The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the use of license plate recognition technology in traffic monitor has attracted a lot of attention because it can be used in a smart city to do criminal investigation and traffic detection. License plate recognition technology has been widely used in parking lot management systems which has fixed shooting angle and lighting environments. The license plate recognition used in traffic...
This paper focuses on relay selection, subcarrier selection and power allocation (PA) in two-hop multi-relay networks in frequency-selective (FS) fading channel. The multiple relays adopt amplify-and-forward (AF) protocol and are subject to an aggregate power constraint. In order to maximize the instantaneous information rate of the system, both parallel mode (all the relays transmit signals simultaneously)...
This paper proposes a computation complexity reduction algorithm for region-of-interest (ROI) based H.264 encoding. Smaller partition is preferred in both higher visual quality and ROI situation so that inter mode selection is applied according to the ROI based quality difference. An unequal coding efficiency degradation scheme is proposed according to the unequal bits allocation in ROI based video...
Region-of-interest (ROI) can be applied in H.264 video encoder to enhance subjective quality and reduce computation complexity. For the aiming application of low cost hardware real-time encoder in videophone with faces as ROI, this paper proposes a face detection algorithm to detect each macroblock (MB) as one part of a face or not. This face detection algorithm has a unique estimation-and-verification...
To increase both the capacity and the processing speed for input-queued (IQ) switches, a fair scalable scheduling architecture (FSSA) has been proposed. By employing FSSA comprised of several chips of cascaded sub-scheduler, a large-scale high performance network scheduler can be realized without the capacity limitation of monolithic device. In this paper, we present an improved scheduling algorithm...
Support vector data description (SVDD) has become a very attractive kernel method due to its good results in many novelty detection problems. Similar to the support vector machine (SVM), the decision function of SVDD is also expressed in terms of the kernel expansion, which results in a run-time complexity linear in the number of support vectors. For applications where fast real-time response is needed,...
Attack graph plays an important role in network security, as it directly shows the existence of vulnerabilities in network and how attackers use these vulnerabilities to implement an effective attack, the analysis on the attack graph or the simulation of dynamic attacks through attack graph can help us easily find out the vulnerabilities in network, and take corresponding security measures, in order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.