The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Given the popularity of the social networking in the recent past, Microblogging services are also developing and attracting people at a rapid pace. Microblogging facilitates users to share, comment and broadcast their daily activities and events based on the relationships they established with other users in the social networking sites. This paper focuses on event detection by analyzing the document...
Feature extraction is the key step of synthetic aperture radar (SAR) target configuration recognition. A statistical model embedding the locality preserving property is presented to extract the maximum amount of desired information from the data, which is of crucial help to recognition. The noise, or error, of the SAR image samples is described by a Gaussian mixture distribution, and the locality...
This paper gives the analysis of the feature of the medium voltage powerline communication in the view of reliability, investment and flexibility and the discussion of the necessity of routing automatically, compares the advantages and shortcomings of the bionic algorithms people research on a lot. It proposed an improved automatically dynamic routing algorithm for medium voltage powerline communication...
Process of spectrum allocation is equivalent of rental market in cognitive radio, in order to rent free spectrum of authorized users to cognitive users. the lessors of Spectrum( between authorized users )use the methods of competition between authorized users, Lessees of Spectrum( between cognitive users ) also used the methods of game, the spectrum allocation between authorized user and cognitive...
Web sequential pattern mining is an important way to learn the access behavior of Web users. In this paper, we present an efficient method of Web sequential pattern mining in the e-learning environment. Different from traditional mining methods, we categorize the user sessions into human user sessions, crawler sessions and resource-download user sessions. Then we filter out the non-human user sessions,...
Template matching is an effective approach for pedestrian detection. In order to achieve real-time and accurate detection, how to obtain a suitable representative template set is still an open problem due to the large variety of pedestrian shape. This paper introduced a representative template generation method for a template matching based pedestrian detection system (PDS). Based on nonlinear manifold...
Fault identification method provides a great enhancement by using evolutionary algorithms in complex mechatronics systems. A Mutation-based Bayesian optimization algorithm is presented to improve the efficiency of Bayesian optimization algorithm (BOA). The mutation operator which makes full use of local information is combined into BOA by diversity function. The original objective is to combine the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.