The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently convolutional neural networks (CNNs) have essentially reached the state-of-the-art accuracies in image classification and recognition. CNNs are usually deployed in server side or cloud to handle tasks collected from mobile devices, such as smartphones, wearable devices, unmanned systems and so on. However, significant data transmission overhead and privacy issues have made it necessary to...
A variety of applications (App) installed on mobile systems such as smartphones enrich our lives, but make it more difficult to the system management. For example, finding the specific Apps becomes more inconvenient due to more Apps installed on smartphones, and App response time could become longer because of the gap between more, larger Apps and limited memory capacity. Recent work has proposed...
LDPC still receives extensive attention in the field of channel coding because of its superior error correction performance, high throughput and low decoding complexity. Considering the poor adaptability and limited expansibility of traditional LDPC decoder, a design method of LLR-BP decoder based on adaptive code length is proposed. A partial parallel LDPC decoder structure is designed under the...
Estimating and measuring building height has become one of the significant factors in urban planning, legal and illegal construction inspection, urban disaster warning and assessing, as well as providing initial mapping data for creating three dimensional (3D) digital city models. In this paper we examine the feasibility of extracting building height information using computer vision algorithms with...
Laser pulses of LiDAR are able to penetrate forest canopy and characterize the vertical structure distribution. Forest canopy cover (CC) can be estimated from normalized point cloud (NPC) and canopy height model (CHM). Unmanned aerial system (UAS) LiDAR usually transmits laser pulses with wider scan angles, which would decrease the probability of penetrating through canopy and lead to overestimate...
The existing LDPC encoder exists the problem of high computing complexity and much resources consumption, therefore, a strategy of LDPC fast encoding based on dynamic memory structure of linked list queue is proposed in this paper. Specifically, this strategy simplifies the design of encoder by making full use of the characteristics of the parity check matrix structure and sparsity. On the basis of...
In this paper a method was demonstrated that GF-1 multi-spectral and MODIS multi-temporal NDVI data were integrated for forest land cover classification. The test site is located in the central of the Xiaoxing'anling region in Heilongjiang province where covered the area of one scene of GF-1 image. The random forests algorithm was adopted to select the best features automatically which contains spectral,...
This paper presents a multiscale entropy (MSE) based complexity analysis of surface electromyography (sEMG) signals recorded from quadriceps for assessing muscle fatigue induced by increasing load cycling. Ten male undergraduate students were recruited to perform cycle ergo meter experiment with 5 step increasing load from 50 Watts to 200 Watts. The last 5 seconds sEMG signals for each load were acquired...
This paper presents a memory hierarchy with the support of network-on-chip (NoC) for MPSoC systems. The memory hierarchy consists of a shared global memory and private local memories. Each core in the system is equipped with two local memories, one for instructions and one for data. Those local memories are connected through a NoC for efficient data communication. We tested two different settings...
Physically unclonable functions (PUFs) have been a hot research topic in hardware-oriented security for many years. Given a challenge as an input to the PUF, it generates a corresponding response, which can be treated as a unique fingerprint or signature for authentication purpose. In this paper, a delay-based PUF design involving multiplexers on FPGA is presented. Due to the intrinsic difference...
Physically unclonable functions (PUFs) have been a hot research topic in hardware-oriented security for many years. Given a challenge as an input to the PUF, it generates a corresponding response, which can be treated as a unique fingerprint or signature for authentication purpose. In this paper, a delay-based PUF design involving multiplexers on FPGA is presented. Due to the intrinsic difference...
Cloud computing, a delivery of computing as a service mainly implying how to use utilities in our context, can be provided either at infrastructure, platform or software levels. The Desktop-as-a-Service (DaaS) paradigm, derives from the software level Software-as-a-Service (SaaS) paradigm, is drawing increasing interest because of its transformation from desktops into a cost-efficient, scalable and...
In recent years, unconventional emergency exploded frequently, and had shown the complexity and enormous destruction, and other significant characteristics. It had a great impact on people's daily life and social security and stability. Humans lack of adequate cognition of what kind of event state, the possibilities of its appearance and its harm degrees. The traditional "prediction-response"...
Emergency management of unconventional events is a great challenge to all levels of government. This challenge comes from the high-uncertainty, the high-destructive and high-urgency of “unconventional” and “unexpected” events, which make it difficult to deal with. According to the features and evolution mechanism of emergency, this paper constructs a preparation system of emergency. The preparation...
“Scenario-Response” is regarded as the most effective unconventional emergency management method. As unconventional emergency is dynamic event, at different stages for different emergency conditions, a different contingency plan should be applied. In this research, we choice the combination unconventional emergency response program based on real-time information, data mining, forecasting and scenario...
One of the biggest challenge in emergency management is how to deal with the incomplete, contradict and fuzzy information. This paper reviews related work and develop a framework for heterogeneous information integration in emergency management. A high-level data integration module in which heterogeneous data sources are integrated and presented in a uniform format is also described. Furthermore,...
A data aggregation scheme based on identity is proposed which utilizes the public-key cryptography to realize the negotiation of session keys. The solution uses small- sized seed matrix to generate a mass of public/private key pairs thus consumes little storage space. It realizes the identity authentication independent of the third party and has no use for infrastructure to sustain the key distribution...
XTR is an excellent public key system that is suitable for variety of environments. XTR can achieve the same communication and security advantages at a much lower computational cost because of small keys and fast key selection. The computation of Sn(c) given c is an important algorithm in XTR. This paper suggests an improved algorithm to compute Sn(c). The new algorithm can improve the computational...
This paper indicates that value creation is the core of business model design, according to literature review and case analysis of novelty-centered business model of IKEA. What's more, it shows that novelty-centered business model, based on the value co-creation, can satisfy both demands of the enterprises and the customers, to improve business performances effectively, and ultimately obtain a sustainable...
The indigenous innovation can enhance technology ability and ensure firm's sustainable development. We establish a conceptual model based on the relationship among globalization, market factors, technical factors and indigenous innovation. We use the cross case analysis of Chinese mobile phone industry and telecom equipment industry to demonstrate the model. In words, this article has some reference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.