The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A practical shadowing test technique for the trimmed NURBS surface (TNS) is presented in this work. By employing an efficient Bezier patch classification algorithm, a two-level hierarchical space partitioning volume (HSPV) is built for the TNS, where the leaves of the HSPV that contains trimmed off part of the original surface are marked out, making sure the shadowing test occurs on the effective...
In this paper, a new direction-of-arrival (DOA) estimation method is proposed based on the array cross-correlation vector (ACCV) model which can decrease the computational complexity of multiple measurement vectors (MMV) model. Firstly, the ACCV model is refined to accommodate the correlated signal scenario. Then by properly incorporating the folding scheme in the compressive sensing (CS) framework,...
A new approach to model and analyze closed loop supply chain system is proposed based on Petri net theory. The approach proposed consists of two stages. In the first stage, the closed loop supply chain is modeled as a stochastic fuzzy Petri net model with conventional stochastic Petri nets in which the transition firing rates are characterized as fuzzy variables. In order to obtain the reachablility...
Discovering object classes from images in a fully unsupervised way is an intrinsically ambiguous task; saliency detection approaches however ease the burden on unsupervised learning. We develop an algorithm for simultaneously localizing objects and discovering object classes via bottom-up (saliency-guided) multiple class learning (bMCL), and make the following contributions: (1) saliency detection...
This paper proposes an Installment Coordination Scheduling-based Distributed Fair Queuing algorithm in wireless mesh networks, considering such problems as unfair channel bandwidth among nodes and location-dependent competition. Through the establishment of installment coordination scheduling model, data communication process of nodes is divided into three periods, namely, sending periods, compensation...
One of the main problems facing accurate location is the parameter extraction. In this paper, we propose a new time delay estimation algorithm with generalized cross-correlation (GCC) method. The time delay is obtained by computing the cross-correlation between the transport streams of the same transmitted frame structure and the received signals. Simulations were conducted to evaluate its performance...
There is a new way, using FLUENT--a computational fluid dynamics software, to analyze the inside flow field of hydraulic retarder instead of using one-dimension flow theory. In the simulation process, the inside flow field is assumed whole fluid-filled. And the moving areas use sliding mesh model while the turbulence model chooses standard two equations model. Finally, there are analysis of the pressure,...
SLAs play an important role for the QoS-driven service composition. Meanwhile, the temporal constraints are one of the main elements in the management of SLA especially in specifying the validity period of the QoS offers. In practice, the temporal constraints should be generated dynamically by taking the resource capability of the provider into account. The generation should consider various parameters...
Given a large scale Internet, how can we derive a representative simplifying topology model by network simulation? There are many known algorithms to compute interesting measures (scale down the number of clients, deletion methods, contraction methods, et al.), but most of them only reduce the scale of the network topology, the facticity of network simulation results can't be guaranteed. So when simplifying...
Trust negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has some shortcomings, such as easy to fail in negotiation, difficult to track userspsila deed and so on.... Security log provides a method to analyze the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.