The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to accurately extract various color regions in a color image, a multi-color extraction method based on the semantic color is put forward in this paper. By introducing semantic color and establishing semantic color model, the method can rationally solve the color extraction problem. This method makes use of fuzzy clustering algorithm which distributes pixels of an image into each color area,...
This paper presents and evaluates a cache hierarchy-aware code parallelization/mapping and scheduling strategy for multicore architectures. Our proposed parallelization/mapping strategy determines a loop iteration-to-core mapping by taking into account the data access pattern of an application and the on-chip cache hierarchy of a target architecture. The goal of this step is to maximize data locality...
To analyze the impact of wind farms on the small signal stability of the integrated power system, first the two integrated induction generators, SFIG and DFIG are presented in this paper based on the induction generators theory. Then introduce the method to analyze the small signal stability of the system by the eigenvalues. The aerodynamic models, mechanical-driven models and pitch angle control...
The emergence of multicore platforms offers several opportunities for boosting application performance. These opportunities, which include parallelism and data locality benefits, require strong support from compilers as well as operating systems. Current compiler research targeting multicores mostly focuses on code restructuring and mapping. In this work, we explore automatic data layout transformation...
NetFlow is a popular technology in network management nowadays. It supports administrators to get various performance metrics. But metric values estimated from NetFlow records may inaccurate in some circumstance. This paper aims at studying the errors of utilized bandwidth measured by NetFlow. At first, packet streams with a specific format were collected from the backbone by passive measurement and...
As the well known port for DNS service, the 53 port won't be shielded by most of firewalls or network services. This defect can be used to send packets through firewalls without being detected. For comprehensive understanding of this phenomenon, a program was designed to inspect UDP flows going through the port 53. With the help of this program, we conducted traffic analysis on the 53 port of JSERNET...
In an unreliable communication network, the most reliable source (MRS) of the network is a good candidate as the source for data broadcast. Previous studies focused on seeking either an MRS that maximizes the expected number of nodes reachable from it or an MRS that maximizes the minimum reachable probability from it. In this paper, we integrated the two aspects into a new double¨Cobjective problem...
this paper focus on analyzing traffic characterization of a large-scale access network based on active IP address count and link utilization. We find out that the behavior of internal and external hosts is asymmetric, the utilization of internal IP addresses per day is about 18.64% and the maximum link utilization is about 53%. Based on these, we proposed a scheme for detecting traffic anomalies which...
Crater detection from panchromatic images has its unique challenges when comparing to the traditional object detection tasks. Craters are numerous, have large range of sizes and textures, and they continuously merge into image backgrounds. Using traditional feature construction methods to describe craters cannot well embody the diversified characteristics of craters. On the other hand, we are gradually...
Food Traceability is regarded as a critical capability to enable and improve food safety both in public and private sector. However, the market practice to food traceability system (FTS) is not perfect. In lots of cases, the inefficient traceability supply is attributed to the gap of public's demand on higher traceability level and private companies' insufficient supply as expected. The fact is that...
The intermodal transportation as an effective logistics solution can provide timely and high quality service for customers. Especially with the rapid development of logistics industry, the intermodal transportation is becoming a very common practice in the industry today. The operation cost can be reduced to a great extent if different transportation modes are well connected and synchronized. Most...
Companies need to understand how they are valued. The fundamental reason for this is that investors invest in companies that create the most value. Companies require investment to fund new business and to enable them to play a leading role in the globalization and consolidation of industries. Investors want to invest in the companies that will create the most value. If a company wants to create value,...
Land-Use and Land-Cover Change (LUCC) can not only have a wide variety of ecological effects but also effect landscape features and functions, which greatly influence the regional biological diversity and ecological processes. The characteristics of LUCC and landscape pattern changes of Alpine grassland in Golog Tibetan Autonomous Prefecture, Qinghai Province on the Qinghai-Tibetan Plateau, were analyzed...
Iteration space tiling and scheduling is an important technique for optimizing loops that constitute a large fraction of execution times in computation kernels of both scientific codes and embedded applications. While tiling has been studied extensively in the context of both uniprocessor and multiprocessor platforms, prior research has paid less attention to tile scheduling, especially when targeting...
A common technique hackers use to break into a computer host is to route their traffic through a chain of stepping-stone hosts. There is no valid reason to use a long connection chain for remote login such as SSH connections. One way to protect a host of being attacked is to identify long connection chains connecting into the host. This paper proposes a novel method to identify long connection chains...
Public transportation is regarded as one of the most efficient means to confront the explosively growing city traffic problems such as congestion and pollution. However, a major obstacle for public transportation to be more adopted by citizens is its generally poor user experience. This paper proposes a system of bus trip planning service, which can help public transportation users choose the most...
Counting craters is a fundamental task of planetary science, because it provides the only tool for measuring relative ages of planetary surfaces. In this paper, we combine active learning with semi-supervised learning to build an new semisupervised active class selection system for crater detection from high resolution panchromatic planetary images. We propose the Semi-supervised Active Class Selection...
In this article, the electrogastrography is utilized to detect slow wave of gastric digest motility after test meal. In order to extract useful information, this study used multi-resolution method with the Daubechies wavelet function to decompose EGG signal into 9 layers. We reconstructed the slow wave with decomposed signal after digital signal processing to achieve method of the slow wave detection...
The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster,...
In this paper, we study a new research problem of causal discovery from streaming features. A unique characteristic of streaming features is that not all features can be available before learning begins. Feature generation and selection often have to be interleaved. Managing streaming features has been extensively studied in classification, but little attention has been paid to the problem of causal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.