The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The current entity recommendation based on social network is the research hotspot. Moreover, social network entity recommendation currently is one of the main problems of social network analysis. Recommendation system has been widely researched at present, and some typical recommendation methods are applied effectively in the practical application. However, the traditional recommendation methods based...
This paper studies the problem of reconfigurable fault tolerant controller design for linear time-invariant systems with measurement unavailability based on a complete parametric approach. The attention is focused on completely recovering eigenvalues of the pre-fault system by resynthesizing an output feedback controller while the restrictions on assignable eigenvalues of existing results are overcome...
In many areas of computer architecture design and program development, the knowledge of dynamic program behavior can be very handy. Several challenges beset the accurate and complete collection of dynamic control flow and memory reference information. These include scalability issues, runtime-overhead, and code coverage. For example, while Tallam and Gupta's work on extending WPP (Whole Program Paths)...
The aim of an automatic video-based facial expression recognition system is to detect and classify human facial expressions from image sequence. An integrated automatic system often involves two components: 1) peak expression frame detection and 2) expression feature extraction. In comparison with the image-based expression recognition system, the video-based recognition system often performs online...
This paper proposes an approach of recommending micro-learning path based on improved ant colony optimization algorithm. Micro-learning is a new learning style, which can be used to support learning in short time because of its micro-learning units. Each micro-learning unit consists of a small knowledge unit that can be learned at fragmented time. Meanwhile, micro-learning is more flexible than other...
Building energy consumption increases with the acceleration process of urban constructions. The city faces the problem of energy shortage, which leads to the building energy efficiency becoming an urgent need for the global environment. BIM (Building Information Modeling) technology has been widely used in the construction industry. The current building energy consumption calculation depending on...
This tutorial will present two tools that can be integrated into a secure software development approach, as well as describing how custom tools can be built utilizing the same underlying tool platform.
Sea clutter is the backscattered returns from a patch of the sea surface illuminated by a radar pulse. An efficient computational electromagnetic (CEM) method based on ray tracing algorithm and a time-frequency analysis method are applied to simulate and analyze the sea clutter from wind-driven sea surface and breaking waves. First, the three dimensional (3-D) time-evolving sea surface is geometrically...
Feature extraction is an important concept in digital image processing, the extraction of the characteristic quantities directly affect the recognition rate of the image. Loeal Binary Pattem is a theory which is simple but useful ealculating method of texture algorithm. In this paper,taking wood defects as research objects,and extracting the LBP texture feature of dedect images. Using BP neural network...
Weighing method and video monitoring method are currently adopted to monitor icing condition on transmission lines. However, monitoring range of these methods is limited, and these methods need to install active sensing devices and wireless communication devices which may fail to work due to some factors such as atrocious weather, inadequate power supply. Nowadays, distributed optical fiber sensing...
The application of BIM (Building Information Modeling) technology in practical engineering becomes more and more frequent. The current research on quantity calculation based on BIM discusses the cost estimation of the building projects. There are few methods that can query construction quantity during the design process which facilitates the designer to modify the relevant data at any time. In view...
Link similarity is widely applied in measuring the similarity between objects, e.g., web pages, scientific papers and social networks. However, there are a lot of drawbacks in existing methods of measuring link similarity. In brief, these methods can not handle some semantic-similar content. Moreover, the computation of them are not accurate in some scenes. In this paper, we present a novel method...
Dynamic binary translation serves as a core technology that enables a wide range of important tools such as profiling, bug detection, program analysis, and security. Many of the target applications often include large amounts of dynamically generated code, which poses a special performance challenge in maintaining consistency between the source application and the translated application. This paper...
In view of the characteristics of vehicular sensor networks (VSN), a hybrid logical topology based on directed diffusion (HLT-DD) is presented. In the HLT-DD topology, every roadside-node or vehicle-node is assigned a local cluster gradient value and a data aggregating gradient value according to its position and the directed diffusion mechanism. With the help of the local cluster gradient value of...
This paper proposes a data flow migrating optimization scheme for CDN system in wireless network. NAT device is introduced as proxy to help CDN mirror supporting mobility functions which are not supported originally. And a virtual IP scheme is also designed to decouple the position and content so that the session can be migrated over different mirrors and user can obtain the data from the nearest...
IPv6-to-IPv6 network address translation provides a new mapping mechanism to design a NAT in IPv6. In order to solve the translation problem of IPv6 addresses with different length prefixes, a new IPv6-to-IPv6 Network Address Translation method is proposed in this paper, which is called Partial-state Asymmetric NAT (PANAT). With PANAT, it is able to provide application independent translation methods...
A Bi-iteration model is proposed to accurately solve the composite electromagnetic (EM) scattering problem of a three-dimensional (3-D) geometrically arbitrary object above a two-dimensional (2-D) rough surface. Two iteration processes are involved in this model. Iterative physical optics (IPO) which calculates the EM scattering from the rough surface is named as inner iteration. While for the EM...
Aiming to find the Doppler spectra of a flying target at low altitude above a sea surface, an iterative hybrid method is employed to solve this complex composite 3-dimensional (3-D) electromagnetic scattering problem. This method calculates electromagnetic (EM) scatterings of the target and the sea surface separately, and then the mutual EM coupling effects are added through an iterative process....
This paper presents a review for Distributed Mobility Management (DMM). Mobility Management is one of the key technologies in Mobile Network. DMM can solve the problems of traditional Centralized Mobility Management (CMM) such as non-optimal route and single point of failure and attack. There are several DMM approaches in recent researches. Some are based on MIP and some on PMIP. We summarize and...
After several years of practice, IPv4/IPv 6 transition is proved to be a long term evolution, for the reason that the backbone network, service providers and the large number of users all require a lot of upgrades on both software and hardware. Thus, the IPv4/IPv6 coexistent state is inevitable. This paper mainly discusses mobile Internet transition. To address this issue, the paper chooses DNS64...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.