The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of automatically fall detection of older people living alone is a popular research topic since falls are one of the major health hazards among the aging population aged 65 and above and the population of them in China is more than 100 million. In this paper, we present an automatic human fall detection framework based on video surveillance which can improve safety of elders in indoor environments...
This paper proposes a modeling approach based on software correlated defects -- error propagation slicing (EPS). EPS, describing the way error propagates in software, detects potential defects which are hard to be detected by traditional approaches and strategies. To begin with, software testing method in this paper will inject cultivated seed of defects, and its potential defects. Test cases of the...
This paper studies how to apply the functional FMECA-a reliability analysis method in the reverse engineering process to make up for the shortcomings in reliability design. Analyze the implementation process of traditional reverse engineering; aiming at the shortcomings of the reverse engineering process such as the lack of reliability design, etc, optimize the implementation process. Failure mode...
MapReduce plays an critical role in finding insights in Big Data. The performance optimization of MapReduce programs is challenging because it requires a comprehensive understanding of the whole system including both hardware layers (processors, storages, networks and etc), and software stacks (operating systems, JVM, runtime, applications and etc). However, most of the existing performance tuning...
Micro-robots have wide application prospects on biomedicine, aerospace, etc., and driving technique is critical in researching micro-robot and also the bottleneck in micro-robot development. In this paper, it is proposed that pH gradient generated by electrolysis is used for driving bacteria colonies so as to propel the micro-robot, based on the character of free swimming of flagellar bacterium in...
The civil airports now mostly use the imported equipment, the maintenance of electronic circuit board becomes the important segment of aviation electronic equipment maintenance. In the rising and development of component level maintenance, as a new nondestructive testing technology, infrared fault diagnosis gets more research and application. The paper utilizes the Ti50 thermal infrared imager to...
The existing security defense systems, which have limitations in many ways, can not adapt to the needs of the future network defense. In allusion to this problem, an intelligent security defense scheme and its intelligent security functions are designed. In order to packing the mainly functions in the form of component, a security function component model is designed. Finally, this paper gives a realization...
The existing security defensive systems, which have limitations in many ways, can not adapt to the need of future network defense. In allusion to the problem, an intelligent security defensive software is designed. It has intelligent functions such as environment awareness, self-adaptation, dynamic reconstruction, and so on.
IBM defines autonomic computing as"an approach to build computing systems that are self-managed and operate with a minimum of human interference." This paper imports the idea of autonomic computing to design Intelligent security defensive software (ISDS), which can adapt to environment by changing policy automatically. The ISDS's framework and self-management working flow are designed according...
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary. In Intelligent Security Defendable Software (ISDS), Execution Components can work cooperatively and implement coordinated tasks, and they need uniform commands. Hence coordinated-control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.