Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper investigates flyback auxiliary power supply system of the input series modular power electronic converter. Through utilizing the input series output independent (ISOI) structure, a modular auxiliary power supply scheme is proposed. And in order to ensure input voltage sharing (IVS) between each auxiliary power supply module, A novel master slave input voltage sharing control strategy is...
In order to enhance the ability of harmonic suppression for multi-pulse converters (MPCs). This paper proposes a novel pulse multiplication method at DC side of MPCs. The presented rectifier consists of a three-phase bridge parallel structure 12-pulse rectifier and a novel double winding tapped inter-phase converter (TIPC). The functions and characteristics of delta-connected autotransformer and ZSBT...
We present a supervised machine learning system capable of matching internet devices to web cookies through filtering, feature engineering, binary classification, and post processing. The system builds a reasonably sized training and testing data set through filtering and feature engineering. We build 415 features in total. Some of these features were engineered to be O(n) time, stand alone classifiers...
Spaceborne Video SAR imaging mode is a new imaging mode of SAR (Synthetic Aperture Radar), it is different from the traditional imaging mode. Operating in this mode, SAR provides continuous surveillance over a region of interest. Sequence images are processed afterwards and the information of the region is reappeared using video formed by sequence images. Obviously, this will bring many advantages...
Currently, most of the human detection methods are based on low-level features. In this paper, we proposed a middle-level feature generation method based on non-negative matrix factorization (NMF) for human detection. We also proposed an improvement scheme to guarantee that a better middle-level feature can be achieved. The proposed scheme can be applied to a complex background and the experimental...
This paper presents a novel scheme for human action recognition. First of all, we employ the curvature estimation to analyze human posture patterns and to yield the discriminative feature sequences. The feature sequences are further represented into sets of strings. Consequently, we can solve human action recognition problem by the string matching technique. In order to boost the performance of string...
Emergent behavior is a core trait of SoSs. But the emergence cannot be predicted before its appearance. We propose a method which using Semi-autonomous Agent based simulation to detect the emergent behaviors of SoSs. Agent based Modeling and Simulation are available for the observation of emergent behaviors of SoSs. We propose the multi-agent based simulation methods to demonstrate the evolution of...
Translation-based steganography (TBS) is a kind of famous text steganography. In this paper, we examine the robustness of TBS and give an effective detection algorithm for TBS. Our algorithm can not only distinguish between natural language text and stego-text which was generated by TBS, but also can distinguish between machine translated text and stego-text. The detection accuracy increases as the...
In this paper an MRESDL dynamic model is proposed for analyzing file diffusion in a node-to-node (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each node not only shares the downloaded parts of the file, but also downloads the needed parts of the file. This behavior is similar to the spreading of epidemic diseases. The well-known medical model SIR is applied...
A new steganalysis method is proposed to detect the exists of hidden information using character substitution in texts. This is done by utilizing Support Vector Machine (SVM) as a classifier to classify the characteristic vector input into SVM. The most important step of this detection algorithm is the construction of a proper characteristic vector. Under the prerequisite that the secret bits to be...
Privacy-preserving data mining aims at securely extracting knowledge from two or more parties' private data. Secure multi-party computation is the paramount approach to it. In this paper, we study privacy-preserving add and multiply exchanging technology and present three new different approaches to privacy-preserving add to multiply protocol. After that, we analyze and compare the three different...
Linguistic steganography is a technique for hiding information into text carriers. Most of the previous work on linguistic steganography was focused on steganography and there were few researches on steganalysis. Research on attacking methods against linguistic steganography plays an important role in information security (IS) area. In this paper, a linguistic steganography detection algorithm based...
To achieve automation in ITS (Intelligent Transportation System) environments, integrations for existing traffic management systems as well as various vehicle-centered systems need to be done without modification. This is in particular essential for an automated emergency vehicle preemption system, where traffic signal preemption should be more accurate, smooth, and secure. Current researches for...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.