The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new feature representation method for scene text recognition problem, particularly focusing on improving scene character recognition. Many existing methods rely on Histogram of Oriented Gradient (HOG) or part-based models, which do not span the feature space well for characters in natural scene images, especially given large variation in fonts with cluttered backgrounds. In this work,...
Light field photography, which has recently drawn considerable attention, provides novel functionalities such as refocusing and depth estimation at the same time. However, the resolution of the rendered refocus image is incomparably lower than the number of light ray samples in the light field. In this paper, we show that super-resolution can be performed to bridge the gap and that deconvolution,...
X-ray imaging is an efficient tool for health inspection. The energy of received X-ray could reveal the density inside human body and be represented in an X-ray image. In general, the bright regions of an X-ray image are of interest since most important matters compactly locating in those regions. However, the low contrast property of the bright regions makes inspectors hard to tell the details. Hence,...
The applications of 2.5D/3D IC integration have been increasing in recent years, which enable high-density and heterogeneous ICs that can be assembled in one package using through silicon interposer (TSI). In this paper, the integration study of interposer in backside via reveal (BVR) process, various bumping volume and stacking reliability were introduced. Different sizes of solder bump forms on...
Inspired by the migration behaviours of eels, we propose a new discrete eel swarm intelligence algorithm in this paper. First, this paper analyzes the behaviours of eels, then establishes a mathematical model of the important behaviour being extracted. Based on rational organization of three important behaviours of eel, namely concentration adaptation, neighbourhood learning and gender mutation, the...
We present a novel algorithmic approach to track multiple cell junctions automatically in the developing epidermis of the C. elegans embryo. 3D cell boundaries are projected into 2D for segmentation using active contours with a non-intersection force, and subsequently tracked using SIFT (Scale-Invariant Feature Transform) flow. Our method achieves MAD (Mean Absolute Distance) less than 3 pixels between...
This paper proposed a novel and simple sinusoidal boost-flyback continuous conduction mode (CCM) converter. This converter continuously produces half-sinusoidal voltage to a line frequency DC-AC inverter. This simple boost-flyback structure utilizes a coupled inductor to achieve a wider voltage gain range. The leakage inductance energy of the coupled inductor can be recycled to reduce the voltage...
In order to solve the problem how to determine the index weights in Topsis, we put forward a method based on the theory of grey correlation to determine the index weigh, combined with Topsis, construct a weighted Topsis model by using grey incidence degree, and make use of the calculation steps of weighted Topsis model, then prove the effectiveness of this method by the example selected from the best...
In this talk, the recent research advances in channel characteristic measurement, IC design etc. for the newly proposed millimeter wave high data rate wireless communication standard Q-LINKPAN or IEEE802.11aj (45GHz) are reviewed.
On the April 20th, 2013, Lushan Ms 7.0 earthquake caused large-scale secondary geological disasters including landslides and avalanches, which led to many roads interrupted and barrier lakes formed in some rivers. Due to the main earthquake fault is characteristic of thrust movement, secondary geological disasters are distributed in the upper plate, for example in Shuangshi Town, Taiping Town and...
In this paper, a novel parametric prosody coding approach for Mandarin speech is proposed. It employs a hierarchical prosodic model (HPM) as a prosody generating model in the encoder to analyze the speech prosody of the input utterance to obtain a parametric representation of four prosodic-acoustic features of syllable pitch contour, syllable duration, syllable energy level, and syllable-juncture...
The risk of information system is influenced by both attackers and defenders, so it is reasonable to consider the behaviors of both sides. In this paper a Risk Prediction Model based on Bayesian Game (RPM-BG) is proposed. And an improved revenue calculation method is presented, which analyzes the counterattack and takes the cost parameters and benefits parameters into account at mean time, therefore...
Currently most robust fuzzy rough classifiers with parameters focus on the robustness and less-sensitiveness to noise. No work studies or even discusses about the topological structure of robust fuzzy rough classifiers. This paper finds that the robust rough classifier satisfies a nested topological structure, and then NESTED CLASSIFIER, which reflects the classifier on different parameters, is proposed...
Because of the reduction of wire length, three-dimensional integrated circuit (3D IC) technology can improve the circuit speed and reduce the power dissipation. However, the heat generated by the stacked layers may result in a very large amount of temperature rise. Therefore, in the design of three-dimensional integrated circuit, it is very important to reduce the temperature rise. Although previous...
In this paper, we focus on recovering a 3-D depth map from a single image. Given an image of urban scene, we extract linear perspective information to establish the 3-D scene model. Unlike approaches which use only occlusion relationship between objects to estimate the relative depth of the image, we further combine the perspective geometry information with the occlusion relationship between objects...
In this paper, a power allocation algorithm is proposed for multiuser MIMO-OFDM femtocell networks on downlink, where an objective considers the maximization of the SINR of a macro user that is near the femto base station. Since the macro and the femto base stations share the same spectrum, there is a co-channel interference problem. We propose a power allocation method based on genetic algorithms...
Recent research supports the notion that word learning can be conceptualized as a statistical learning process. As many have noted however, statistical learning is constrained by processes such as attention and memory. In the current study, we observed, through toddler-perspective head cameras, toddlers' visual input as parents labeled novel objects during an object-play session. We then analyzed...
A key component of the human visual system is our attentional control — the selection of which visual stimuli to pay attention to at any moment in time. Understanding visual attention in children could yield new insight into how the visual system develops during formative years and how their visual attention and selection play a role in development and learning. We use head-mounted cameras to record...
In this paper, an efficient implementation of the Chase II soft-input/soft-output (SISO) decoder using the distance-based decoding algorithm is proposed, where a piece-wise-linear based method is proposed to simplify the calculation of the extrinsic values. As a demonstration, a (64; 51; 6)2 block turbo decoder is implemented. Compared to the DBD-based decoder presented in the previous literature,...
First, we prove that a homomorphic encryption with a function of detecting zero, detecting equality, comparing the value or detecting overflow on cipher texts is not secure if there is no restriction to limit the times of operating these functions. Then we analyze that a homomorphic encryption scheme can still detect zero with some restrictions. If we allow all the people to detect zero on cipher...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.