The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an application of the formal method to model and verifies the communication and control for a fleet of collaborative autonomous underwater vehicles (AUV) named as Eco-Dolphin. The fleet includes YellowDolphin, BlueDolphin, and RedDolphin, which are designed to collect environmental data and provide surveillance services in littoral water. The system architecture of the fleet is...
Crowd event detection techniques aim at solving real-world surveillance problems, such as detecting crowd anomaly and tracking specific person in a highly dynamic crowd scene. In this paper, we proposed an innovate texture-based analysis method to model crowd dynamics and us it to distinguish the crowd behaviours. To describe complicated crowd scenes, homogeneous random features have been deployed...
Many real-time brain-machine interface (BMI) applications require quickest detection of abrupt changes in observed neural signals in an online manner. In the presence of multi-neuronal recordings, we propose both model-based and model-free approaches to detect the change in neuronal ensemble spiking activity. The model-based approach is motivated from state space modeling and recursive Bayesian filtering...
Mesh Network-on-Chip (NoC) is a key fabric to interconnect many cores with desirable scalability, reliability and interoperability. We observe that DMA-based bulk data block transfer exhibits non-negligible NoC latency due to heavy congestions. Loop tiling is an effective way to partition data space for SPM+DMA-based data block transfer. Nevertheless, we observe that the unbalanced NoC latency can...
Face detection has been a hotspot either in research and in commercial application. In this paper, Locally Assembled Binary (LAB) feature and Adaboost algorithm are combined to recognize human face in images. On the basis of ensuring the detection speed, the detection accuracy is improved. Integral image technology is also conducted in consideration of detection speed. The proposed method is tested...
The complex image theory has been introduced to be applied in fast modeling of layered medium. The speed advantage in modeling is significant for the development of electromagnetic logging while drilling, or geosteering. Previously, it has been approved that the complex image theory has adequate accuracy in the modeling of parallel layered medium. In this study we will dig a more broad scope of application...
Limited research efforts have been made for Mobile CrowdSensing (MCS) to address quality of the recruited crowd, i.e., quality of services/data each individual mobile user and the whole crowd are potentially capable of providing, which is the main focus of the paper. Moreover, to improve flexibility and effectiveness, we consider fine-grained MCS, in which each sensing task is divided into multiple...
In this paper, we apply a recently proposed distributed estimation algorithm to a simple multi-agent flocking model with collision avoidance. 3D MATLAB simulations are performed with randomly generated agents' initial positions and velocities. The collision avoidance is realized through a repelling force between agents moderated by an alignment measure. The distributed estimation algorithm estimates...
This concept paper presents the preliminary work on the application of formal method to verify the correctness of software-hardware co-design. A model checking tool called UPPAAL is used to check the fault-tolerance of the system design. The paper briefly describes the hardware platform, a fleet of collaborative AUVs (autonomous underwater vehicles) named Eco-Dolphin, and its software architecture...
Recommender system has become one of the most promising techniques in the era of big data. It aims to help users to quickly find the valuable information from the massive data. Many recommendation approaches have been proposed in recent years. Currently, a majority of researchers still pay attention on designing more effective and efficient methods, and they usually put all the user data into model...
More cooperation or coordination is necessary for future UDN (Ultra-Dense Network) scenario of 5G network, of which ICIC (Inter-Cell Interference Coordination) is a promising and typical scheme. Cooperating cellular network may be thought as a special kind of distributed computing system, whose basic theory and toolsets could be adopted. CAP theory for distributed computing state that any networked...
Similar cases recommendation is more and more popular in the internet inquiry. There have been lots of cases which have been solved perfectly, and recommending them to similar inquiries can not only save the patients' waiting time, but also giving more good references. However, the inquiry platform cannot understand the diversity of description, i.e. the same meaning with different description. This...
The development of computer science and applications changes with each passing day. The software companies and research institutions put forward higher requirements for computer science majors' professional capacity and creative ability. However, many problems still exist in the current status of teaching computer science majors and directly affect the quality of professional training, so it brings...
One of the key characteristics of context-aware adaptive applications (CAAAs) is to change their behaviors according to the user-configured adaptation rules at runtime. Some of these rules, however, often result in inconsistence with the specifications of the CAAAs because of the complexity of the adaptive applications. A formal modeling method based on binding bigraphs is proposed to solve this inconsistence...
As cloud computing technology develops rapidly, more convenience has been brought to users by various cloud providers with various cloud services. However, difficulty of management, especially when different access control protocols and personal information involved, has become one of barriers that inhibit the development process of cloud technology. In this paper, a user-centered ID MaaS (Identity...
Particle filter shows great success in non-rigid object tracking. But tracking errors would be inevitable when the background changes greatly, or when the color distribution of background is similar to target's. To eliminate these errors, an improved method based on visual attention is proposed in this paper. In our algorithm, the extraction method based on visual attention is applied to extract salient...
Spatial Channel Models (SCM) used in wireless system simulations are determined by Large-Scale Parameters (LSP). LSPs include delay spread, shadow fading, angle of arrival and departure spread, and Rice K for line-of-sight channels. LSPs are modeled as a spatially correlated random field over the geometry of the network scenario being simulated. The general method is to generate an LSP map on a discrete...
To segment piecewise smooth images on implicit surfaces, Potts model which is a general variational model for planar multiphase image segmentation is extended to the one for image segmentation on implicit surfaces. Potts model is reformulated not only on implicit closed surfaces but also on implicit open surfaces. An improved dual method is proposed to speed up the computation process. Some numerical...
In this paper we propose a new control approach, event driven model free control, which deals with the “tradeoff” between computational cost and system performance. The model free control scheme demands low computational resources and has high robustness, which is especially suitable for systems with complex dynamics and/or affected by disturbances. Particularly for the embedded systems, the event...
In this paper, we consider the problem of deploying a robot from a specification given as a temporal logic statement about some properties satisfied by the regions of a large, partitioned environment. We assume that the robot has noisy sensors and actuators and model its motion through the regions of the environment as a Markov Decision Process (MDP). The robot control problem becomes finding the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.