The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Through a combination of ZigBee technology and infrared remote control technology, air-condition controller can be built to realize functions like remote monitoring, remote control, and will be more intelligent. On the basis of ZigBee protocols development, the system uses low-power chip MSP430 and CC2530 RF chip, to control the air-condition, monitor and adjust the indoor temperature and humidity,...
This paper reports on a design of a balanced filter based the miniaturized multilayer LTCC technology (Low Temperature Co-Fired Ceramics) which is widely used for Bluetooth and Wireless LAN. It is consist of a folded SIR (stepped impendence resonator) bandpass filter with two transmission zero and a improved Marchand balun. The two elements are cascaded via a through hole in vertical direction for...
This study examines the utility of mobile learning mode and information ability indicator for bridging the digital divide in countrified area based on technology acceptance model (TAM). Using the TAM as a research fram work, 247 learners from urban or countrified area responsed to an 4-item questionnaires containing six constructs. Canonical correlation, One-way ANOVA was employed as the main method...
Retinal diseases are leading causes of severe vision loss and blindness throughout the world. Visual prosthetics has been demonstrated to be an effective therapy to partially restore vision. Reading is one of the most important functional abilities derived from vision. Therefore, we propose a text image processing strategy for visual prostheses. Text information is firstly detected and recognized...
In the area of speckle filtering, proper averaging of samples with similar scattering characteristics is of great importance. However, existing filtering algorithms are either lack of similarity judgment of scattering characteristics or using only intensity information for similarity judgment. In this paper, a novel polarimetric SAR (PolSAR) speckle filtering algorithm based on mean shift theory is...
High efficiency audio compression is the basic technology in audio involved multimedia application. Down mixing and parametric coding are efficient coding scheme with widely applications in some up to date audio codecs such as PS in EAAC+ and MPEG-Surround, and PCA stereo coding followed this idea to map two channels to one channel with maximum energy and parameterize the secondary channel. This paper...
A quantitative calibration model for Infrared spectroscopy using continuous wavelet transform combined with genetic algorithm is presented in this paper. We propose three scale selection methods in continuous wavelet transform and provide the comparisons with the general preprocessing methods. Experimental results show that selectively combining scales results in a quantitative model with better performance...
The term "indoor" here refers generally to enclosed space partitioned into subspaces with connecting doors or gates. Examples include the inside of office buildings, amusement parks, and indoor shopping malls. In many applications, it is desirable to keep track of the distribution of people within the enclosed space. These applications range from smart house with automatically controlled...
Fault tree analysis (FTA) is a top-down approach for failure analysis, starting with a potential undesirable event called a TOP event, and then determining all the ways it can happen. FTA is the most commonly used technique for causal analysis in risk and reliability studies. Mask stage an important part of lithography. In this paper, Fault Tree of the mask stage is built with “Mask stage doesn't...
In order to forecast ammunition storage reliability better, the paper researched a forecasting method based on neural network which is with the ability of actualizing multi-nonlinear mapping from input to output, and discussed steps of forecasting based on radial basis function (RBF) network. The storage reliability of one new-style ammunition is forecasted based on RBF network. The results show that...
This article from the bus dispatching existing manual scheduling on the experience to determine the running program of the current situation, on the bus to static scheduling algorithm was studied and improved. Improve the operation efficiency of public transportation vehicle.
The sea surface temperature (SST) is an important parameter of ocean environment. The remote sensing technology is an effective method to retrieve the sea surface temperature. In this paper, we studied the retrieval of sea surface temperature by using the brightness temperature data obtained from the Advanced Microwave Scanning Radiometer-Earth Observing System (AMSR-E), the infrared data from the...
Bio-cryptography is a new security technology which combines cryptography with biometrics. Fuzzy extractors are effective in terms of binding a cryptographic key to biometric features. However, most existing fuzzy extractors require fingerprint registration prior to the application of fuzzy extractors, and depend on error-correction codes to rectify the biometric uncertainty. This is not operative...
Both appearance and shape play important roles in object localization and object detection. In this paper, we propose a new superedge grouping method for object localization by incorporating both boundary shape and appearance information of objects. Compared with the previous edge grouping methods, the proposed method does not subdivide detected edges into short edgels before grouping. Such long,...
In mesh-based Peer-to-Peer media streaming systems, media contents are always divided into different data segments and stored in different peers. These segments are then streamed from multiple senders to a receiver. The receiver needs to coordinate the senders by specifying a transmission schedule for each segment. Therefore, the scheduling algorithm, which is in charge of coordinating data received...
With the limitations of airborne sensors configuration of conventional miniature UAVs, this paper proposes a practical real-time algorithm which can integrate barometric height and GPS altitude. This algorithm uses the GPS altitude to calibrate baro-altimeter on-line, without considering the motion model and maneuverability of carrier. Tests showed that the fusion algorithm has significantly improved...
This paper reports a trial of handwritten text recognition by a part-based method. The part-based method recognizes individual characters by their parts without considering their whole shape. This realizes great robustness to severe deformations. This robustness is also effective for text recognition. Especially, for handwritten texts whose segmentation into individual characters is very difficult...
Using high harmonic generation (HHG), we probe the nonadiabatic revival structure in the asymmetric top sulfur dioxide. We find that HHG is sensitive to molecular alignment about different axes as well as of partial revivals.
In the existing IPSec architecture, in which tunnel is built in kernel, the number of concurrent tunnels is restricted by IP address configured on the machine and user can not control the process of establishing tunnel. This brings inconvenience when we use personal computer to measure the performance parameters of VPN Gateway (e.g. the maximum number of concurrent tunnels and the maximum rate of...
This paper strives to review the contribution of systems theory to enterprise architecture and integration, make a summary of methods or tools at systems level and probe into some crucial concepts and thinking of systems theory applied in the enterprise integration activities. As the summary to this paper, some new prospects in enterprise architecture and integration are presented to tackle the increasing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.