The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the presence of primary user (PU), most of researches have often neglected the effect of the interference from the primary transmitter to secondary receiver in cognitive radio (CR) systems. In this paper, with the PU's interference, we investigate the problem of optimal joint relay selection (RS) and power allocation (PA) to achieve maximum throughput in spectrum sharing cognitive two-way relaying...
For the networked multi-agent system with arbitrary-order time-delayed agent dynamics, the parametric H∞ design method of the decentralized PID controller is proposed in this paper. The closed-loop framework representation is first given for the multi-agent system with the decentralized PID controller imposed on each agent. Based on this close-loop framework, the H∞ performance criterion of the entire...
The effective connectivity among overlapped core regions recruited by motor imagery (MI) was explored by means of Granger causality and graph-theoretic method, based on Electroencephalography (EEG) data. In this paper, causal connectivity brain network (CCBN) was proposed for the classification of motor imagery for brain¨Ccomputer interface applications, by means of source analysis of scalp-recorded...
This work addresses the use of compressive sensing to compress real Synthetic Aperture Radar (SAR) raw data. Due to the low computational resources of the acquisition platforms and the steadily increasing resolution of SAR systems, huge amounts of data are collected and stored, which cannot generally be processed on board and must be transmitted to the ground to be processed and archived. Although...
Although there are some work focusing on rate distortion analysis of compressive sensing (CS), some studied the distortion performance at a particular data rate and some only show the related figures without an expression. Different from all the others, in this paper, we study the performance of rate distortion function R(D) of CS with a distortion D and give a clear relationship between rate and...
When customers who carry their “Hospitality” cards (UHF passive RFID tags) enter the shopping malls, the RFID reader can identify the tags and get the customers' personal information. The position of the customer can also be obtained using the reflected RSSI value returned to the RFID reader from the RFID tag. These information can help sales assistants to provide proper service to customers. In this...
High power electronic modules, such as IGBT modules, are required in many applications, like the high speed train, solar energy inverter, CNC, frequency-alterable air-conditioner, etc. When a module works, a lot of heat would be generated due to the small size. If the heat could not be removed from the module, the high heat flux might lead to failure of the module. Therefore, a good thermal management...
This article proposes such a question classification approach that integrates multiple semantic features. It is aimed at these two questions in Chinese question classification models: inaccurate semantic information extraction and too slow processing speed caused by too high Eigenvector dimension. With the help of HowNet and the support vector machine and syntactic and semantic information of question...
Time synchronization is one of the fundamental techniques for the wireless sensor networks to obtain the real-time effective information. The security of this technology is becoming increasingly important. In this paper, we analyze the security of RBS, the synchronization algorithm in WSN, point out the potential vulnerabilities existing in the algorithm, and propose optimization on security for the...
As an unsupervised learning method, spectral clustering is widely used in machine learning. Spectral clustering algorithms apply spectral graph theory to solve the clustering of non-convex sphere of sample spaces, so that they can be converged to global optimal solution. After the essence of initialization sensitivity in spectral clustering is analyzed, the prim algorithm is used to select the k initial...
This paper studies on how to improve the efficiency of multilayer relationship checking, which was the most complex and time-consuming operation in land plan spatial data quality checking. The existing researches on spatial data quality mostly focused on how to evaluate spatial data quality, but few studies on efficiency. With an in depth study on the characteristics of multilayer relationship, we...
In this paper, we explore whether the functional magnetic resonance imaging(fMRI) signals of advanced brain areas except the motor area, prefrontal brain regions can be used in the brain-computer interface and how to effectively improve the accuracy of thinking classification by extracting blood oxygen level dependent(BOLD) signal features. We focus on whether the fMRI brain signal of posterior parietal...
Scientists have done many researches on human vision, they believe that computational model of human vision can inspire computer vision. FEF (Frontal Eye Field) is one of the important cortex of human being which plays a central role in the production of purposeful eye movements. A fMRI experiment was performed in this study to examine the cognitive role and functional connectivity mode between FEF...
In order to effectively curb the effect of complex environment on the accuracy of position of nodes in Wireless Sensor Network, an anchor node weighted compensated localization algorithm is proposed, based on the trilateration localization algorithm and the centroid localization algorithm. By using the anchor node's own locating capabilities as well as the weighted centroid localization algorithm,...
Affective modeling plays a key role in the human-computer interaction. In the paper, the mapping relationships among personality, mood and emotion space are established firstly. Secondly, the equations for updating the affective and mood states are induced. Then a new layered model of affect is presented based on personality, mood and emotion space. The results of the experiment demonstrate that the...
Conditioned with per-antenna power constraints, power allocation over transmit antennas must be controlled in joint optimization of transmit beamformers and receive beam-formers in multi-user multiple-input multiple-output (MIMO) downlink. In this paper, it is shown the Lagrangian dual of the per-antenna power constrained optimization problem is related to the network dual of a weighted sum power...
Reactive routing protocol (such as DSR) is preferred in Ad Hoc networks. In DSR protocol, the relay node would search its cache for an alternate route to the destination to salvage packets when link failed and would abandon the packets if not found. This paper introduced a novel routing algorithm based on the downstream nodes' information called DSR-DI. If the alternate route to destination was not...
A customer service system is described that augments the shopping experience of consumers. The system uses customer information contained in passive Radio Frequency Identification, RFID tags to alert sales-assistants to probable needs of the customer. These needs may be derived from previous consumption patterns and this enables personalized services to be provided. The system is transparent to customers...
In this paper, packet error rate (PER) of Zigbee (IEEE 802.15.4) under the interference of radio frequency identification (RFID) is analyzed by establishing a mathematical model of the mutual interference. This proposed model takes PHY (such as the channel model, the transmitted power, the spreading and the modulation) and MAC (such as CSMA/CA, the traffic load and the packet format) into account...
Modern network computing is in the process of changing from manual management to autonomic computing. As the core of network computing, database management system with autonomic computing must be able to participate in the process to meet the performance requirements of the network applications. This paper studies on workload adaptation technology. In the workload adaptation framework, the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.