The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In deep neural networks, inputs in each layer are affected by all previous parameters of input layers, so even small changes in input distributions to the network are delivered to internal layers, for leading to differences between source domain and target domain, which is known as covariate shift. Batch Normalization(BN) is designed to address the issue, and makes normalization for each training...
It has become routine for large volumes of data to be generated, stored, and processed across geographically distributed datacenters. To run a single data analytic job on such geo-distributed data, recent research proposed to distribute its tasks across datacenters, considering both data locality and network bandwidth across datacenters. Yet, it remains an open problem in the more general case, where...
We describe an emerging application of data mining in the context of computer networks. This application concerns the problem of predicting the size of a flow and detecting elephant flows (very large flows). Flow size is a very important statistic that can be used to improve routing, load balancing and scheduling in computer networks. Flow size prediction is particularly challenging since flow patterns...
Apart from his remarkable translation career, the Tang Tripitaka Master Xuanzang was also a brilliant exegete who left us with Cheng weishi lun and Verses Delineating the Eight Consciousnesses, two expositions of lasting academic value. This paper argues that the doctrines put forth in these two works of Xuanzang should not be regarded as simply one of many Buddhist doctrinal systems. Examined from...
An evaluation of electrostatic-discharge (ESD) reliability by changing the source-end layout of 45-V HV pLDMOS devices is investigated in this paper. After testing and systematic analysis, it can be found that a traditional pLDMOS sample is always very weak in ESD issues (It2= 0.107-A). At the same time, if a pLDMOS with a stripe type embedded SCR (p-n-p-arrangement in the drain-end); the corresponding...
In this paper, we propose an indoor action detection system which can automatically keep the log of users' activities of daily life since each activity generally consists of a number of actions. The hardware setting here adopts top-view depth cameras which makes our system less privacy sensitive and less annoying to the users, too. We regard the series of images of an action as a set of key-poses...
Algebraic-geometric (AG) codes have long been considered as a possible candidate to replace Reed-Solomon (RS) codes. However, their decoding remains complex and infeasible to implement. Addressing this challenge, our paper proposes a low-complexity Chase (LCC) decoding algorithm for the most popular class of AG codes - Hermitian codes. The LCC decoding is realised by formulating decoding test-vectors,...
Human can quickly and effortlessly focus on a few most interesting points in an image. Different observers tend to have the same fixations towards the same scene. In order to predict observer's fixations, eye gaze information can be used to reveal human attention and interest. This paper presents a real-time eye gaze tracking system. Haar cascade classifier is used to calculate the position of eye...
A composite evaluation scheme is proposed for evaluation of students' composite abilities including self-learning, teamwork cooperation, manipulation, oral presentation ability, summing up, analysis, report writing, and innovation ability. In this scheme, final mark for each students consists of four parts, including "in-class performance" mark, "after-class performance" mark,...
With the popularity of Internet of Things, lots of resource constrained devices equipped with sensors and actuators are pervasively deployed to compose a smart environment, and Big Data are obtainable for a system to do further analytics thus to achieve human-centric purposes. One such human-centric system is a smart home which analyze Big Data to recognize contexts and their corresponding preferences...
How to effectively enhance the reliability robustness in high-voltage BCD processes is an important issue. A p-channel lateral-diffused MOSFET with an embedded SCR which is formed by implanting N+ doses in the drain side and divided into five regions, this structure called as the "pnpnp" arranged-type of pLDMOS-SCR in this paper (diffusion regions of the drain side is P+-N+-P+-N+-P+). Then,...
With the growing population of aging people around the world, there is an increasing needs for elders to be aware of their health status not only in hospital but also in home environment. Due to recent advances of health monitoring technologies, elder people are able to easily assess their physiological well-being at home. However, most of current physiological monitoring systems focus on the patient...
A traditional context-aware energy-saving system is often re-active, which means the decision of the system is made purely based on the currently available contexts of the users in the sensed environment. However, the advances in internet-of-things (IoTs) enable the potentials of leveraging predictive contexts to facilitate proactive energy-savings services. Therefore, this paper proposed hybrid context...
Fair bandwidth allocation in datacenter networks has been a focus of research recently, yet this has not received adequate attention in the context of private cloud, where link bandwidth is often shared among applications running data parallel frameworks, such as MapReduce. In this paper, we introduce a rigorous definition of performance-centric fairness, with the guiding principle that the performance...
Cooperative Communication is a wireless communication scheme, which gains signal transmission diversity through user cooperation. In cooperative communications, the existing relaying strategies include amplify-and-forward (AF) and decode-and-forward (DF). Moreover, cooperative communications through opportunistic relay selection and nonorthogonal signal transmission can further improve the system...
This paper presents a new structural feature for feature-based retinal image registration. The conventional point-matching methods largely depend on the branching angles of single bifurcation point. The feature correspondence across two images may not be unique due to the similar angle values. In view of this, structure-matching registration is favored. The bifurcation structure is composed of a master...
In this paper, we use a recognition method for a self-recognition robot aiming to recognize potential isomorphism between two configuration graphs of the robot. A self-recognition modular robot is formed by a set of robotic modules. This self-recognition modular robot is able to change its shape by changing the way in which these multiple modules cooperate so as to conform to different working environments...
A nonlinear observer based method is proposed to solve the forward kinematics problem of the 6-DOF parallel manipulator (Stewart platform). In this paper, the forward kinematics solution is achieved by using a nonlinear observer designed to estimate the system states including 3-axis translations and rotations. The forward kinematics problem of the Stewart platform is often solved using Newton-Raphson...
Linguistic steganography is an art of concealing secret messages. More specifically, it takes advantage of the properties of natural language, such as the linguistic structure to hide messages. In this paper, an effective method for linguistic steganography detection is presented. In virtue of the concepts in area of information theory, the method uses an information entropy-like statistical variable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.