The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The resistive voltage dividers are commonly used in many high voltage measurements. Their performance affects the measurement accuracy. Different calibration methods are discussed in this paper. The corresponding relations between the time-domain parameters calibrated by step response and frequency-domain parameters calibrated by network analyzers are obtained by mathematic derivations. These relations...
Stray flux (leakage or interference flux) in the iron core of DCC due to the primary eccentric bus-bar and the external adjacent current-carrying conductor were calculated by electromagnetic analytical methods. The equivalent relations between the leakage fields and the interference fields were derived. Based on the relations, the effect of leakage fields caused by the eccentric bus-bar on the DCC...
The paper introduces a calibration system on wideband power. The system is based on the synchronous sampling technology and non-integer-period interpolation compensation algorithm. Its frequency ranges from 10Hz to 100kHz, and the optimum measurement uncertainty is 25µW/VA.
Emergency management systems (EMS) are important and complex examples of Cyber-Physical-Human systems that are deployed so as to optimise the outcome of an emergency from a human perspective. They use sensor networks, networked decision nodes and communications with evacuees and first responders to optimise the overall Quality of Service to benefit primarily human beings in terms of survival, health...
The current video segmentation methods are mostly based on and limited by image vision analysis. In fact, additional information could be inserted into the video for constructing an effective index. This paper proposed a video segmentation method based on spatial geographic information from the perspective of GIS application, which contributed to video location. The experimental result indicated that...
Many change detection methods enable researchers analyze remotely sensed images and detect land degradation. However, these time series are strongly influenced by seasonal climatic variations, and some change detection methods cannot accurately detect changes within them. In order to detect various changes in different time scales in time series data, such as abrupt, seasonal, and gradual changes,...
The generation of active area especially the irregular active area can always happen during the geometry of affine transformation in image geometric correction and clipping along the administrative area shape file, but there are few methods or algorithms in order to obtain the active area. The article analyses the current situation in extracting the active area, designs an algorithm of obtaining irregular...
We propose an analytical model that computes availability of upper-layer flows in two-layer networks with dedicated path protection deployed at the upper layer. Our proposed model reduces overestimation of the existing model caused by the ignorance of upper-layer failure correlations. We compute the flow availability by properly taking into account such correlation, and tracing upper-layer failures...
This paper proposes a new monitoring path design paradigm for independent dual link failures. Specifically, the new approach exploits the sequential arrival and departure property of independent failure events to uniquely localize failed links. Such property, however, cannot be captured by the existing approach, which is built upon the notion of shared risk link groups. Consequently, we show via solution...
This paper briefly discusses cyper-physical systems that include human beings and vehicles in a built environment such as a building or a city, together with Sensor Networks, Communications and Decision Support Systems, with the purpose of optimising the human outcome in the case of an emergency.
Distributed camera networks represent an emerging trend for the incorporation of pan-tilt-zoom (PTZ) cameras in next generation large-scale wireless surveillance systems. The adoption of PTZ cameras with dynamic field of view nature can increase the resolution of mobile targets and adapt the network coverage significantly. However, leverage these benefits calls for more configuration cost and sophisticated...
Traffic flow detection is the advanced stage in the intelligence surveillance. In this paper, we first parameterize the scene knowledge (as lane etc.) using Radon transform and Polynomial fitting to boundary of road. The features of Hu moment were used for tracking the moving objects; the scene knowledge and the fictitious coil were cited for analyzing the traffic flow of moving objects. The experimental...
We address in this paper the problem of mapping three-dimensional Fast Fourier Transforms (FFTs) onto the recent, highly multithreaded CUDA Graphics Processing Units (GPUs) and present some of the fastest known algorithms for a wide range of 3-D FFTs on the NVIDIA Tesla and Fermi architectures. We exploit the high-degree of multi-threading offered by the CUDA environment while carefully managing the...
DC transmission systems are playing a more important role today. While HVDC transmission technology wins on key aspects over AC transmissions, there are still problems which make it difficult to handle and expand to grids. Among these problems is the most undesirable one: interruption of dc currents. Using DC breakers based on various principles has proved to be effective. However, the function of...
This paper presents a bandwidth-negotiation scheduling (BNS) for 802.16j MMR networks. The proposed BNS not only can allocate adequate bandwidth for UGS, rtPS, nrtPS, and BE in sequence of priority levels, but also can invoke negotiation between access and relay zones when the remaining bandwidth is insufficient to meet the minimum bandwidth requirement of rtPS or nrtPS. Besides, our BNS scheme can...
The algorithm of line extraction and corner extraction in unknown indoor environment with laser sensor is presented in this paper. The corners, the intersection point of two line segments and the two endpoints of each line segment extracted from raw sensor data, can be chosen as landmarks to estimate the position of mobile robot or used to do mapping unknown environment without artificial landmarks...
Face detection is known to be a resource-hungry process in computer vision. Most of existing detection algorithms, such as Viola-Jones detector, are too time-consuming to be implemented on resource-limited embedded smart cameras. Observing that the computation increases proportionally to its pixel manipulation, and inspired from the cascade structure which imposes more complex processing on the promising...
In this paper transition layer is used for heterogeneous stack substrate bonding between GaAs and Si which includes Wafer to Wafer bonding technology and GaAs MMIC Die to Si wafer bonding technology. In consideration of the different thermal expansion coefficient between GaAs and Si,low temperature metal eutectic bonding was adopted for heterogeneous substrate bonding. It's succeeding to heterogeneous...
(35 Word Limit): Traffic flows with protection can be disrupted in network failures that are beyond the protection capability. We analyze availability of upper-layer flows in two-layer networks with dedicated path protection at upper or lower layer.
This paper surveys current research on wireless sensor-assisted evacuation and rescue systems and discusses related research in communications and sensor networks. Other important issues that we survey for large scale emergency response systems include distributed control, knowledge discovery, and protoyping platforms.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.