The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to reduce the error caused by the inaccuracy of the sensor data and the wear of the mechanical structure in the motion control of manipulator and improve the self-learning ability of manipulator, this paper investigates a new method. We first use Kalman filter to compensate the error by fusing sensor data and the state error of the manipulator. Then, we use Q-learning to make manipulators...
Modelling and simulation for aimed warhead anti-air missiles encountering targets has been researched. The second-order encounter model is carried out by least squares fitting based on control points, which is applied to solve the issues as low precision and poor adaptability of ideal linear encounter trajectory. For this model, a linear equivalent trajectory (LET) is proposed to reduce computation...
Visual saliency detection is usually a prerequisite for image processing tasks like object segmentation, object recognition and information compression. In this work, we first present a novel method that combines cognitive-based objectness and image-based saliency to obtain a better saliency map with less negligible background information. Then, by introducing some top-down attention priors, we further...
Loop closure detection (LCD) is a process trying to find a match between the current and a previously visited locations in SLAM. The bag of words (BoW) is a popular approach used in LCD, however, limited by perceptual aliasing primarily due to vector quantization. This paper proposes an improved method of the BoW called spatial partitioning BoW(SPBoW). We first apply scene segmentation to integrate...
Knowledge Heterogeneity is the source of Knowledge Collaboration in Enterprise while the Virtual Practice Community constructed with Web 2.0 technology is a very important way to gain heterogeneous knowledge. Active Cross-border Innovation makes the virtual practice community to be heterogeneous knowledge preference nowadays. However, the appropriate degree of knowledge heterogeneity that can excite...
Weld inspection is a recurring topic in nondestructive testing because of the potential safety and environmental impact associated to poor weld quality. Thick-wall, multi-pass welds are very common in construction, bridge building, ship building, pressure vessel, and many other industries. This paper presents a novel technique to provide process and quality control of a partially completed weld after...
In order to improve the spectrum utilization while providing a fairness guarantee between users under the dynamic spectrum resources, the optimization problem for the scheduler of OFDM system with an unlimited queue capacity in cognitive radio networks (CRN) is first formulated. Then, under the constraints of the optimization problem, the Genetic Algorithm for Cognitive Radio Scheduler (GACRS) is...
Objective: To evaluate the emotion and quality of life on mild to moderate insomnia intervened by Chinese Medicine in the integrated program. Methods: Patients (18 to 56 years old) with mild to moderate insomnia from the Five National Center were randomly divided into two groups according to the central. Experimental group: sleep hygiene instruction + balance acupuncture+ Chinese herbal drug; control...
With deregulation of power system market, the uncertainties in modern power system increase, risk assessment has become an effective tool for power system analysis considering the uncertainties. A software named as BTNRAS (Bulk Transmission Network Risk Assessment System) is presented in this paper. Besides quantitative risk evaluation indices, BTNRAS provides some auxiliary functions, such as risk...
In sea sand by the determination of free chlorine ions to study the chloride ion to the strength of sand concrete. Experimental data show that between 0% to 0.1% chloride ion content of sea sand concrete strength comparison between the value of a group that is found in 20% of fly ash were mixed with 3 days flexural strength is increased with the concentration of chloride ion Rise, the other group...
Sea sand concrete is a kind of concrete in which mixed sea sand as fine aggregate, which is large-scale application in the coastal areas in recent years, especially in Ningbo area. The sea sand solves the problem of river sand shortage, coupled with cheaper price, most of the ready-mixed concrete companies are willing to use desalted sea sand instead of river sand. Many companies even are using sea...
The increasing demand on multi-media services with very different QoS requirements and the employment of new wireless network protocols like 802.11 and 802.16, underscore the need for a network capable of supporting multi-services. Based on the LWDF (Largest Weighted Delay First) algorithm, DS-LWDF (Differentiated Service-LWDF) algorithm is proposed to realize the scheduling among RT (Real Time) and...
Agility means the capability of operating profitably in a competitive environment of continuous and unpredictable changes with software process regarded as one of its main method. The research focuses on the assessment of software process to support agile. The assessment framework is constructed upon a series of competitive bases and agility attributes identified in the literature. The framework is...
The purpose of this paper is to research the relationship between social network structure and knowledge sharing in an organization or team, and to analysis the impact on knowledge sharing form social network. Taking a project team for case, we interview all people of the team, and draw a network diagram to discuss the relationship between social network and knowledge sharing.
A novel cross-layer scheduling algorithm with guaranteed QoS is proposed in CRN. A distinct scheduling priority integrating UCSI, QSI and QoS requirements is first proposed for CUs. Base on these scheduling priorities and specific scheduling mechanism, packet scheduling and channel allocation are jointly designed. The simulation results reveal that the proposed algorithm suffers a limited decline...
Firm's organization structure is influenced by many factors, and relationship between IT capability and organization structure in the network environment has attracted much attention. This paper analyzes how IT capability impact on dimensions of organization structure through questionnaire. Result shows that IT capability has positive impact on horizontal differentiation, vertical differentiation,...
Risk identification is a key stage for the success and quality of in risk management of software projects. It seems being overlooked far away about the concept of knowledge ontology, which the risk identification involves. In this paper, it is applied ontology based reasoning approach into risk identification of software projects making for identifying essential factors and relationships among the...
Firm IT capability is influenced by many factors and the relationship between IT capability and organization structure in the network environment has attracted much attention. Based on resource-based view (RBV), this paper constructs the relevant hypotheses about the relationship between organization structure and IT capability, the relationship between organization structure and dimensions of IT...
Based on individual interview and questionnaire survey, this paper constructs a model of the impacts of IT capability on the risk of project implementation, and makes three hypotheses which been tested by structural equation model. Finally we find that the risk of IT project implementation would be reduced by improving the IT capability of staff of customer enterprise, but the influence of IT infrastructure...
This paper introduces the advanced technical idea of workflow technology to manage the procurement process with flexibility, which can satisfy the requirements of necessary changes rapidly for the modern enterprises. On the basis of reference model of workflow, the data structure of workflow relevant data which used to manage and control the process in workflow engine are discussed firstly. Then,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.