The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the recent literature, the architecture of energy internet was proposed to replace the current smart grid in the future. However, the energy sharing concept and the uncertainties of intermittent energy sources will cause the short-term energy management for the future energy internet much more complicated than current centralized control energy management for traditional power generation system...
Prior research has shown the potential of device-free WiFi sensing for human activity recognition. In this paper, we show for the first time WiFi signals can also be used to uniquely identify people. There is strong evidence that suggests that all humans have a unique gait. An individual's gait will thus create unique perturbations in the WiFi spectrum. We propose a system called WiFi-ID that analyses...
G-protein-coupled receptors (GPCRs) share a characteristic core composed of seven-transmembrane ??-helices represent by far the largest family of cell-surface molecules involved in signal transmission, accounting for ??2% of the total genes encoded by the human genome. At present, most data types supplied by databases of GPCRs and relative proteins are mainly protein structure data, ligand binding...
Text mining refers to extract high-quality information including entities and relationships between them from text. Although several methods have been applied to extract protein interaction relationships and other information, few researches have focused on dealing with sentences for extracting precise relationships. This paper has provided several strategies in the processes of filtering the sentences...
In this article we propose a modified bit map image hiding method which utilizes run-length information and an additional bit value for enlarging hiding capacity. A run-length approach for image steganography was firstly proposed by C.C. Chang et al. They have shown that the approach earns high capacity for secret data containing long runs of repeating bits. By our modification, the hiding capacity...
Noise-like waveform and strange attractor are considered as important characteristics of chaos. In this paper, a new chaotic system with a novel attractor looking like limit cycle, which generates a sine-like output waveform, is found. The existence of chaotic signal with sine-like waveform is further investigated by employing several numerical tools and verified by simulating an experimental circuit.
Nowadays, with the rapid development of distributed generation, it has an increasing rate of permeation, the islanding phenomenon in grid-connected run mode brings hazards to network, electrical equipment and life safety. So, it is necessary to effectively detect the islanding condition and swiftly stop the run mode of grid-connect. In this paper, three-phase inverter and network systems was taken...
ldquoParticipatory sensingrdquo is an exciting new paradigm where people voluntarily sense their local environment and share this data using mobile phones and the Internet. It can revolutionize applications such as intelligent transportation, public health and social networking. However, a major concern is the amount of trust that can be placed in the shared data. We address this concern in our demonstration...
We propose a light weight algorithm to classify cane-toads, a non-native invasive amphibian species in Australia as well as other native frog species, based on their vocalizations using sharply resource-constrained acoustic sensors. The goal is to enable fast in-network frog classification at the resource-constrained sensors so as to minimize energy consumption of the sensor network by reducing the...
In this paper we propose features based on sub-space projection methods using Principal Component Analysis (PCA) and Independent Component Analysis (ICA) on wavelet sub-band for face recognition. Wavelet based sub-band decomposition helps to reduce the size of image, and the approximate image obtained in the low-low (approximate) band is used here to apply sub-space projection methods. This improves...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.