The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The dual-drive H gantry is widely used in many industrial processes that require high precision Cartesian motion. The conventional rigid-link version suffers breaking down of joints if any de-synchronization between the two carriages occurs. To prevent above potential risk, a novel biaxial gantry with flexure-links is designed to allow a small rotation angle of the cross-arm. Nevertheless, the chattering...
The weapon target assignment (WTA) problem is a fundamental problem arising in defense-related applications of operations research. The multi-stage weapon target assignment (MWTA) problem is the basis of the dynamic weapon target assignment (DWTA) problem which commonly exists in practice. The MWTA problem considered in this paper is formulated as a multi-objective constrained combinatorial optimization...
Dialogue state tracking (DST) is a process to estimate the distribution of the dialogue states at each dialogue turn given the interaction history. Although data-driven statistical approaches are of most interest, there have been attempts of using rule-based methods for DST, due to their simplicity, efficiency and portability. However, the performance of these methods are usually not competitive to...
This paper proposes a novel approach to separating background (BG) and foreground (FG) traffic based on periodicity analysis. As BG traffic is commonly periodically generated by applications, this trait is leveraged to effectively detect BG traffic. Concretely, the Period Candidate Array (PCA) approach is proposed to extract only necessary information from long and sparse traffic flows, hence quickly...
With the unified and strong smart grid construction by State Grid Corporation of China, information security protection architecture is facing new challenges. The characteristics of smart grid such as informationization, automation, and interaction, have enhanced the two-way interaction between grid and consumers. The design method of information security protection architecture in U.S. Smart Grid...
When Solid state drives began to enter our life and gradually became the mainstream device in the storage industry. Some issues incur the people attention in pursuit of optimal performance. This paper proposed an on-chip SRAM-based FTL design to improve the efficiency of the SSD random write and reduce the amount of erasure operations. By simulation experiments of SSDsim, we demonstrated the efficiency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.