The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the Internet of Things, smart things communicate with each other, and sensed data are aggregated and queried for satisfying certain requests of end-users. Wireless sensor networks (WSN) is a key enabling technique for achieving the vision of the Internet of Things. In real applications of WSN, such as environmental monitoring and vehicle tracking, they may require to launch spatial queries for...
This paper presents a novel method for feature description based on intensity order. Specifically, a Local Intensity Order Pattern(LIOP) is proposed to encode the local ordinal information of each pixel and the overall ordinal information is used to divide the local patch into subregions which are used for accumulating the LIOPs respectively. Therefore, both local and overall intensity ordinal information...
A method is developed in this paper to reconstruct triangular surface meshes from a bunch of contours. Contours on adjoining slices are decomposed into contour pairs with simple topologies according to the definition of contour distance. Based on the idea of simple constrained triangulation, an revised algorithm is applied for contour pair triangulation and meshes generation. The method presented...
The vulnerability is property that the structure and function of system are easy to be destroyed after certain external disturbances. The status of vulnerability study on water resources system at present has been pointed out. A new vulnerability assessment index system has been established. A fuzzy clustering method is used to evaluate the vulnerability classification of water resources system. An...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.