The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
GPU-based clusters are widely chosen for accelerating a variety of scientific applications in high-end cloud environments. With their growing popularity, there is a necessity for improving the system throughput and decreasing the turnaround time for co-executing applications on the same GPU device. However, resource contention among multiple applications on a multi-tasked GPU leads to the performance...
500kV substation on duty gradually tends to be unmanned with the development of smart grids, the mobile robot that used in substation equipment inspection emerge as the times require. Substation inspection robot system, which is described in this paper, can replace a fixed video monitoring, complete video remote transmission of information, equipment control, accident treatment and coordinated transport...
With the fast development of cloud technologies, cloud-based operating systems are becoming increasingly popular, while several enterprise products, such as Chrome OS and SUNDE, are released continuously. According to the way of usage, the existing cloud-based operating systems can be divided into two categories: browser-driven operating system and virtualization-based operating system. However, traditional...
Rapid and accurate determine of blood types is very important during emergency situation before administering a blood transfusion. At present the method based on image recognition technology to quickly determine blood type has been widely used in the automated blood analyzer. In this paper, we propose a fast, accurate and robust blood group judgement method based on the image features of ABO blood...
Markov-modulated Poisson Process (MMPP) has been extensively studied in random process theory and widely used as a network traffic model. Most methods for estimating MMPP parameters are based on the exact arrival times. Nevertheless, in many applications it is costly to record the exact time of each arrival. Instead, we only record the number of arrivals in fixed-length time slots, which is called...
Diagnosing faults in virtual networks is always a popular research area. Existing researches primarily focus on diagnosing faults in physical networks, while they could not identify the faults introduced by virtual networks. Besides, the high complexity of algorithms and the requirement for modifying hardware may limit their scope of use. To address these drawbacks, in this paper, we propose a novel...
Bioinformatics is a cross subject of biological information processing. DNA sequence splicing is one of its research content. At present, most parallel algorithms are based on the operating environment of MapReduce. There is a complex process for reading and writing to hard disk, which lead to inferiority that the speed of the algorithm will be slow. In this paper, Spark calculation model based on...
An i-vector has become the state-of-the-art algorithm for text-independent recognition. Most of related works take the extraction of the i-vector as a black-box by using some open software (e.g. Kaldi, Alize) and focus on the vector-based back-end algorithms, such as length normalization, WCCN, or PLDA. In this paper, we study the variational method and present a concise derivation for the i-vector...
Distributed file system has the characteristics of large capacity, good scalability and high reliability, which make it widely used in many areas involving large-scale data storage. It offers simplified, highly-available services for users to access data. However, due to the non-metadata design, the performance of traversal operation on large directories in those non-metadata distributed file systems...
In the field of cloud computing, cloud service composition integrates a group of collaborative sub-services to fulfill a specific business model. Composite cloud service is widely used and is normally implemented by distributed sub-services over the cloud, each modelled as a virtualized function (VF). It is critical that the composite cloud service maintains high Quality of Service (QoS) in the presence...
It is challenging to allocate the network bandwidth to virtual machines(VMs) hosting communication-intensive applications. Due to the temporal and spatial variability of the hosted applications, it is crucial how much bandwidth to be reserved for each VM and when to adjust it. Prior approaches typically resort to predicting the applications' network demands, according to which the VMs are placed once...
In this paper, a universal control scheme is investigated for a class of nonlinear systems with unknown parameters and nonlinearities like friction, dead-zone, etc. First of all, an adaptive finite-time update law is developed to estimate the unknown parameters by introducing the auxiliary filtered variables for the system states and regressor matrix. Then, a universal controller is proposed based...
With the rapid development of information technology, enormous volumes of data is being generated by many enterprises at all times. A reasonable storage of these large scale data to reduce cost and achieve internal data sharing and collaboration has always been a challenge for enterprises. Cloud storage technology, as an important branch in the field of cloud computing, is becoming a trend to solve...
Network bandwidth is a critical resource for tenants in cloud datacenter. Early researches assume that tenants are aware of bandwidth demands of the virtual machines, and a fixed bandwidth capacity can be satisfying. However, bandwidth demands of different virtual machines are complex and time-varying and it is insufficient to re-allocate the resource when congestion or low utilization occurs. Our...
This paper addresses an improved water-body extraction method by the multispectral remote sensing image of four-bands. Firstly, traditional multispectral water body extraction technologies are reviewed, and their features are compared. It shows that finding the most difference of the reflection ratio of the water body and the background is the core to improve the identification rate. Furthermore,...
In this paper, an improved adjacent coupling control scheme combined with integral sliding mode control (ISMC) and active disturbance rejection control (ADRC) techniques is proposed for multiple motors synchronization. The whole synchronous system is divided into two parts. For the first part, a speed synchronization controller is designed based on an integral sliding mode control (ISMC), and an improved...
With the popularity of cloud computing technology, service hosting is used as a typical model to deploy different kinds of services on cloud platform. In recent years, how to effectively provide resources for service hosting has attracted more and more attention. However, most of the existing works only focused on how to effectively provide virtual machines for service hosting. They ignored how to...
In this paper, an adaptive tracking control scheme is proposed for robotic manipulators with unknown input saturation. To overcome the design difficulty from non-differential saturation nonlinearity, a smooth nonlinear function of the control input signal is first introduced to approximate the saturation function, which can be further transformed into an affine form according to the mean-value theorem...
TOA (Time of Arrival) algorithm can be used to locate. However, the source of random error is from the clock out of sync, nodes' crystal frequency drift also causes inaccurate clock. So it needs to estimate channel parameters accurately, and eliminate the clock offset. But in the complex indoor environment, such as obstacles which cause the serious multipath propagation, one positioning method is...
A dynamic protocol stack (DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol stack, DPS operates in a dynamic and adaptive manner and is scalable to network condition changes. In addition, a protocol construction algorithm is proposed to dynamically construct of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.