The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Almost all modern buildings use steel mesh, when a large current occurs nearby, such as a lightning return stroke happens, for the law of electromagnetic induction, electromagnetic fields generated by the lightning would certainly be affected. In general case, lightning detection stations are generally placed near the buildings, so the received signal would be affected by the buildings nearby. In...
In order to study the effect of common smoke control model, the numerical simulation combined with the full size experimental have been used to analyze effect of several modes, which composed with the smoke screen, mechanical smoke and air curtain, and the smoke temperature distribution, concentration distribution, and smoke down time between these model is compared. The results show that smoke preventing...
"Urban night-oriented systems" is an important component of the urban environment-oriented identification system and an expansion in time for the daily urban space guiding and identifiability. The research on the space image at the same place with different time can improve the level of understanding of urban space. And the research on the problem of the barrier-free of identifiability at...
The speech corpus often needs to be constructed frequently for the diversified speech synthesis. This paper discusses our efforts on construction of speech corpus automatically from broadcasting speech databases for trainable Text-To-Speech (TTS) system. We present a new framework of automatic speech corpus construction from broadcasting speech databases. We select the clean speech audios from the...
When interpolating feature points into constructed triangulated irregular network, it will give rise to reconstruction of the original triangulation. This requires finding out the interpolated point's positions and partial adjustment of triangulation where the points inserted. These operations need a large amount of computing. In this paper, we will discuss how to determine the insertion point's locations,...
This paper presents a method for a automatically constructed text corpus with limited text for speech synthesis system. It is to collect phonetically rich sentences with high coverage of phonetic contextual units but has a small text size. In this paper, we present a new greedy algorithm to select text from the mother text. The mother text is auto-loaded by the web crawler and it is dealt with speech-music...
With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. The scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks...
There are a large number of papers on security in ad hoc networks, only a few consider sensor networks. And those works on WSN mainly discuss the problem about key management. The main purposes of this work are to establish a trust on the neighbor relation in WSN and propose a solution of achieving the goal. Our solution includes a mechanism to establish a trusted relation between all neighboring...
The paper presents an approach to build a coincident data structure which depicts road and field. Commonly, the road is represented by vector structure while the field is represented by tessellation structure. The path plan object in CGF or C2 should maneuver from road to field. In this paper, a novel method based on original data of GIS is put forward to build obstacle regions. It can effectively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.