The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The information superiority of equipment support exercise examination is an important direction of equipment support drill and other military training examinations. Based on the analysis of content of equipment support drill examination based on information system, the examination and evaluation index system of equipment support is proposed and planed.
This paper introduced the composition of Airborne dispenser, utilizing Monte Carlo test and compatibility test to obtain Airborne dispenser's bombing ranges with equal precision. The Airborne dispenser's hit accuracy was assessed by using simulation. Interference model of mathematical simulation and calculation method of miss distance, and then set up mathematical simulation's test project. According...
A detailed design scheme of SCA-based communication system is introduced. The system architecture, software platform, hardware platform and design guides are then de scribed. After analyzing the characteristics of ad-hoc network, a design process of application waveforms and components of SCA-based ad-hoc network is proposed. The ad-hoc network radio is based on GPP+DSP+FPGA hardware architecture,...
Based on the background of WiFi-based Ad-hoc network, four route protocols are simulated using OPNET plat form. Experimental result shows that AODV protocol has a better performance than other algorithms under the circumstance of high throughout and heavy burden. To meet the communication requirement of vehicle-borne Ad-hoc network under battlefield circumstance, a ne w cluster route protocol (CRP)...
With the development of the Internet and technology, the trend of the intelligentization to the both ends of net is becoming more and more obvious. Cloud computing obtains rapidly develop and increasingly mature because of the powerful computing and storage capacity. While, the intelligent terminal equipment has a fast development, which outstanding express in stronger processing, popularization and...
Because it requires less change frequency of heading angle, path planning is a special and crucial issue to autonomous underwater vehicles in contrast to robot in land. The solution described in this paper firstly employs global path planning based on geometric method, then carries out local path planning based on one new artificial field potential function, which uses sector as the parameter. In...
Based on the standard FA easily traps in a local optimum, this paper presents a method that the current particle choose the one in its visual field which has the best fitness as the global best particle. The experiment shows the advantaged algorithm has a better global search ability. The paper uses the advantaged FA into the group animation, the particle has good artificial intelligence performance,...
Through the analysis of flowers pattern, firstly this paper abstracts the needed patterns and uses the genetic algorithm to generate new pattern so as to found a colorful pattern. And then through the analysis of the flowers pattern, it selects and assembles the various patterns automatically to create lots of different styles of the art patterns which can also be manually changed according to the...
The reproduction of flight path during the aircraft approach and landing phase is an important part of flight unsafe incidents investigation. This article gives a method of extracting and processing flight parameter aiming at the problem that flight record data has a poor integrality, high rate of change and is hard to generated by flight path directly in that phase. In this article the airport environment...
Vehicle monitoring technology based on the video image due to its features of easy maintenance and easy implement is concerned in recent years. Vehicle tracking is one of the key technologies to achieve video vehicle monitoring. How to achieve real-time vehicle tracking is the key and difficult problem at home and abroad. A method of Kalman tracking based on virtual loop is proposed in the paper....
In this paper, we present efficient schemes to utilize multiple frames that contain the same text to get every clear word from these frames. Firstly, we use multiple frame traction to reduce text detection false alarms. And then detect and joint every clear text block from those frames to form a clearer integration frame. Later we uses Otsu threshold method to generate a binary text image. Finally,...
In this paper, a comparative study with three support vector machines (SVM) classifiers was carried out. The input images were first preprocessed to form the candidate text string regions. Next, Based on different features sets extracted by different methods, three SVM classifiers are used to analyze the textural properties of text and classify the text and no text strings in video frames. Then, a...
This paper presents an approach to extract building region in an image with complex scene. The algorithm highlights the edge characteristics of the target in image pre-processing step, uses the improved Hough transform line detection algorithm and the line optimization algorithm to keep the effective straight-line segments. Then it clusters the dominant hues of each effective segment's surrounding...
A new color image watermarking algorithm with resistance to JPEG lossy compression based on quantization index modulation (QIM) is proposed in this paper. As it is known, QIM method can achieve a good balance between the embedding bit rate, robustness and distortion between the original image and the composited image by modulating the source signal into different clusters. The corresponding DCT coefficients...
A new public watermarking algorithm for RGB color image based on quantization index modulation (QIM) is proposed in this paper. The similarity of the corresponding coefficients produced by discrete cosine transform (DCT) of each red, green, blue channel shows that the margins of the corresponding coefficients of any two selected from the three color channels have proper distribution to be the signal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.