The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
5G-based Vehicular Social Network (VSN) fiercely calls for an advanced requirement of vehicle's location and trajectory privacy preserving scheme. Since the VSN owns the characteristics of high mobility and multiple hops relay, we first construct an architecture of 5G-based VSN with the Mobile Femtocell (MFemtocell). Then we propose the Dynamic Group Division algorithm (DGD), which is suitable for...
We propose a simple yet effective structural patch decomposition approach for multi-exposure image fusion (MEF) that is robust to ghosting effect. We decompose an image patch into three conceptually independent components: signal strength, signal structure, and mean intensity. Upon fusing these three components separately, we reconstruct a desired patch and place it back into the fused image. This...
With the development of online shopping and the demand for automated packaging systems, we propose an Internet of Things (IoT)-based automated e-fulfillment packaging system and a 3-D adaptive particle swarm optimization (PSO)-based packing algorithm. The proposed system leverages the IoT to connect the data collection and conversion layer, the packaging management layer, the decision-making layer,...
Energy consumption in data center has already become a widely concerned issue in cloud computing research. There are many studies on data center energy efficiency optimization. But most of them focus on the energy consumption of the servers and cooling equipment. Few of them considered data center network (DCN), which is also a significant energy consuming component. By applying newly emerged Software...
Multi-scale Retinex algorithm is an image enhancement algorithm that aims at image reconstruction. The algorithm maintains the high fidelity and the dynamic range compression of the image, so the enhancement effect is obvious. The algorithm exploits a large number of convolution operations to achieve dynamic range compression and color/brightness rendition, and the calculation time increased significantly...
For the wiped film molecular distillation system which has the characteristics of multiple parameter, large inertia, large time delay, nonlinearity and others, adjustment it's parameters mainly bases on human experience. In order to stabilize the production process, Extreme Learning Machine network is used to model the molecular distillation system and proposes heuristic dynamic programming algorithm...
Foreground detection is widely used in many applications of computer vision and artificial intelligence. In this paper, a novel online algorithm of detecting moving objects in complex scenes is proposed based on incremental nonnegative matrix factorization (INMF). In this algorithm, a new video frame is modeled as a linear combination of basis vectors of background subspace, plus a sparse term which...
Sequential data modeling has received growing interests due to its impact on real world problems. Sequential data is ubiquitous -- financial transactions, advertise conversions and disease evolution are examples of sequential data. A long-standing challenge in sequential data modeling is how to capture the strong hidden correlations among complex features in high volumes. The sparsity and skewness...
With the rapid development of the cloud computing, personal health record (PHR) has attracted great attention of many researchers all over the world recently. However, PHR, which is often outsourced to be stored at a third party, has many security and efficiency issues. Therefore, the study of secure and efficient Personal Health Record Scheme to protect users' privacy in PHR files is of great significance...
This work presents a method for solving optimal number and location of power quality monitors in transmission power systems. The problem is modeled as a multi-objective problem to acquire a tradeoff between the data redundancy and the economical efficiency. A multi-objective optimal placement model is built, in which the monitoring locations and the number of monitors are taken as objects. Adaptive...
Cache technology has emerged as a promising approach for distributed web systems to mitigate the web server's data access performance bottleneck. In this paper, we propose a decentralized load balancing architecture. The cache system takes advantage of the decentralized architecture for providing scalability and high availability. It can provide content requested by a user if it is cached in any of...
To solve the problem of detecting salient moving object in the video shot by static camera, a new spatio-temporal object detection algorithm is proposed in this paper. Firstly, Hypercomplex Fourier Transform(HFT) is used to the current video frame to achieve the static salient region; then, the moving salient region is detected by an improved three frames difference algorithm; finally, the static...
The big pressure of huge traffic requires people to consider how to improve the network efficiency. One of possible solutions is to reduce the traffic entering the metro/core networks. A flexible PON architecture based on software defined network technology is proposed to increase the exchange capability of local access network, which is comprised of an OLT pool, an ONU pool, a flexible ODN, and a...
Emerging as an important potential approach to the operation of lossy communication networks, Network Coding (NC) has been proposed to combine with TCP called TCP-NC by MIT. However, the key parameter R that is brought in for sending redundant packets against random loss is preseted and stays constant, therefore, chances are that it may fail to work. In this paper, we proposed a dynamic redundancy...
In this paper, gesture recognition algorithm with kinect sensor is proposed. the depth cue is used to locate the hand area. Based on the histograms of oriented gradient (HOG) and adaboost learning methods, the static hand algorithm is designed to recognize the predefine gesture in the hand Area. by tracking the hand trajectory by kinect, hmms is used to train and classify dynamic gesture. an intelligent...
In order to solve problems as high error diffusion and instable convergence of Recursive Least Squares (RLS) algorithm in Code Division Multiple Access (CDMA), this paper combined local steepest drop characteristic of steepest descent algorithm presented a stable convergence and lower complexity algorithm -- D-RLS in condition of high multiple access interference (MAI) and intersymbol interference...
In order to compensate for the shortage of existing load balancing algorithm, aiming at the “hotspot” data accessed in P2P systems, a load balancing algorithm with traffic control for heterogeneous P2P systems using mobile agent is suggested. It can prevent the congestion phenomenon produced by the sudden increase in network traffic. Theory analysis and experiment results show that the algorithm greatly...
One of the most crucial steps in the design of embedded systems is Hardware/Software(HW/SW) partitioning, that is, deciding which components of the system should be implemented in hardware and which ones in software. Most formulations of the HW/SW partitioning problem are NP-hard, so most of the research efforts on HW/SW partitioning has focused on developing efficient heuristic. In this paper , we...
Based on the existing load balancing algorithm, aiming at the “hotspot” data accessed in P2P systems, a load balancing algorithm for heterogeneous P2P systems using mobile agent is proposed, which effectively balances loads of peers distributed among P2P systems with the help of autonomous agent called Mobile Agent. Experimental data shows that the algorithm greatly reduces the communication costs,...
Finding the longest cycle is a novel concept in biochemical feedback loop analysis in systems biology. Biochemical networks are often represented as directed graphs in which vertices represent chemical compounds and edges represent chemical reactions between compounds. Therefore, a biochemical longest feedback loop can be formulated as the longest cycle in a directed graph. Because finding the longest...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.