The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deep learning (DL) training-as-a-service (TaaS) is an important emerging industrial workload. TaaS must satisfy a wide range of customers who have no experience and/or resources to tune DL hyper-parameters (e.g., mini-batch size and learning rate), and meticulous tuning for each user's dataset is prohibitively expensive. Therefore, TaaS hyper-parameters must be fixed with values that are applicable...
In recent years, the PM2.5 (particulate matter with a mean aerodynamic diameter of 2.5 micrometers or less) pollution has become a very serious problem in China. Currently, there are three types of monitoring approaches: government-led monitoring, Wireless Sensor Networks (WSN) approaches and Participatory Urban Sensing (PUS). There are three limitations in these state-of-the-art research approaches:...
In view of LCL-type grid-connected inverter system, traditional methods can hardly realize multigoal analysis and optimization, thus, a research is carried out on the visualization method based on D-partition method. In consideration of the discrete characteristic of digital control, this paper infers the establishment conditions of D-partition method in z domain, and compares it with D-partition...
Wireless electric vehicle (EV) charger has become increasingly popular because of its improved convenience and safety and its advantage of smaller green-house gas (GHG) emissions. The power control method of the wireless power transfer (WPT) system has great impact on the performance of the charger. In order to simplify the power electronics converters and improve the reliability of the system closed-loop...
With large scale construction of UHV AC / DC hybrid power grid and the "Big Run" system, the service area of the power network dispatch control system is expanding rapidly. The system is facing new challenges as the data source increased, data type diverted, data size and workload increased dramatically. There is a great demand on storing and retrieving of multi-source massive data. The...
In order to solve the singularity problem of the Jacobian matrix in the robotic inverse kinematics method, a new singular processing algorithm is proposed. Based on the damped least-square (DLS) method, the damping coefficients, by using the singular value decomposition (SVD) of the Jacobian matrix, are optimized from the fixed value of the traditional algorithm to the dynamic value adjusted with...
Data collection by social networking applications offers many opportunities for mining information, which provides a better understanding of social structures and their dynamic structures. Anonymization of social networks before they are published or shared is particularly important, since social network data usually contain much sensitive information on individuals. In this paper, we address the...
For the harmonic resonance problem of the photovoltaic multi-inverter parallel grid-connected system, this paper mainly analyzes the resonant characteristics of the LCL interface circuit. The model of the LCL interface circuit is given, and with the increase of grid-connected inverter number, the resonant characteristics are analyzed respectively which the circuit system is stimulated by the harmonic...
Gas insulated metal enclosed line (GIL) has been widely applied in power transmission system due to its high safety and reliability level. Because of its cost saving production and excellent mechanical property, tri-post insulator is the key structure of insulation in GIL. Therefore, the safe operation of tri-post insulator determines the insulation strength level of GIL. Tri-post insulators have...
With the popularity of social networks, privacy issues regarding publishing social network data have attracted an great deal of attention from academia. We proposed a randomized perturbation method to alleviate the privacy-disclosure problem. Our method is based on a randomized perturbation matrix, which is flexible and easy to extend. We solved the problem of calculating the privacy risk of the proposed...
We propose an index of textural feature for oil spill segmentation based on X-band marine radar image. The radar image used in this paper were acquired on July 21, 2010, from the teaching-training ship, “YUKUN”, of Dalian Maritime University. Using adaptive median filter and Fields-of-Experts model, co-channel interference and small objects are cleaned separately. An index calculated by textural features...
HY-2B, the second China's satellite for oceanic dynamic environment measurement, is scheduled to launch at 2018. To improve the capability, some new methods are adopted in HY-2B altimeter design. By these means, the long term stability of the instrument is improved compared with HY-2A altimeter. In this paper, the improved design based on a rubidium atomic clock for HY-2B altimeter is discussed in...
Marine radar can be applied to detect oil spill targets in a large range, which cannot be affected by night, cloudy, rain, snow and other inclement weather. It has played an important role in the field of oil spill monitoring. Moreover, marine radar has the advantages of low cost and convenient installation, which is suitable for constructing marine oil spill network monitoring system. Taking marine...
This paper addresses how to select observed agents and controlled agents in a multi-agent system such that the system is structurally controllable with minimum cost of control and measurement. Firstly, we model the design issue as a minimum cost control configuration (MCCC) design problem of a bilinear system. Next, a necessary condition for the solvability of MCCC is derived. Then, an algorithm is...
In both science research and product development of waveguides based chips fiber-waveguide coupling is a mandatory stage. In this work, the universal fiber-waveguide coupling efficiency is analyzed based on the overlap model of fiber and waveguide profiles. Furthermore, the systematic numerical simulations with gap size, matching material and birefringence show that the waveguide-gap interface reflection...
We present a new descriptor for spontaneous facial expression recognition from videos acquired by a thermal sensor. Previous descriptors mostly compute features from RGB videos. It is difficult to process mixed and varied spontaneous expressions with a large ambiguity of facial appearances. In contrast, thermal imaging can measure autonomic activities, which are the physiological changes evoked by...
This paper reported a high-resolution non-contact thickness test method of ultra-thin silicon diaphragm fabricated by KOH cavity erosion. For the first time, the test sensitivity increases when film thickness decreases, so the novel method is especially suitable for ultra-thin film measurement. Traditional test methods, like optical microscope, step profiler and optical profiler, are incapable of...
Third-party IME (Input Method Editor) apps are often the preference means of interaction for Android users' input. In this paper, we first discuss the insecurity of IME apps, including the Potentially Harmful Apps (PHA) and malicious IME apps, which may leak users' sensitive keystrokes. The current defense system, such as I-BOX, is vulnerable to the prefix-substitution attack and the colluding attack...
Address space randomization has long been used for counteracting code reuse attacks, ranging from conventional ROP to sophisticated Just-in-Time ROP. At the high level, it shuffles program code in memory and thus prevents malicious ROP payload from performing arbitrary operations. While effective in mitigating attacks, existing randomization mechanisms are impractical for real-world applications and...
In the hybrid network of Device-to-Device (D2D) and cellular communications, reducing the co-channel interference is always hotpot problem, in which the interference involves either the co-channel among D2D terminals or between cellular and D2D links. Lower co-channel interference can improve the link spectrum efficiency effectively. This paper focus on discussing the D2D communications under the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.