The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new method based on phase sensitive optical fiber sensing technology (Ф-OTDR) is presented in this paper. The method first uses Ф-OTDR to acquire the original signal of railway tracks vibration for a while, then conducts filtering, short-time Fourier transform and auto regressive model spectrum estimation of the original signal, After analyzing the frequency signal feature,...
Because of hundreds of megahertz bandwidth is a necessary condition for high speed data rates, the millimeter wave band will be used for 5G communication systems. Propagation channel measurements at mm-wave band were conducted in a conference room with an advanced MIMO channel sounder. An omnidirectional antenna at the transmitter and a horn antenna at the receiver were used. The transmitter antenna...
It is significant for an Internet Service Provider (ISP) or an Internet Content Provider (ICP) to obtain the user experience of the web service that is one of the most widely used Internet services. Mining data from the network systems to measure the web service has become one of the research hot spots recently. In this paper, we propose a novel method to obtain the user experience of the web service,...
Studies related to this paper mainly adopted model GTAP and ATPSM to explore the effect of importing on our cotton industry. To ensure the interest of weak group in the cotton industry— the farmers, the paper used cointegration method to study the relationship between imports and sown area as well as sales, set up Error Correction Model to explore the current and long term effect of cotton importing...
This research aims to seek a better early warning evaluation index system of enterprise purchasing risk. Based on the basic principle of the Balanced Scorecard (BSC), a feasibility of applying the BSC in early warning evaluation of enterprise purchasing risk is analyzed first. Secondly, risks in enterprise procurement and their respective influencing factors are proposed from the perspectives of finance...
In order to obtain the real milling force signal in high speed micro-milling process, and accurately identify each exciting source, this paper studies on micro-milling force mixed-signal separation and identification technology based on combination of independent component analysis (ICA) and fast Fourier transform (FFT). The ICA method from theory of blind source separation combining is used with...
The componentwise decomposition theorem of lattice-valued Sugeno integral is extended. The concepts of interval fuzzy-valued, intuitionistic fuzzy-valued and interval intuitionistic fuzzy-valued Sugeno integrals are introduced. It is shown that the intuitionistic fuzzy-valued Sugeno integrals and the interval fuzzy-valued Sugeno integrals are mathematically equivalent. The interval intuitionistic...
In the resource constrained Wireless Sensor Networks (WSNs), the broadcast authentication is widely fulfilled by the emerging delayed authentication technique. The one level backward one-way key chain in the delayed authentication technique limits heavily the duration of the broadcast authentication. In this paper, we propose a long duration broadcast authentication scheme for WSNs. The proposed scheme...
Time synchronization is crucial to Wireless Sensor Networks (WSNs) due to the requirement of coordination between sensor nodes. Existing secure time synchronization protocols of WSNs introduce high overhead when used for global time synchronization. In this paper, we propose a lightweight secure global time synchronization protocol for WSNs. In the proposed protocol, a broadcast synchronization packet...
A forest fire has long been a severe threat to the forest resources and human life. The threat could effectively be mitigated by timely and accurate detection. In this paper, we propose a novel accurate forest fire detection system using Wireless Sensor Networks (WSNs). In the proposed system, the detection accuracy is increased by applying the multi-criteria detection that an alarm decision depends...
Broadcast authentication plays an important role in wireless sensor networks. In this paper, we propose key predistribution based broadcast authentication scheme. In the scheme the base station can derive all keys used for broadcast authentication from initial parameters and sensor nodes are just able to deduce keys excluding authentic keys from initial parameters stored before deployment according...
Support vector machines (SVMs) have been dominant learning techniques for more than ten years, and mostly applied to supervised learning problems. These years two-class unsupervised and semi-supervised classification algorithms based on bounded C-SVMs, bounded j/-SVMs and Lagrangian SVMs (LSVMs) respectively, which are relaxed to semi-definite programming (SDP), get good classification results. These...
Support Vector Machines (SVMs) have been dominant learning techniques for more than ten years, and mostly applied to supervised learning problems. These years two-class unsupervised and semi-supervised classification algorithms based on Bounded C-SVMs, Bounded n-SVMs and Lagrangian SVMs (LSVMs) respectively, which are relaxed to Semi-definite Programming (SDP), get good classification results. These...
Support vector machines (SVMs) have been dominant learning techniques for more than ten years, and mostly applied to supervised learning problems. These years two-class unsupervised and semi-supervised classification algorithms based on bounded C-SVMs, bounded ??-SVMs and Lagrangian SVMs (LSVMs) respectively, which are relaxed to semi-definite programming (SDP), get good classification results. These...
Enterprise logistics risk management has become a new research area as research on it is rather scarce to date. This research is thus desperately needed especially in the contemporary business environment when enterprise logistics are facing a myriad of risks. The main proposition of this report seeks to focus on the importance of gaining adequate knowledge about enterprise logistics risk management...
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to information resources. In this work, a statistic location verification algorithm in randomly deployed sensor networks is proposed. The nodes in the networks are classified to three roles. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.