The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The journey towards the deployment of next generation networks has recently accelerated, driven by the joint effort of research and standards organisations. Some key innovative design concepts have been recently consolidating and are going to characterise the notable discontinuity between 4G and 5G systems. Among those, Architecture Modularisation, discussed in this paper, is regarded by the authors...
The Blocking Filter(BF) design scheme which can meet the needs of suppressing Torsional Interaction(TI) and avoid Asynchronous Self-Excitation (ASE) simultaneously cannot been found in the BF design of the 5th stage project of the Tuoketuo (TKT) power plant. Therefore a new design method of BF for suppressing both TI and ASE is proposed in this paper, and the principle of the method is also analyzed...
The emerging High-Efficiency Video Coding (HEVC) standard has introduced a number of new coding tools, such as a quad-tree based coding unit (CU). The quadtree-structured coding unit achieves significant coding efficiency improvements compared to H264/AVC. However, the complexity of CU depth decision associated with Rate-Distortion (R-D) cost computation dramatically increased. In order to alleviate...
The emerging high efficiency video coding standard (HEVC) achieves significantly better coding efficiency than all existing video coding standards. The quad tree structured coding unit (CU) is adopted in HEVC to improve the compression efficiency, but this causes a very high computational complexity because it exhausts all the combinations of the prediction unit (PU) and transform unit (TU) in every...
Image in painting has been a popular study point in recent years and a number of strategies have been developed. Partial differential equation (PDE) image in painting approach often acts as a fundamental building block in this area. However, the high computing load limits the application of PDE-based image in painting, especially in mobile terminal. In this paper, first an enhanced Curvature-Driven...
Cloud Radio Access Network (C-RAN) is a trending concept for wireless communication, driven by the increase in mobile data traffic. C-RAN enables the pooling of baseband resources across multiple cell sites. This allows the mobile operator to save both CAPEX and OPEX by statistically multiplexing their baseband resources in response to real-time network demands. The pooling of baseband resources requires...
Video compression plays an important role in mobile applications, because more and more people use video to communicate with each other (like video call etc). However, the resources (energy, memory etc.) on mobile devices are limited, thus how to achieve a high coding performance in these devices becomes a big challenge. The recent standards such as H.264, HEVC and audio video coding standard (AVS)...
This paper describes design and implementation of a multi-programs transport stream multiplexer which is based on AVS system standard. We have developed an AVS TS compliant multiplexer with special considerations for multi-programs multiplexing. In particular, we construct a monitoring structure which can imitate the behavioral model of T-STD and then use the monitoring information as the key factors...
This paper presents a highly efficient external memory interface architecture to improve memory bandwidth utilization for AVS HD video encoder. Both burst and bank interleaved SDRAM accesses are intelligently adopted in the memory interface design. Our proposed architecture is composed of an address mapping layer and an arbitration layer. In the address mapping layer, according to the data request...
The concept of fuzzy tree substitution, fuzzy tree concatenation and fuzzy tree closure are defined, it is shown that we can obtain fuzzy regular tree languages by substitution, concatenation, closure operation on the fuzzy regular tree languages. Finally, we introduce the notion of fuzzy regular tree expressions, and the equivalences of fuzzy regular tree expressions and fuzzy tree automata is proved.
A novel inverse docking program ToxIDock using Particle Swarm Optimization and Chemscore was designed and developed to identify the potential protein targets of perfluoro octane sulfonate (PFOS), a persistent organic pollutant. ToxIDock results from the energy landscape showed that phospho diest erase (PDE), carbonic anhydrase II (CAII), urokinase (uPA) and dipeptidyl peptidase IV (DPP IV) were possibily...
In order to detect atomization angle and uniformity of aircraft engine nozzle, a new method of computer vision is proposed in this paper. Fuzzy C-means clustering and Hough transform are introduced in spray angle and center offset test. Template self-adaptive image matching algorithms is proposed to detect uniformity. The errors of atomization angle and center offset are less than 0.5 degree. In uniformity...
EPS (Evolved Packet System) was designed with a new radio access network LTE (Long Term Evolution). But EPS also supports natively non-3GPP accesses with associated QoS (Quality of Service), security and mobility requirements. Although the initial EPS deployment would be with the introduction of LTE for providing higher data rate, operators would still need to introduce non-3GPP accesses, e.g. WiFi,...
Classification is a major task in the gene sequence analysis. Based on the general principle of artificial immune system, this paper first constructed a classifier which inducted antibody-antigen identification, immune colonel reproduction, hypermutation, affinity mature and the network suppression, by simulating how the antigens stimulate the immune network and how the immune network responds. Then,...
A capacity variable watermarking algorithm for 2D engineering graphic based on complex number system is proposed. The coordinates of vertices in the engineering graphic are extracted to construct complex signals, which are transformed by Fourier transformation. The watermark sequence will be selected m bits each time to have a transformation under complex number base, then the real part and imaginary...
A multiple encryption algorithm is proposed for 2D engineering graphic based on Fourier descriptors and chaos scrambling. The specific coordinates of vertices in the 2D engineering graphic are extracted to construct the corresponded complex signals, which are in turn transformed by Fourier transformation, then bit XOR operation is used between the FFT magnitude coefficients and a binary sequence,...
Secondary structure prediction of proteins has increasingly been a central research area in bioinformatics. In order to know which data encoding approach is more effective whiling predicting secondary structure using SVM, five approaches: ENCOrth, ENCFive, ENCCodBas, ENCCodExt and ENCProf are discussed in this paper. The results of data encoding are used as input of SVM. By performing ENCProf approach,...
The effects of exposure to PEMW (pulsed electromagnetic wave) on function and morphology of the thyroid gland of rats are observed. At different time points (24 h, 48 h, 96 h, 8 d) after exposure to PEMW (E = 115 kVmiddotm-1, 12000 pulses), radioimmuno-assay was performed to observe the levels of thyroid-stimulating hormone (TSH), thyroxine (T4) and triiodothyronine (T3) in sera of those male SD rats;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.