The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In modern information warfare, the traditional management and utilization of sensor resources is difficult to meet with the intelligent and high-efficient requirement of naval fleet. Considering the characteristics of intelligence, reconnaissance and surveillance (ISR) mission, a mission-oriented ISR task planning model and method for Naval Fleet is presented. Based on the hierarchical analysis method,...
A large amount of data is produced in the process of ultrasonic testing of rail, and it's necessary to compress the raw data with a loss-less compression algorithm. This paper analyses statistical characteristics of ultrasonic test data of rail, and makes researches on the commonly used loss-less compression algorithm, Huffman compression algorithm and LZW compression algorithm. In order to improve...
Autonomous as well as teleoperated robots find wide applications in various environments. Their capability to accomplish complex and dynamic operations can be significantly improved by fusing human intelligence with autonomous algorithms. In this paper, we propose a haptic shared control algorithm to provide flexible human assistance for semi-autonomous mobile robots. Through the admittance and impedance...
Grammar induction has received a lot of attention from researchers in the past decades because of its practical and theoretical impact on data compression, pattern discovery and computation theory. There are a bunch of grammar induction algorithms for a given sequence are introduced. Most existing work on learning grammar for a given sequence is based on deterministic approach. Such deterministic...
Side-window detection technology is adopted by the kinetic kill vehicle (KKV) to solve the problem of aerodynamic heat induced by the high speed. A new side-window orientation algorithm is proposed to adjust the KKV attitude angles according to the line-of-sight (LOS) angles to achieve stable and accurate tracking of the target. The time-scale separation methodology is adopted to implement the side...
An interval reliability analysis based on combination of the minimal path method for load point reliability evaluation is presented, aiming at figuring out the uncertainty and ambiguity of reliability parameters and load changing. According to the complexity of distribution network, this new algorithm sort the elements, as the result, which can rapidly obtain the reliability indices of individual...
Sparse LU decomposition is the core computation in the direct method that solves sparse systems of linear equations. Only little work has been conducted on parallelizing it on FPGAs. In this paper, we study parallelization strategies for sparse LU decomposition on FPGAs. We first analyze how to parallelize the right-looking algorithm and find that this algorithm is not suitable for FPGAs. Then the...
We present a hardware architecture for efficient implementation of a Gaussian random number generator (GRNG), using the Monty Python method. To maximize the performance/complexity efficiency, an efficient word-length optimization model is proposed to find out both the optimal integer and fractional word-lengths for signals. Experimental results show that our optimized Fixed-Point design achieves a...
The term recognition and extraction is the foundation of text information processing. This paper presents a domain-specific Chinese term extraction method based on prefix and suffix. Firstly, the commonly used prefix and suffix are extracted from a given set of seed terms. Secondly, we segment the testing corpus to obtain statistics of words which are next to the prefixes and suffixes. And then, we...
For the energy consumption problem of wireless sensor networks, a mobile agent routing based on improved genetic algorithm (MARIGA) is proposed in this paper. This algorithm introduces a new crossover strategy and mutation operator to effectively control the premature stagnation in the convergence process. The simulation results indicate that the MARIGA algorithm can effectively improve the routing...
Fractional motion estimation (FME) as a complement to integer motion estimation (IME) conducts higher compression rate in video coding. Based on multiple reference frames and all modes of variable-block-size (VBS) motion search, the common FME algorithm and architecture generally causes high computational complexity. It consumes plenty of time and hardware resources to process the real-time (30fps)...
In this paper, it is just doing a preliminary exploration to the multi-antenna array. The immune algorithm is used to achieve different directions for beam-forming and even pattern scanning. The array switches are loaded among the antenna arrays. The feed states and the switches among the arrays are controlled by using immune algorithm. Producing a particular orientation antenna pattern is regarded...
A new autonomic physical cell ID configuration scheme was proposed based on self-configuring techniques and hyper graph. The self-configuration procedure was also obtained for the newly deployed nodes. It is proved that the algorithms can solve the collision and confusion free problem in LTE networks, and the number of PCI being used is minimized. We also show that the scheme is not dependent on the...
Association rules mining is one of the most important tasks in the field of data mining. It aims at searching for interesting relationship among items in a large data set. In this paper, we present a novel approach for mining the fuzzy weighted association rule from boolean and fuzzy data in large data set, where a weighted value is assigned to each item, we develop a novel approach to calculate the...
Forest type identification is one of most important contents of forest inventory. K nearest-neighbour algorithm has already proven their use in forest mapping. However, as the remote sensing data was large scale, the efficiency of processing based on KNN decreased seriously. Therefore, the study implemented a tool which could have the feature of fast processing multi-spectral data based on KNN. For...
Time series data is ubiquitous and plays an important role in virtually every domain. For example, in medicine, the advancement of computer technology has enabled more sophisticated patients monitoring, either on-site or remotely. Such monitoring produces massive amount of time series data, which contain valuable information for pattern learning and knowledge discovery. In this paper, we explore the...
Maximal frequent itemsets mining is a fundamental and important problem in many data mining applications. In this paper, we present GMPV, a depth first search algorithm, which accurately displays itemset based on position vector, for mining maximal frequent itemsets. In GMPV algorithm, the transaction database is mapped to a Boolean matrix. The methods superset checking and pruning based on support...
The DNA microarray technology enables rapid, large scale screening for patterns of gene expression. It is meaningful to detect useful phenotypes and the informative genes that can manifest these phenotypes in gene expression data. While the existing methods of phenotypes discriminating are most supervised methods, they train samples based on the known informative genes. In this paper, we propose an...
For the contradiction between accuracy and data size, this paper introduces an improved estimation algorithm of symbol synchronization based on the maximum mean power estimation algorithm. A Deslauriers-Dubuc interpolation filter is used in the improved algorithm. Analysis of experimental results showed that the estimation algorithm proposed in this paper not only improves the accuracy of estimate,...
Due to the limitation of computing complexity, it is difficult to apply the H.264 deblocking filter to low-end terminals. Although some technologies to optimize it have been proposed, the complexity is still high for real time implementation. Considering that deblocking filter is applied to all of the vertical and horizontal edges of 4times4 blocks but only some of them actually need to be filtered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.