an improved TDOA localization algorithm based on wavelet transform is proposed. In order to eliminate the NLOS error, this algorithm uses wavelet transform to decompose and reconstruct the signal, and then re-uses the Chan algorithm to estimate the localization of mobile station. Based on the classical wavelet thresholding...
Hyperspectral anomaly detection is playing an important role in remote sensing field. Most conventional detectors based on the Reed-Xiaoli (RX) method assume the background signature obeys a Gaussian distribution. However, it is definitely hard to be satisfied in practice. Moreover, background statistics is susceptible to contamination of anomalies in the processing windows, which may lead to many...
Wavelength-division-multiplexing (WDM) optical networks as the most promising telecom backbone are facing critical threaten from large-scale disasters, such as earthquake, tsunami, hurricane, and human attack. Disasters may cause severe damage to network components (links/nodes) and drastic traffic fluctuations in post-disaster phases, leading to resource crunch. In this paper, we study optimal traffic...
Effective segmentation of symptoms from crop diseased images is a vital important step in the timely detection of crop disease based on image processing techniques. Many of the formerly proposed methods still did not show a satisfactory performance in the extraction of symptoms from RGB images, especially when the images contain specularly reflected and shadowed parts. In this paper, we propose a...
Provable Data Possession (PDP) schemes which are vital to data-oriented mobile cloud computing security architecture enable users to check the integrity of their data in the cloud efficiently. Due to the limitation of storage space and computing power of the mobile terminals, a new identity-based proxy signature multiple-file data integrity verification scheme called Identity-Based Proxy Signature...
This paper addresses the observer-based composite control problem for a class of delta-domain LQ games with disturbances in both finite- and infinite-time horizon. In the presence of the disturbances, the Nash Equilibrium (NE) is revisited, and the scalar ε is proposed to describe the deviation of NE in such noise environment. A composite control strategy integrating the observer-based control and...
Scene parsing is an important task in computer vision and many issues still need to be solved. One problem is about the non-unified framework for predicting things and stuff and the other one refers to the inadequate description of contextual information. In this paper, we address these issues by proposing a Hierarchical Deep Probability Analysis(HDPA) method which particularly exploits the power...
Phase-shifted fiber Bragg grating (PS-FBG) inscription in nonphotosensitive single mode fiber (SMF) by the fusion splicing technique and femtosecond laser is reported. Two SMFs are fusion spliced to introduce a refractive index modulation point which acts as a phase shift, then exposing the fusion spliced fiber with femtosecond laser and a uniform phase mask. Two dips can be observed in the transmission...
In this brief, an efficient approach using extreme learning machine (ELM) is first proposed for the behavioral modeling of radio frequency power amplifiers (RF PAs). As a single-hidden layer feedforward neural network algorithm, ELM offers significant speed advantages over conventional neural network learning algorithms. Compared to the existing behavioral modeling based on ANN, the proposed method...
As, a kind of sulfur antioxidant, dibenzyl disulfide (DBDS) generally exist in the mineral insulating oil, which can improve the oxidation stability of oil. However, DBDS can also lead to corrosion problems of transformer oil. To investigate the effect of the corrosive action and the antioxidant action of DBDS on the oil-paper insulation, oil samples with different DBDS concentration (0–200mg/kg)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.