The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, an abnormal event detection system inspired by the saliency attention mechanism of human visual system is presented. Conventionally, training-based methods assume that anomalies are events with rare appearance, which suffer from visual scale, complexity of normal events and insufficiency of training data. Instead, we make the assumption that anomalies are events that attract human attentions...
With the rapid development of E-commerce, how to evaluate the E-commerce sites accurately has become an important issue. However, evaluation index of E-commerce sites has characteristics of high dimensions and uneven density, which leads to bad performance of the evaluation result. To analyze 100 E-commerce demonstration enterprises in 2013-2014 named by the Ministry of Commerce People's Republic...
With the globalization of economy, logistics, an emerging industry with great potential of development, is supposed to become an important pillar of the growth of national economy. In recent years, logistics is flourishing in China, and it is geared to international standards. Therefore, Logistics English, as an international language tool, play a very important part in international logistics. The...
For multi-target tracking in heavily cluttered environment, the number of measurement-to-track association hypotheses in each scan grows rapidly in traditional centralized multi-sensor multiple hypothesis tracking (CMS-MHT) method, which leads that the uncertainty of data association greatly increases such that correct association can hardly be given using traditional track score resulting in high...
The instability of helicopter flight brings motion errors in the conventional synthetic aperture radar (SAR) imaging. Combined with terahertz (THz) technology, the influence of range migration and low frequency motion error can be significantly reduced. However, it leads the system to be extremely sensitive to platform vibration, which causes paired echoes and deteriorates image quality. A method...
In space-time adaptive processing (STAP), if incorporating a priori knowledge, the covariance matrix estimation and detection performance can be substantially improved with the heterogeneous environment effects being reduced. In addition, besides the employed priori information, the commonly exhibiting persymmetric structure in radar systems with symmetrically spaced linear array and pulse train can...
With the rapid increasing impact of the mobile Internet on people's daily life, accessing the Internet via mobile devices is showing an obvious trend, which brings a large amount of network traffic at the same time. This paper analyzes HTTP traffic characteristics based on real world data collected from a commercial Internet Service Provider (ISP) in charge of some regions of China. We investigate...
As one of the newest technology, LTE has become increasingly popular after GSM and UMTS. As the LTE industrial chain matures and user requirements grow, E-UTRAN will be deployed on a large scale, covering all urban areas and most other regions. The control plane, which is responsible for connection management, mobility and security, has aroused more and more attention. In order to have an in-depth...
Remote Authentication Dial In User Service (RADIUS) is a widespread used Authentication, Authorization and Accounting (AAA) protocol. With RADIUS, the network users are able to access the Internet in security and the operators can record the information of network activity such as login time, logout time and traffic, etc. This paper presents some observations of the real operational CDMA network in...
Flow visualization is an important research field in scientific visualization and feature detection is the one of the core problems. This paper presents a novel approach for complex ocean flow visualization and analysis by applying the helmholtz-hodge decomposition theory to the feature extraction problem. We give an efficient implementation on regular grids by solving a large-scale sparse group of...
Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF)...
Although vision based road detection has been extensively studied in the past decades, road detection in adverse conditions still remains challenging. In this paper, we propose a road detection approach via superpixels and an automated version of interactive image segmentation. We first segment the input road image into superpixles, and we design a novel seed selection method based on multiple novel...
Vision based road detection is a key technique in Autonomous driving and Advance Drive Assistance System. We propose an approach for vision-based road detection which exploits road shape prior, color consistence representation and discrimination analysis. Firstly, road shape prior probability map is constructed from available road images which have been annotated by matching and classifying of road...
Channel frequency and spatial correlation are essential for adaptive channel prediction, which enables flexible scheduling. This correlation information is determined by the environment and can be learned and stored in a map to avoid online tracking. In this paper we propose a method to generate a channel frequency-spatial correlation map from the measurement campaign. Only two position-dependent...
Keyword search technique over relational databases is a research hot-spot in database field. At present, there have been many ranking correlation algorithms for object-level keyword search over relational databases. Object-level keyword search can better integrate information scattered in various tuples. OCS(Object-level Correction Sort) algorithm cannot rank results in keyword search accurately as...
In this paper, we propose a novel approach based on compensating for the perspective projection effect for anomaly detection in crowds. Video frames obtained by a camera have a common rule of perspective projection effect. The law of perspective projection makes anomaly detection a challenge task because of no consistency in each video frame. For the sake of overcoming the drawback caused by perspective...
A sensorless vector control method for high-speed permanent magnet disk synchronous motors (PMDSM) is presented based on the improved sliding mode observer (SMO). A sigmoid function is introduced into the observer and an algorithm of the improved SMO for estimating the position and speed of the high-speed PMDSM. Simulation of the sensorless vector control for the PMDSM is performed on MATLAB/Simulink...
In this paper, we propose a multi-task object tracking algorithm, which is based on an incremental subspace learning method and is denoted as the Multi-Task Gaussian-Laplacian Regression Tracker (MGLRT). Firstly, we model the candidate targets as a mutli-task linear regression by PCA basis vectors. Secondly, considering the complexity of the real noise in a tracking system, we model the noise as an...
A novel dynamic reconfigurable on-chip unified memory hierarchy, RcfgMem (Reconfigurable on-chip Unified memory) is introduced in this paper. The given resource of RcfgMem can be divided into certain size of Cache and SPM (Scratch-pad Memory) by configuration. Then, a dynamic reconfiguration algorithm is provided based on CBPG (Cache Behavior Phase Graph). The characteristics of program execution...
Voice activity detection (VAD) is one of the most challenging problems in the field of speech signal processing. The statistical model based VADs have been widely studied in the recent literatures, which usually utilize hangover algorithms to prevent clipping of weak speech tails. However, little attention has been paid on the initial consonants, and non-negligible onset detection errors might be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.