The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless power transfer (WPT) systems are suitable for applications such as integration of Electric Vehicles (EV) with the utility grids. However, physical misalignments between the magnetic couplers are unavoidable and can introduce variations in self-, leakage- and mutual-inductances, which invariably detune the compensation networks employed by the transmitter and receiver of a wireless power transfer...
Coverage-based fault localization techniques leverage coverage information to identify the suspicious program entities for inspection. However, coincidental correctness (CC) widely occurs during software debugging, and brings negative impact to the effectiveness of CBFL techniques. In this paper, we propose a regression approach to identity CC execution with weighted clustering analysis. Based on...
The features of SIFT are widely used in image matching because of it's invariantion to images scale and rotation, but 128-dimensional description of the feature point reduce the efficiency of the algorithm. This paper presents an improved algorithm of SIFT, using ring and sequence of each feature vector to ensure rotation invariance while reducing the description of operator dimension and using traversal...
Memory detection computation, data intensive applications, demands large computing resources. Mainframes are usually used to accelerate its computation. However, this solution seems to be costly. In this paper, we present an alternative approach of using desktop grid, using PC computers' idle CPU time, to realize parallel processing of memory detection. In order to demonstrate the effectiveness of...
Software aging refers to the phenomenon that the performance degradation, increasing failure rate or massive resource usage demonstrated in long-running software systems such as web servers. It was reported that software aging has a significant relationship with resource usage. To study the software aging phenomenon in web servers, we built an experimental platform with a server and multiple clients...
The feature extraction is the most critical technology of text categorization. The method of feature extraction from Chinese text based on CILIN is different from the conventional feature extraction, which uses two feature extraction methods. This method is good at dealing with synonyms and polysemes, and reducing the dimension. Firstly, it uses the method of feature extraction from Chinese text based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.