The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose an unsupervised polarimetric SAR image classification method using deep embedding network. In this method, we first use superpixel segmen-tation method to produce superpixel regions and use the density peaks clustering (DPC) method to generate the representation points of the superpixel regions. The simi-larity matrix of the representation point and the sample points is then...
Smart city has been advanced much from the conceptual model to the actual construction stage. This paper takes Nanhai as an example to demonstrate how to manage the resources of IoT as a whole and plan the top-level design of IoT development and smart city. After analysis of Nanhai IoT status, a general framework of Nanhai IoT development is proposed as the top-level design using five architectures...
According to rotary vibration at the end of the concrete pump truck boom, analysis of the boom rotary vibration mechanism is carried out. Rigid-flexible coupling dynamics model and vibration control co-simulation model of the boom system are established. The analysis of the dynamic model solution shows that the simulation rotation vibration displacement curves at the end of the boom are coincided...
In this paper, we consider the privacy preserving problem in an agreement network under interception attacks. First, we introduce a consensus protocol with privacy preserving, where each node hides their initial states into a set of random sequences, and then injects the sequences into the process of consensus. Second, we assume that an attacker with limited power can intercept the data transmitted...
This study helps telecom operators to establish device security monitoring and centralized statistical analysis tools for an entire telecom operator network. Operators can use the proposed process to monitor device security in a variety of heterogeneous network architectures. We propose ISMS, an Integrated Security Monitoring System for monitoring security events on digital service network devices...
In this paper, we consider the privacy preserving problem of consensus protocol. First, we introduce a privacy preserving scheme, where each node produces and transmits a sequence of random values with their mean equaling to the node's initial state. We show that the network can reach average consensus with privacy preserving scheme, and provide a sufficient condition under which the initial state...
This paper is investigating the manufacturing information technologies of CNC machine tool, FANUC corporation, based on data estimation for lean information network in manufacturing execution. The response characteristics includes the position loop gain, position feed-forward gain, velocity loop integral gain, velocity loop proportional gain, and velocity feed-forward coefficient. The characteristic...
This paper presents a multi-scale Best-Buddies Similarity (BBS) method for matching objects in the UAV imagery. More precisely, we first extract proposed regions from the target image by Selective Search, then take a number of proposed regions with the highest confidence scores as templates and finally apply templates to the original BBS method and select the coordinate of the region with the highest...
Crack inspection is one of the most important tasks for concrete bridge monitoring. Traditionally, human-based inspection systems using people's eyes are unsafe and costly. To overcome this problem, a novel unmanned aerial vehicle (UAV) based inspection system is developed to detect cracks on the lateral sides and underside of bridges. Applying obstacle avoidance modules, UAV can reach bridges' lateral...
Crack detection is crucial for maintaining the structural health and safety of concrete bridges. Previous studies mainly focus on the detection of thick and conspicuous cracks on bridge deck using high resolution images. However, it's difficult to obtain accurate crack detection results on the underside of bridges due to the fainter and thinner appearance and lower contrast of cracks to their background...
Feature extraction is an important issue for image interpretation, many valuable feature extraction methods have been proposed to address synthetic aperture radar (SAR) image registration. However, the current methods care little about changes over multi-temporal SAR images, which result in unstable output features. The unstable property is a latent factor to affect the accuracy of SAR image registration...
In this study, we present a set of new evaluation measures for the track-based multi-camera tracking (T-MCT) task leveraging the clustering measurements. We demonstrate that the proposed evaluation measures provide notable advantages over previous ones. Moreover, a distributed and online T-MCT framework is proposed, where re-identification (Re-id) is embedded in T-MCT, to confirm the validity of the...
This Metaheuristics are easy to use and usually get good solutions for complex problems. There were many approaches proposed in improving the performance of the metaheuristics. In the past, we proposed a hierarchical execution architecture of GA to shorten the generation number needed to find final solutions. In this paper, we embed different migration mechanisms in the hierarchical sub- population...
Visual data are rich, which have opened vast analytics opportunities and been widely used in many applications. However, the demanding requirements of computational resources and bandwidth have prevented the data from being useful in an economically efficient manner. A visual fog paradigm is needed for efficient processing of continuous video streams by collaboratively using things in the Internet...
A latch-up immune robust SCR with an N+ top layer and an additional Nwell region (Nwell2) is proposed in this paper. The N+ top layer and Nwell2 divide the original SCR into three new SCRs with sharing emitter, which provide the deeper ESD current (Iesd) path to improve the holding voltage (Vh) and failure current (It2). The relation between Vh and base-concentration (Nb) for LVTSCR is given to provide...
Choosing a long source/drain extension length (LSDE) maybe effectively reduces the leakage between source/gate and drain/gate, but the S/D series resistance is increased and the drive current in p-channel FinFETs is suffered. Of course, the DIBL effect can be controlled well in device model and the channel punch-through effect also can be suppressed to decrease the standby current in ICs. Balancing...
Along with the development of communication technology, the degree of involvement of location-based service in daily life increases accordingly. Through further combination between mobile devices and micro-location technology, mobile devices can now offer more precise and high-quality services which allow users to obtain required information while moving. The proposed intelligent device-oriented control...
Nowadays, spontaneous reporting systems (SRS) have been widely established to collect adverse drug events for ADR detection and analysis, e.g., the FDA Adverse Event Reporting System (FAERS). The SRS data are provided to the researchers, even open to the public, to foster the research of ADR detection and analysis. Normally, SRS data contains personal information and some sensitive value such as indication...
Automatic extraction of built-up area from high resolution SAR images is still a challenging problem due to the complexity of buildings' backscattering. The intensity, coherency and texture features derived from SAR images could characterize the built-up area in different aspects. However, how to efficiently integrate these kinds of features for further improving the accuracy of extraction is a very...
Latent Dirichlet Allocation (LDA), is heavily cited in the machine learning literature, but its feasibility and effectiveness in information retrieval is mostly unknown. Learning to rank is useful for document retrieval, it uses feature vector to rank, but there is no feature about document topic. Our paper combines LDA and learning to rank, adds a topic feature into the feature vector of learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.