The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet banking has become one of the most profitable e-commerce applications in the last decades by providing advantages for both customers and the bank. However, there is still a large group of customers refusing to use this service. So it is necessary to explore the reasons that influence customer acceptance of Internet banking service. Based on the TAM, this study integrates trust perception...
This paper addresses the problem of distributed source coding (DSC) of binary sources with unknown varying correlation statistics over erasure channels. We propose an adaptive asymmetric Slepian-Wolf (SW) decoding scheme using particle-based belief propagation (BP) based on Raptor codes. We show through the experiments that the proposed algorithm can simultaneously reconstruct the compressed sources...
This paper investigates the control algorithm of an exoskeleton for hand rehabilitation, which accomplishes both active and passive rehabilitation training. In the passive mode control the PID control algorithm is executed in the velocity mode of the driver. In the active mode control, control architecture is proposed to deal with in both free space and constraint space. A resistance compensation...
In this paper we propose an adaptive Wyner-Ziv (WZ) coding scheme for non-binary correlated sources with side information at the decoder. At the encoder, a low density parity check (LDPC) code is employed to implement Slepian-Wolf (SW) coding for each bit-plane independently. The joint "source-channel" decoder, which combines SW decoding and dequantizing in a single step, preserves the symbol-domain...
The construction of new countryside is a complicated systematic project, and evaluation of new countryside construction is a basic work of developing a new countryside development strategy, guiding new countryside health and harmonious development. This paper applies factor analysis, takes comparative evaluation of new countryside among Liaoning province regional, and provides countermeasures to the...
This paper addresses the problem of Ranking Internet service quality by taking a machine learning approach using multiple service features. Ranking helps find good services for applications that use services as building blocks. Unlike other ranking problems, the goodness of Internet service qualities is dependent upon multiple key features. The key features vary across different service categories...
Entrepreneurial network plays an important role in entrepreneurship activities. In recent years, entrepreneurial network becomes hot spot in the area of Entrepreneurship. With the support of “social network theory”, “social exchange theory” and “social cognitive theory”, entrepreneurial network research has been developed to micro-and macro-levels gradually. The purposes of this paper is to analyses...
The nonlinear model predictive control method is applied to design emergency voltage controller. Based on quasi-steady-state approximation, the receding dynamic optimization model is established which subjected to differential-algebraic equations with continuous-discrete time variables. To enhance computational efficiency and control precision of solving this dynamic optimization model, direct dynamic...
This paper presents a multi-bit discrete time sigma-delta converter for orthogonal frequency division multiplexing ultra wide band systems adopted by IEEE 802.15.3a and ECMA368 standard. An intact scheme of timing synchronization algorithm is also proposed for the receiver. The overall sigma-delta converter consists of two modulators. The low and high subbands of signal are operated by using third-order...
An optimized architecture is proposed for real-time automatic cloud detection system with Spectrum and Texture Analysis Combination (STAC) approach. The STAC approach is hard to be implemented in hardware, for the calculation of fractal dimension (FD) and angle second moments (ASM) of the approach consumes large computation time and hardware resources. By optimizing the calculation process of the...
A multi-bit discrete time sigma-delta converter for an orthogonal frequency division multiplexing ultrawideband system has been designed. The overall sigma-delta converter consists of two modulators. The low and high subbands of signal are operated by using third-order low pass and fourth-order band pass modulator respectively. A simulation has been designed to realize the system with the converter...
The robust stabilization of switched systems with nonlinear disturbance and its application are studied, and the sliding mode control theory is applied to the controller synthesis. The reduced-order sliding mode dynamics and a sufficient condition of its stability are given by introduce a linear transformation. Moreover, the switching law is chosen and a sliding mode control law is synthesized based...
A novel antibacterial material (P-PET) was prepared by immobilizing ε-polylysine on polyethylene terephthalate (PET) nonwoven fabrics in this study. Surface modifications of the fabric were performed by chemically modified procedure: creating carboxyl groups onto PET surface, grafting coupling agent and immobilizing the ε-polylysine. Scanning electron microscopy (SEM) was used to analyze the surface...
Security proof of practical quantum key distribution with finite resources has attracted a lot of attentions in recent years. We give a security analysis about finite resources QKD in this paper, our method is much simper comparing with previous security analysis in finite resources case,the simulation result shows that the security analysis is reasonable in practical QKD realizations with finite...
The magnetic fields due to different planar Halbach permanent magnet (PM) array, including the 4 piece square array, stretched 8 piece square array and trapezoid array, are studied by analytic calculation method and FEM. On this basis, the magnetic forces over the magnet weight per array unit area are obtained. Then comparisons of above results indicate that the trapezoid array can provide the maximum...
A major difficulty that plagues the practical use of Slepian-Wolf coding (and distributed source coding in general) is that the precise correlation among sources need to be known a priori. To resolve this problem, we have proposed an adaptive asymmetric Slepian-Wolf decoding scheme using particle filtering based belief propagation in our recent work. In this paper, we extend the adaptive scheme to...
In conventional influence diagrams, the numerical models of uncertainty and imprecise knowledge from large-scaled data set is involved in the systems, the suitability of probability distributions is questioned. The influence diagrams model based on rough sets are proposed in this paper. In the framework, the causal relationships among the nodes and the decision rules are expressed with rough set theory...
A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this paper. The techniques of the quantum router, optical switch and trusted relay are assembled here to divide the seven-user network into a four-node backbone net, a two-user subnet and a single-fiber access link. Secure keys distributed in this network can be utilized to encrypt...
This paper develops a multi-objective optimization model for the passenger train stopping scheme on high-speed railway lines. Minimizing the stopping times for all passenger trains, minimizing travel distance of empty trains and minimizing the number of transfer passengers are the three planning objectives of the model. For a given travel demand and specified capacity of stops, the model is solved...
How to use the POLSAR data to classify and interpret the conditions of the earth is a very important research field of POLSAR. In this paper, we propose an improved algorithm on the basis of studying and analyzing some common algorithms. This technique introduces the fisher criterion in the feature selection and the hierarchical method in the classification of POLSAR image, which can improve Lee's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.