The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The relationship between internet and human life is becoming much more close than ever before. At the same time, Modern enterprise cooperate with each other in the form of technical collaboration is becoming a common mode of production and will be a crucial mode in the future. With the rapid development and popularization of internet, the scope of collaboration is more and more wide, such as across...
Road congestion has troubled hundreds of thousands of drivers for a long time. In recent years, an application named dynamic routing, in which vehicles reroute themselves around congested areas with road information received, is proposed to deal with traffic jam. Due to lack of trust for traffic information data in vehicular ad hoc networks (VANETs), malicious vehicles can easily disseminate false...
Road congestion has troubled hundreds of thousands of drivers for a long time. In recent years, an application named dynamic routing, in which vehicles reroute themselves around congested areas with road information received, is proposed to deal with traffic jam. Due to lack of trust for road information in vehicular ad hoc networks (VANETs), malicious vehicles can easily disseminate false road information...
Most of simulation is based on ideal situation, but the real logistics system is complex and variable. Multi-resolution modeling can meet needs of different environments on the simulation, and adapt to the diversity, from different angles and aspects of simulation modeling. Based on the research of MRM, the method of aggregation and disaggregation is analyzed, the paradigm of aggregation and disaggregation...
Video-based face recognition has been one of the hot topics in the field of pattern recognition in the last several decades. In this paper, we put forward a novel method, which is named as V-LPP. Our method uses Locality Preserving Projections (LPP) to recognize video-based face sequence, so it can discover more space-time semantic information hidden in video face sequence, simultaneously make full...
Video-based face recognition has been one of the hot topics in the field of pattern recognition in the last few decades. In this paper, incorporating Support Vector Machines (SVM) and Locality Preserving Projections (LPP), we propose a novel semi-supervised face recognition algorithm for video, which can discover more space-time semantic information hidden in video face sequence, simultaneously make...
We present a novel general framework for distributed anomaly detection. In the framework, normal behavior is first learned from data from individual data sites using standard anomaly detection algorithms and then these models are combined when predicting anomalies from a new data set. We have investigated seven semi-supervised anomaly detection algorithms for learning normal behavior, as well as proposed...
In this paper we use software engineering methods and Shannon's communication model to investigate computer network architecture. We get a new type of computer network architecture and some significant conclusions. At the first phase of the life cycle of software engineering, that is, requirement analysis, we get a series of unexpected conclusions. For example, a variety of computer network architectures...
This paper analytically derives closed-form expressions of the uplink received-signal's polarization-parameterized spatial-correlation-coefficient functions across the basestation antenna-array's spatial aperture, based on a geometrical model of idealized spatial relationships among the transmitter, the scatterers, and the receiving antennas. The derived formulas fit well with some empirical data.
Outlier detection over data streams has attracted attention for many emerging applications, such as network intrusion detection, web click stream and aircraft health anomaly detection. Since the data stream is likely to change over time, it is important to be able to modify the outlier detection model appropriately with the evolution of the stream. Most existing approaches were using incremental or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.