The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of the Internet of things, more and more sensors appear in our lives. However, at present these sensors are mostly working in isolation. If sensors that have similar or overlapped function can be linked to work together, we can greatly increase the scope and accuracy of perception. This article mainly focuses on the research and implementation of collaborative linkage mechanism...
In an indoor environment, there commonly exist a large number of multipaths due to rich scatterers. These multipaths make the indoor positioning problem very challenging. The main reason is that most of the transmitted signals are significantly distorted by the multipaths before arriving at the receiver, which causes inaccuracies in the estimation of the positioning features such as the time of arrival...
In different color spaces, the three color channels might have different relationship, but most of color face recognition methods exploit the color information in a simple way. In this paper, we propose a novel hybrid fusion scheme for color face recognition, which first uses two-phase test sample representation (TPTSR) to obtain matching scores of each color channel of the test sample and then uses...
In the logistics industry, it is hard to follow and manage the process of transport equipment maintenance in time. The transport equipment maintenance system described in this article shows a new method to solve this problem. This system is a part of a united logistics management system. In the process of design and develop it, we follow the MVC pattern so that the three part of the WSH (WebWork +...
As time goes on, the current running information system produces massive data. Obviously the previous hardware could not fit for managing the much bigger data any more. In order to upgrade the system, there are three main problems need to consider: enough storage space, high reliability, high performance and relatively low cost. As an open-source J2EE framework, SSH2 is widely used by developers to...
With the development of the transport sector maritime industry, in data integration, especially the import and export of data, lack an efficient and quick method. In this paper, we make a research on the XML technical features and design a new data integration structure, including modules for data import and export. Finally we use the new integration structure into practice. On the basis of the XML...
Current alarm systems employed in manufacturing applications are ambiguous in terms of indicating the root causes of process disturbances, which causes many difficulties for decision making. As manufacturing systems increase in complexity and scale, the continued reliance on human operators for alarm information management is impossible. A computer-aided information management system would increase...
The theories and methods of performance evaluation for multi-sensor data fusion system based on Multiple Approximation Space are discussed. A information fusion performance criteria system is founded with C3I applications as background, the evaluation process is similar to the decision process, the general way of integration system evaluation and the algorithm of assign the weights to condition attributes...
In Traditional Chinese Medicine (TCM) education field, the teaching of tongue diagnostics is facing the problem of using abstract or non-quantitative notions. In this paper, a computer aided education tool for TCM, tongue diagnosis system (TDS) is described. By using TDS, the diagnosis features are processed in quantitative manner, and the diagnosis reasoning is objective. The system enables performing...
With the development of e-commerce and internet, the retrieval and reuse methodology of a great deal of faults diagnosis and treatment case knowledge in databases of remote center is a key technology in remote diagnosis and e-maintenance. In this article, firstly, the basic method and shortcoming of retrieval mechanism of CBR system is analyzed. The Manhattan distance and fuzzy method based similarity...
A new feature description is used for human behaviour representation and recognition. The feature is based on Radon transforms of extracted silhouettes. Key postures are selected based on the Radon transform. Key postures are combined to construct an action template for each sequence. Linear discriminant analysis (LDA) is applied to the set of key postures to obtain low dimensional feature vectors...
This paper proposed a new approach for recognition and matching the human behavior sequence. Each human behavior sequence is represented by its key postures to greatly reduce the computation time. Normalization is applied to all the behavior sequences key postures for matching. A dynamic time warping (DTW) algorithm is used to perform the alignment of two time series. Experiments are carried out on...
The metadata plays an essential role in data warehouse for banks. Based on system developing experience, the paper discusses the categories and functions of metadata, and elaborates how to use metadata to manage system. At last the paper presents the architecture of a Metadata Management System based on data warehouse for banks, and illustrated and analyzed its structure. Application results show...
Most of current anti-spam techniques, like the Bayesian anti-spam algorithm, primarily use lexical matching for filtering unsolicited bulk E-mails (UBE) and unsolicited commercial E-mails (UCE). However, precision of spam filtering is usually low when the lexical matching algorithms are used in real dynamic environments. For example, an E-mail of refrigerator advertisements is useful for most families,...
Human key posture extraction will benefit for human action recognition, human action retrieval, human behaviour understanding and so on. This paper proposes an approach to select key postures from a human action video based on Radon transform. Cluster is used on the Radon transform to select the final key postures of human action video. The approach does not require motion extraction from the human...
Human key posture extraction from videos will benefit video storage, video retrieval, human action recognition, human behaviour understanding and so on. This paper presents an approach to select key postures from human action sequences using 2D information. There are two steps in the proposed method. Information measurement which is a kind of global feature of a frame is used to roughly find key posture...
With emphasis on customer demands in clothing manufacture and marketing, the acquisition of customer desirability has secured recognition by more and more people in the early stage of the clothing design. In this paper, clothing is defined and represented by the form of the design knowledge hierarchy structure (DKHS) on the basis of the designers' knowledge. The customer's desirability, which is useful...
C4.5 is a learning algorithm that adopts local search strategy, and it cannot obtain the best decision rules. On the other hand, the simulated annealing algorithm is a globally optimized algorithm and it avoids the drawbacks of C4.5. This paper proposes a new credit evaluation method based on decision tree and simulated annealing algorithm. The experimental results demonstrate that the proposed method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.