The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates flyback auxiliary power supply system of the input series modular power electronic converter. Through utilizing the input series output independent (ISOI) structure, a modular auxiliary power supply scheme is proposed. And in order to ensure input voltage sharing (IVS) between each auxiliary power supply module, A novel master slave input voltage sharing control strategy is...
In order to enhance the ability of harmonic suppression for multi-pulse converters (MPCs). This paper proposes a novel pulse multiplication method at DC side of MPCs. The presented rectifier consists of a three-phase bridge parallel structure 12-pulse rectifier and a novel double winding tapped inter-phase converter (TIPC). The functions and characteristics of delta-connected autotransformer and ZSBT...
We present a supervised machine learning system capable of matching internet devices to web cookies through filtering, feature engineering, binary classification, and post processing. The system builds a reasonably sized training and testing data set through filtering and feature engineering. We build 415 features in total. Some of these features were engineered to be O(n) time, stand alone classifiers...
Spaceborne Video SAR imaging mode is a new imaging mode of SAR (Synthetic Aperture Radar), it is different from the traditional imaging mode. Operating in this mode, SAR provides continuous surveillance over a region of interest. Sequence images are processed afterwards and the information of the region is reappeared using video formed by sequence images. Obviously, this will bring many advantages...
Currently, most of the human detection methods are based on low-level features. In this paper, we proposed a middle-level feature generation method based on non-negative matrix factorization (NMF) for human detection. We also proposed an improvement scheme to guarantee that a better middle-level feature can be achieved. The proposed scheme can be applied to a complex background and the experimental...
This paper presents a novel scheme for human action recognition. First of all, we employ the curvature estimation to analyze human posture patterns and to yield the discriminative feature sequences. The feature sequences are further represented into sets of strings. Consequently, we can solve human action recognition problem by the string matching technique. In order to boost the performance of string...
Emergent behavior is a core trait of SoSs. But the emergence cannot be predicted before its appearance. We propose a method which using Semi-autonomous Agent based simulation to detect the emergent behaviors of SoSs. Agent based Modeling and Simulation are available for the observation of emergent behaviors of SoSs. We propose the multi-agent based simulation methods to demonstrate the evolution of...
Translation-based steganography (TBS) is a kind of famous text steganography. In this paper, we examine the robustness of TBS and give an effective detection algorithm for TBS. Our algorithm can not only distinguish between natural language text and stego-text which was generated by TBS, but also can distinguish between machine translated text and stego-text. The detection accuracy increases as the...
In this paper an MRESDL dynamic model is proposed for analyzing file diffusion in a node-to-node (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each node not only shares the downloaded parts of the file, but also downloads the needed parts of the file. This behavior is similar to the spreading of epidemic diseases. The well-known medical model SIR is applied...
A new steganalysis method is proposed to detect the exists of hidden information using character substitution in texts. This is done by utilizing Support Vector Machine (SVM) as a classifier to classify the characteristic vector input into SVM. The most important step of this detection algorithm is the construction of a proper characteristic vector. Under the prerequisite that the secret bits to be...
Privacy-preserving data mining aims at securely extracting knowledge from two or more parties' private data. Secure multi-party computation is the paramount approach to it. In this paper, we study privacy-preserving add and multiply exchanging technology and present three new different approaches to privacy-preserving add to multiply protocol. After that, we analyze and compare the three different...
Linguistic steganography is a technique for hiding information into text carriers. Most of the previous work on linguistic steganography was focused on steganography and there were few researches on steganalysis. Research on attacking methods against linguistic steganography plays an important role in information security (IS) area. In this paper, a linguistic steganography detection algorithm based...
To achieve automation in ITS (Intelligent Transportation System) environments, integrations for existing traffic management systems as well as various vehicle-centered systems need to be done without modification. This is in particular essential for an automated emergency vehicle preemption system, where traffic signal preemption should be more accurate, smooth, and secure. Current researches for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.