The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Kinect-based feedback system is developed for static balance ability training in this study. It includes three parts: (1) a series of demonstrations of training movements, (2) evaluation of user's gesture, and (3) real time feedback. We tested the feasibility of our feedback system to improve static balance ability with twelve participants. The participants learned and performed three movements...
We applied a speech-to-text recognition (STR) and computer-aided translation (CAT) systems to support multi-lingual communications students participating in cross-cultural learning project. The participants were engaged in interactions and information exchanges in order to learn and understand cultures and traditions of their peers. Their communications were carried out in their native languages on...
A quasi-optical (QO) mode converter for a 0.42-THz, TE26 mode, pulsed gyrotron is designed, fabricated, and tested. Based on the geometric optics principle, vector diffraction theory, and the iterative Stratton–Chu method, a computer code is developed to design and optimize the QO mode converter. The scalar Gaussian mode content is about 93.7%, which agrees well with that obtained by the electromagnetic...
An improved cloud resource revenue optimization models are proposed, which include the benefits of service providers and users negotiate SLA agreement. And the models define the constraint mechanism for describing service quality problems such as service response time and customer satisfaction. We design the comprehensive response indicator and use this indicator to quantify the rationality of the...
Android has dominated the market of mobile devices. Meanwhile, it has become the main target for attackers. How to detect and analyze Android malicious applications (malapps) is an ongoing challenge. Current malapps have become increasingly sophisticated. In particular, zero-day (unknown) malapps appear very frequently and can evade most detection systems that are based on the signatures or patterns...
Compared to conventional control systems, network control system has advantages in lower installation costs and easier maintenance. Regarding computer control, a design for network control system is proposed based on CAN (Controller Area Network). Through optimizing the design of the network adapter, computer centralized control algorithm can be applied to a simple network control. After analyzing...
Information-Centric Networking (ICN) proposals rethink the communication model around named data, in contrast with the host-centric transport view of TCP/IP. The content retrieval in ICN is natively receiver-driven, chunk-level based, multi-path forwarding and intrinsically coupled with in-network caching. To make the best use of in-network caching resources, NDN router should acquire the view of...
Content-Centric Networking (CCN) proposals rethink the communication model around named data. In-network caching and multipath routing are regarded as two fundamental features to distinguish the CCN from the current host-centric IP network. In this paper, we tackle the problem of joint collaborative caching and multipath routing in CCN. We achieve this with an online and offline combination caching...
The rapid development in the field of computer graphics (CG) makes it quite easy to create photo-realistic images and videos. This brings forward an emergent requirement for techniques that can distinguish CG from real contents. In this paper, we propose a method that leverages human pulse signal to distinguish between CG and real videos that include human faces. We use a robust tracking method to...
An advanced digital backpropagation algorithm is proposed for subcarrier-multiplexing systems. Efficient intra-channel nonlinear compensation is experimentally demonstrated using this algorithm with 40 spans/step and 16 spans/step for QPSK and 16QAM formats, respectively.
We demonstrate that the surface leakage current of a Ge0.95Sn0.05/Si p-i-n photodiode can be significantly reduced by -two orders by Si surface passivation. Furthermore, a dark current density of 0.073A/cm2 (Vbias= −1 V) is achieved.
This paper introduces a 2-D index map coding of the palette mode in screen content coding extension of the High-Efficiency Video Coding (HEVC SCC) standard to further improve the compression performance. In contrast to the current 1-D search using RUN to represent the length of matched string, we bring the block width and height to describe the arbitrary rectangle shape. We also use the block vector...
We study the multi-resource allocation problem in cloud computing systems where the resource pool is constructed from a large number of heterogeneous servers, representing different points in the configuration space of resources such as processing, memory, and storage. We design a multi-resource allocation mechanism, called DRFH, that generalizes the notion of Dominant Resource Fairness (DRF) from...
Sensing falsification is a key security problem in cooperative spectrum sensing for cognitive radio networks. Most previous approaches assume that malicious users only cheat in their sensing reports following a predefined rule. However, some malicious users usually act intelligently to strategically adjust their malicious behavior according to their objectives and the network's defense schemes. The...
User profiling plays an important role in online news recommendation systems. In this paper, we analyze the relationship between users' clicking behaviors and the category of the news story to model user's interests by mining web log data of an adaptive news system. We train a Memory-based User Profile (MUP), which imitates human being's learning, remembering and forgetting mechanisms, to predict...
In applications of the navigation and control of unmanned ground vehicles in a cross-country environment and tele-driving a rover on the unknown lunar surface for scientific exploration, human-computer interactive path planning and planned path tracking is a significant way of teleoperation. In this paper, we use the method based on Rapidly-Exploring Random Trees (RRTs) to solve the robot path planning...
Recently in Chinese Journal of Computers, Kanget al. proposed an efficient CCA secure public key encryption (PKE) scheme, and claimed that it is more efficient in the public/private keys than the famous CS98 and BMW05 CCA secure public key encryption scheme. However, in this paper we will show that their proposal is not secure at all. Furthermore, we improve their scheme to be a secure one and prove...
Compared with other large-scale warfare simulation systems, wargame, as a traditional type of warfare simulations, has the advantages of low cost, convenience, practicability, etc. In order to realize Human-Computer Confrontation, Computer Generated Forces (CGF) technology has been added to wargame, which would enhance wargame's training and decision support ability. Based on computerization of “Future:...
This paper describes an enterprise data warehouse management technology in practical application, proposes the establishment from the data warehouse. With the problem emerging in aspects of real-time and regulatory warehouse management, it applies technology combining RFID and the WSN technology to the storage management. It achieves intelligent storage environment which meet the requirement of materials...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.