The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on basic electrochemical principles, an equivalent circuit model of a Li-ion battery is developed. The eventual aim of the work is to use such a model in the accurate control of power flow for a battery energy storage system (BESS) in grid-scale applications. The model developed here allows one to monitor the BESS internal states, by taking into consideration the internal dynamics of the battery...
Artificial neural network (ANN) is an important branch of artificial intelligence field. This paper reviews the classic models and implementation methods of ANN, and analyzes the key issues of implementation based on FPGA. Considering the demand of intelligent information processing in aviation field, this paper proposes an application assumption that combines traditional airborne computer systems...
Automatic and accurate lumbar vertebrae detection is an essential step of image-guided minimally invasive spine surgery (IG-MISS). However, traditional methods still require human intervention due to the similarity of vertebrae, abnormal pathological conditions and uncertain imaging angle. In this paper, we present a novel convolutional neural network (CNN) model to automatically detect lumbar vertebrae...
A simulation model for analyzing electromagnetic on-body wave propagations is proposed. The simulation method utilizes motion capture input data, a simplified human phantom model, and full wave electromagnetic simulation methods. A comparison of simulation results and experimental data for differently-sized human body models is shown.
In this paper, we propose a block level rate estimation model for HEVC in discrete cosine transformation (DCT) domain, to reduce the computation burden of entropy coding in mode decision. Rather than the widely used ℓ0 and ℓ1-norm, the proposed model is based on the root of ℓ1/2-norm of the quantized DCT coefficients (r-qCoeffs) which presents a higher estimation accuracy. Furthermore, to adapt to...
Requirements engineering (RE) is crucial for software projects. However, formal requirements engineering is often ignored in scientific software projects. To enhance the quality of scientific software and to adopt more good software engineering practices, we claim that requirements need to be elicited and specified. We present DRUMS Board, which supports lightweight requirements elicitation. DRUMS...
Variable-fidelity optimization (VFO), which utilizes the precise value of high-fidelity (HF) model and underlying trend of low-fidelity (LF) model, has solved many computationally expensive problems by simulation-based design. Though it has been developed rapidly in recent years, the simpler and cheaper ones are still needed. In this paper, a new optimization framework based on Kriging method with...
As an important computer graphics technique, parameter-driven animation has seen increasing deployment on mobile platforms, where both communication bandwidth and device storage are subjected to stringent constraints. We propose an efficient rate-distortion optimized inter-frame compression scheme for parameter-driven animation capable of finding optimal bit-allocations for any given bit-rate. Experiments...
A simulation platform for modelling and analyzing dynamic on-body electromagnetic wave propagations is proposed. This simulation method combines motion capture techniques, simplified human phantom model construction, and full-wave electromagnetic simulations. Two case studies are presented and verified with measurement results.
This paper presents a trust management model based on multi-agent and trust evaluation. It adopts the centralized distribution management mode and sets up multiple third-party agents in the cloud, furthermore, it can manage the users and cloud services by the collaboration of the agents effectively. By using multiple third-party agents, it can reduce the single-agent's pressure of computation, storage...
Most evolutionary algorithms utilize the posteriori knowledge learned from the running process to guide the search. It is arguable that the priori knowledge about the problems to tackle can also play an important role in problem solving. To demonstrate the importance of both priori and posteriori knowledge, in this paper, we proposes a decomposition based estimation of distribution algorithm with...
In order to improve the technological exchanges and cooperation efficiency, this paper presents a dynamic P2P training framework on cloud computing environment. With this framework, the mobile node in system could take training, but also provide training services for other nodes as the same time. With the definition of topological query models for select a training node in cloud domain, it proposes...
The memory architecture design and effective management is the key factor to the widely use of the FC-AE-1553 chip. On the basis of analyzing the FC-AE-1553 chip features, a kind of memory architecture with the characteristics of shared storage, circular storage, and global double buffering mechanism has been presented. This paper describes the implementation of the memory architecture in detail from...
To solve the cumbersome authorization, heavy workload and such problems which exposed in practical applications of the web application access control, the paper introduces a new access control model based on web application(WRBAC). The model classifies the object directly of web application, which can reduce the difficulty of assigning permission between roles and objects. The model improves the efficiency...
Based on customer-oriented e-commerce flow, this paper analyses the knowledge of e-commerce flow and builds e-commerce domain ontology and sub-ontology. Based on this analysis, this paper builds reusable model of e-commerce domain ontology by using ontology construction standard technology. This reusable model can reveal the knowledge and the relationship between knowledge of the e-commerce flow deeply...
The training program is an implemented training plan, and put the designer's design into practice process. To improve the classroom teaching communication skills of university novice teachers, we construct the training content system, and explore the training needs, environment analysis and training modes to design the training activity. Finally, according to pre-designed training programs, we have...
Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity. In this paper, we consider how...
The great availability of massively parallel computing platforms gives rise a question to the EDA industry-how can this be really helping the productivity of circuit designs. Scalability of traditional parallel methods have shown to be limited as the computational resources keep increasing. In this paper we propose a time-domain segmentation method for massively parallel transistor-level simulation...
Requirements patterns help reusing the knowledge of capturing required functionalities and properties of a system. To improve requirements engineering in seismological software development, we identify commonly used requirements patterns. This paper introduces research of identifying two main requirements patterns in projects typical for computational seismology, namely, the forward simulation pattern...
Agent-based modeling is a paradigm that simulates the simultaneous operations and interactions of multiple agents, in an attempt to re-create and predict the appearance of complex phenomena. Its key advantages are that a) it provides the most natural way to model real-world systems and b) it has much more modeling power than traditional mathematical methods such as differential equations as the latter...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.