The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an improved fuzzy enhancement algorithm for the moving object detection and tracking. A new membership function is proposed based on the theory of fuzzy sets, which improves the traditional Pal-King fuzzy enhancement algorithm and overcomes the loss of gray information after the processing of enhancement. Since a gray image with multiple targets need more than one crossover...
Text analysis is the front-end of a TTS system, which has a great influence on the naturalness of the back-end speech synthesis. Statistical parametric speech synthesis is being commonly applied into speech synthesis now, and gradually becoming an important method of the current speech synthesis, however, the research of front-end text analysis is often overlooked in the process of current Tibetan...
Higher standards have been placed on the flexibility and accuracy of characteristic detection methods of voltage flicker characteristics due to sporadic flicker disturbances. S-transform as a tool of signal analysis has been limited in practical application because of the fixed shape of its Gaussian window function. Some existing modified S-transform algorithms have demonstrated increased adaptability...
Binary k-out-of-n system is a commonly used reliability model in engineering practice. Many researches have extended the concept of k-out-of-n system to multi-state k-out-of-n systems. This paper proposes a binary decision diagram (BDD) based approach for binary k-out-of-n system: G system and a multi-state multi-valued decision diagram (MMDD) based approach for multi-state k-out-of-n: G system. BDD...
It is shown that dominant trapping sets of regular low-density parity-check (LDPC) codes, so-called absorption sets, undergo a two-phased dynamic behavior in the iterative message-passing decoding algorithm. Using a linear dynamic model for the iteration behavior of these sets, it is shown that they undergo an initial geometric growth phase which stabilizes in a final bit-flipping behavior where the...
A well arranged task priority in dual-shore collaborative software design phase will smooth the collaboration and reduces the potential coordination lag. However, it is really difficult to determine the priority when there are many collaboration tasks and the collaborative process is a little complicated. On the basis of behavior compatibility analysis using Petri-net, this paper proposed yet a new...
Verification of services compatibility is an important issue in Web Services composition. With the growing of grain size, services will become more complicated with internal business processes and will have interactions with other services while composition.This paper proposed a Petri Net based approach to analyze the Web Services interactive behaviors compatibility. First, the interacting services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.