The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problem of large space and time overhead in the PrefixSpan algorithm, a new sequential pattern mining algorithm based on PrefixSpan is proposed, which is PrefixSpan-x algorithm. The algorithm reduces unnecessary storage space and removes the non-frequent items, and combines AC automaton to optimize frequent sub-sequence mining, so as to improve the performance. Experiments prove...
Based on the generalization that the single-phase inverter's SHEPWM nonlinear model can be transformed to a unitary polynomial with the characteristic of Newton's identities, this paper apply the isolation of polynomial's real root to compute and obtain all possible solutions of single-phase unipolar and bipolar inverter's SHEPWM model at different number of switching angles. The results of illustrations...
Anomaly detection is an important fore-processing part in the hyperspectral imagery analysis chain because it can reduce the huge amount of raw data. In the conventional hyperspectral anomaly detection algorithm, the spatial correlation of the background clutters is often neglected. Moreover, the computational costs render the algorithm ineffective without significant data amount reduction. In this...
This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation. And it analysis's the obfuscation algorithm's performance of the strength, flexibility, and cost by experimentation. Finally,...
Collision detection plays an important role in the robot motion planning, virtual environment, distributed interactive simulation. As the geometric complexity of the virtual environment and parallel computing capability of modern CPU increase, and the aim to achieve rapid precise collision detection, parallel technology is widely used in collision detection algorithm. The paper describes several parallel...
With the development of 3G network and internet technology, the rapid upgrading of internet users. It is a trend that IPv6 supersedes IPv4 and the optical network becomes more widely. Integrating a number of hotspot advanced technologies, the “wireless broadband application system for IPV6 optical network cloud computing” is a novel system with practical research importance. The cloud computing platform...
The mimicry animate nature grows a good species of good teach to grow process, and draw lessons from the living creature immune system of identify the function that invades the antigen foreign body of the machine body with exclusion from the orientation, the study of the living creature immune system, memory, diverse sex with identify of the characteristics lead to go into the creative talented person...
Document image binarization plays an important role in image segmentation and its effect directly impacts on the quality of the OCR recognition system. However, binarization is difficult for camera-based document images with poor contrast or illumination. In this paper, we propose a binarization algorithm, called NFCM, for camera-based document image. NFCM, a local threshold method, is a combination...
An image encryption algorithm based on a four-dimensional chaotic system is presented in this paper, in view of the existing problems in the image encryption. Firstly, the characteristics of the chaotic system are analyzed. This system has more parameters and is more complex than the low-dimensional chaotic systems. The chaotic sequences are improved to be suitable for image encryption. Secondly,...
A method of number-plate characters recognition using AdaBoost algorithm, which based on template matching is presented in order to improve recognition rate and reduce recognition time. The method is divided into two stages. In the first stage, classifier is trained by template matching which is improved through AdaBoost classification, at the same time, classification rules are found. Number-plate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.