The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
People count is an important indicator in video surveillance. Due to the overlapping objects and cluttered background, counting people accurately in actual crowded scene remains a non-trivial problem. Existing regression-based methods either learn a single model mapping the global feature to people count, or estimate localized count by training a large number of regressors. In this paper, we present...
Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical methods for anomalous cell detection cannot adapt to the evolution of networks, and data mining becomes the mainstream. In this paper, we propose a novel kernel density-based local outlier...
On the basis of introducing data preprocessing and mining technology, research is developed on clustering and modeling of mining about clinical data (biochemical indicators), to find potential information related with health assessment and disease prediction, and to indicate further research direction. Based on characteristics of clinical data, Sigmoid function is used to preprocess the original data,...
A novel data-hiding scheme with limited intra-frame distortion drift is proposed to hide information in H.264/AVC digital video. The secret message is embedded into the quantized DCT (discrete cosine transform) coefficients of 4??4 residual luma blocks in I frames. By analysis of the relationship between the DCT coefficients and the distortion of the pixel values used in intra-frame prediction, we...
Slow and regular breathing can make beneficial effects on cardiovascular system and autonomic nerve system. Many researches studied the cardiovascular variabilities under paced breathing rate of 0.25 Hz and 0.1 Hz, but few quantitative data are available describing the relationships between the cardiovascular variables during the slow and regular breathing procedure, and mechanism of the beneficial...
A cognitive radio should avoid interference from secondary users to primary users. However, the unknown location of primary receiver makes the problem hard to solve. This paper proposes a novel primary receiver detection to change the passive state of primary receivers. Primary receiver informs the secondary user it's licensed receive frequency according to semaphore architecture via mapping method...
The propagation model of RFID system in the ETC scenario is different from other wireless systems. In this paper, an ??N-Ray?? propagation model that mainly considers the multipath effect is established specialized for RFID systems in ETC. Then simulations are made and the results prove that the model is reasonable.
Nowadays applications of ETC (Electronic Toll Collection) are making a revolution in traffic charging. However, there are still some problems, such as the costs of redundant stations and network construct, the costs of the expensive devices, inconvenience in travels across provinces and so on. Meanwhile, the mobile telecommunication networks in China have got a country-wide coverage as they cover...
Tag anti-collision protocol is one of the most important issues in RFID research, and many new methods have been proposed to solve the problem. In this paper, main anti-collision algorithms are illustrated and analyzed. Consequently, the comparison of these algorithms is summarized, and the perspective of tag anti-collision issues is inferred.
The existing spectrum sharing schemes in cognitive radio have difficulties on guaranteeing the quality of service of secondary system. This paper proposes a risk-estimation based spectrum leasing (RESL) scheme which applies to cellular networks in cognitive radio. In RESL, primary systems are not privileged to take back the spectrum leased unconditionally, and determine whether to lease spectrum according...
The availability of wireless devices and their increasing ability of sharing information has stimulated the emergence of the wireless ad hoc networks. Localization is a fundamental problem that needs to be solved with the best possible accuracy and efficiency. This paper proposes an RSS-based Monte Carlo localization scheme to sequentially estimate the location of mobile nodes, using the log-normal...
The memristor, the fourth element, after its invention by scientists at Hewlett-Packard Laboratories which published a paper on 1 May 2008 issue of Nature, has been capturing worldwide attention due to its potential significant applications. To impel the memristor's implementation in real-world, the more characteristics of memristor based circuit should be studied. In this paper, we study the filter...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.