The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Moving target detection (MTD) based on the FFT technology cannot resolve the range migration problem, while traditional methods of compensation for range migration always increase the computational complexity, and causes the engineering implementation difficulty. In order to solve problems above, embarking from the high performance DSP TMS320C6678, the author uses the method of range subsection for...
Pattern recognition (PR) based myoelectric hand control has become a research focus in the field of rehabilitative engineer and intelligent control. However, the state of the art method is hardly adopted for clinical use because of signal interfered by shift, fatigue and user-unfriendly of retraining. The aim of this study is to evaluate the performance of different kinds of online algorithms in classifying...
To construct a signed network for online social networks would be very useful for Ad Serving, friend recommendation, and Web spammer detection. In the construction of the signed network for certain online social networks (e.g. microblog), sentiment analysis plays a critical role, and the construction of a signed networks turns out to be a big challenge with the rapid growth of the online social networks's...
In this paper the precise foreground mask is obtained in a complex environment by applying simple and effective methods on a video sequence consisting of multi-colour and multiple foreground object environment. To detect moving objects we use a simple algorithm based on block-based motion estimation, which requires less computational time. To obtain a full and improved mask of the moving object, we...
Data of network forum is massive and instant. Topics are plentiful. So it challenges to compare the authority value of lots of users. There are many difference between academic paper rank and rank of users in network forum, such as scale in quality, usage, citation count, file length. Difference between user rank with web page is: clear link relation in web but not in network forum, mutual-reinforcement...
Outlier detection is a hot topic of data mining. After analyzing current detection technologies, a detection method of outlier based on clustering analysis is proposed, in which an effective sample is screened out from original data. According to agglomerative of hierarchical clustering, credible sample set is found. Then mathematical expectation and standard deviation are obtained by credible sample...
It proposes a SIFT-RANSAC algorithm for the object recognition of moving vehicles combining the SIFT image matching theory and RANSAC algorithm. The paper designs a detection system, the Intelligent Traffic Management, which is used to solve the difficulties, such as traffic lanes changes, large body sizes and mutual interference between vehicles and so on, in the previous frame and the update frame...
Multi-domain collaborative environments are becoming a reality as can be witnessed in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such multi-domain environments is a crucial challenge. Decentralized secure interoperation approaches are becoming promising since it requires no centralized administration and thus can accommodate very large scale...
Outlier detection is a hot topic of data mining. After studying the existing classical algorithms of detecting outlier, this paper proposes an outlier mining algorithm based on confidence interval, and makes a new definition for outlier. The method combines mathematical statistics and density-based clustering algorithm. It clustering firstly with DBSCAN algorithm, obtains credible sample and suspicious...
Support vector machine (SVM) is widely applied to fault diagnosis of machines. However, this classification method has some weaknesses. For example, it cannot separate fuzzy information, particularly sensitive to the interference and the isolated points of the training samples. Besides, it has great demand for memory in calculation. In view of the problems mentioned above, a binary tree-based fuzzy...
Current Memory-Space-Memory Clos switching fabric exhibits poor performance under unbalanced traffic. To eliminate the internal congestion within the switching fabric, by taking buffers into the internal links, this paper proposes an alternative Fully Buffered three-stage Clos switching fabric-FBC, which not only provides perfect throughput performance, but also exhibits better delay performance in...
Role Based Access Control (RBAC) has been shown to be a promising approach to ensure secure access in pervasive environment. In an RBAC system, users acquire permissions by activating roles authorized to them in user sessions. Hence, determining role sets that can be activated in a single user session is an important issue. In particular, systems employing an RBAC model extended with hybrid hierarchy...
The flexibility and dynamism of service-oriented architecture (SOA) makes it critical to monitor and manage services behaviors at runtime for performance assurance. In this paper, two efficient evidence channel selection (ECS) algorithms are designed to select service run-time data collection locations for business process management. The design of ESC algorithms are based on the classic facilities...
One of the challenges in SOA is to provide an efficient and effective way to select compatible Web service(s) and compose them into a functional service process that satisfies a user's needs. Moreover, the Web services(s) selected may be integrated with structures such as branches and merges to fulfill a task. This paper describes our system architecture and strategies on Web services composition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.