The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The impact of gate voltage differences on the performance of the novel n-type silicon homojunction SOI-Tunnel FET is studied. Based on numerical simulation results using Synopsys Technology Computer-Aided Design (TCAD), the higher on-current and the ultra-low off-current are observed as compared to that of a conventional SOI-Tunnel FET. The analysis of energy band corroborates that gate voltage differences...
Wireless mesh networks begin to be used as an infrastructure of cyber-physical systems. A critical issue in developing wireless cyber physical systems (WCPSs) is the limited amount of energy available in the nodes. Energy consumption analysis can help designer to conduct a power-aware design process. In this paper, we propose a model based energy consumption analysis framework at architecture level...
In this study, Nd2O3 was used as the dopant and the commercial Sr2SiO4:Nd phosphors was produced by using solid-state reaction method. The Sr2SiO4:Nd phosphors was sintered at the temperature range of 1000°C∼1300°C for 2 h. From the results of X-ray diffraction patterns, even sintered at 1000°C only Sr2SiO4 phase was observed, no secondary and unknown phases were residual in the calcined Sr2SiO4:Nd...
Safety requirements are of great importance in Railway Interlocking Systems. However it is still very difficult to obtain all of the safety requirements in practice. In this paper, we propose an approach to capture safety requirements based on safety requirements patterns. From a variety of sources, such as interlocking tables and existing safety relevant functional requirements of railway interlocking...
Existing approaches of social influence analysis usually focus on how to develop effective algorithms to quantize users' influence scores. They rarely consider a person's expertise levels which are arguably important to influence measures. In this paper, we propose a computational approach to measuring the correlation between expertise and social media influence, and we take a new perspective to understand...
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
In the conventional bag of visual words (BoW) based image representation, single visual word is not discriminative enough and the spatial contextual information among local image features is ignored. In this paper, descriptive local feature groups are proposed to address these two problems. First, local image features are refined by slightly transforming the original image. Then they are clustered...
The bag-of-visual-words (BoW) representation has received wide application and public acceptance for visual categorization. However, the histogram based image representation ignores the spatial information and correlations among visual words. To tackle these problems, in this paper, we propose to use some image regions called ‘components’, as the higher-level visual elements to represent an image...
Corner detection is used in many computer vision applications that require fast and efficient feature matching. In addition, hexagonal pixel based images have been recently investigated for image capture and processing due to their ability to represent curved structures that are common in real images better than traditional rectangular pixel based images. Therefore, we present an approach to corner...
This paper considers existence and uniqueness of solution for cellular neural networks with impulsive effects. We present that the iterative analysis method dealing with the existence and uniqueness of solution for impulsive cellular neural networks is still valid. What's more, we get some new results which extend and improve the earlier publications.
Human action recognition has been an active research topic in computer vision. How to model all kinds of actions, varying with time resolution, visual appearance, etc., is quite a challenging task for recognition. In this paper, we propose a Boosted Exemplar Learning (BEL) approach to recognize various actions in a weakly supervised manner, i.e., only video-based labels are provided but frame-based...
As the increasing use of programmable electronic systems to carry out safety functions of automation control systems, there is an emerging need for functional safety certification in order to protect people, equipment and work in progress (WIP) from injuries and damages. The current practice of functional safety certification and other existing control logic verification methods that could be used...
Particle swarm optimization with passive congregation (PSOPC) was a new variant by adding an attraction of passive congregation. However, the performance of PSOPC is not stable when solving the multimodal benchmarks. To overcome this shortcoming, a modified particle swarm optimization based on a Chinese archaism (PSOCA) is designed. The experimental results demonstrate much better performance of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.