The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Document Object Model (DOM) provides a tree structure called DOM tree for representing with objects in HTML. Many researchers have considered using leaf nodes of DOM tree as basic objects in extracting information from web pages. However, web pages are more of information blocks which each have a consistent visual format rather than individual DOM tree nodes. And those information blocks do not...
To detect a node flip ambiguity in range-based wireless network node localization, Wang et al. have proved that the flip ambiguity detection is equal to whether there is a straight line intersecting with all range error circles of reference node, which is called the existence of intersecting line (EIL) problem. To solve the EIL problem under equal radii, a convex hull algorithm proposed by Wang et...
Virtualization is a double-edged sword in large scale cloud computing environments. On one hand, virtualization provides a logical and unified view of the underlying cloud resources to facilitate more efficient resource utilization and to support multi-tenancy. On the other hand, virtualization introduces additional layers of indirections which make the virtual-to-physical resource mapping relationship...
Human action recognition is very important in human computer interaction. In this article, we present a new method of recognizing human actions by using Microsoft Kinect sensor, k-means clustering and Hidden Markov Models (HMMs). Kinect is able to generate human skeleton information from depth images, in addition, features representing specific body parts are generated from the skeleton information...
This paper proposes an approach to locate the patched vulnerability by analyzing the differences between two versions of an executable file. The approach comprises two parts: finding the differences and auditing the differences. To find the differences, a heuristically method is presented to compute an isomorphism between two callgraphs, based on the definitions of similarity between functions, and...
When most of terrain match algorithms were directly applied to seabed terrain-aided navigation system (STAN), the positioning accuracy would fall off sharply and become unstable because of the particularity of seabed terrain. Here, a new approach of seabed terrain matching algorithm was proposed. It used the mean Hausdorff distance as similarity measure for its great anti-interference performance...
Fourier transform is presented and applied to monthly composited NDVI data to over one year derived from MODIS to examine the frequency distribution of the multi-temporal signal. It is shown that frequencies of the time series of NDVI are linked to integrated NDVI and seasonal variabilities of different periods of the land cover types. The 1/12 month-1 frequency component summarizes the relative dominance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.