The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Particle filter algorithm has a unique advantage in dealing with nonlinear, non-Gaussian state estimation. Particle filter method cannot accurately estimate the state of the system due to the particle degeneration and lack of particle diversity. In this paper, we propose a new particle filter algorithm called “Gauss based auxiliary particle filter” that introduces the real-time observation information...
The traditional random sample consensus (RANSAC) algorithm is capable of estimating a model with fewer data points and almost unaffected by noise. There are several drawbacks of such algorithm including detection errors, unstable threshold and massive calculation. By analyzing the spatial relations of graphics pixels, a hypothetical circle is firstly formed with three hypothetical points which are...
A large amount of data is produced in the process of ultrasonic testing of rail, and it's necessary to compress the raw data with a loss-less compression algorithm. This paper analyses statistical characteristics of ultrasonic test data of rail, and makes researches on the commonly used loss-less compression algorithm, Huffman compression algorithm and LZW compression algorithm. In order to improve...
We investigate the coexistence issue between 802.22 and 802.11af networks over the TV White Space (TVWS). The coexistence scheme is vulnerable to selfish attacks. In this paper, the scenario of selfish attack wherein 802.22 subscribers intend to occupy the allocated spectrum selfishly is studied. Consequently, 802.11af users have less opportunity to access the spectrum, which leads to low overall...
As the main approach of distance education, the key point of Network Learning research has turned to getting the learners' personality characteristics and constructing the virtual learning environment based on theories of modern education and psychics. Currently, the characteristics of learners are stored in database statically. We can't timely acquire the latest interests of learners. The paper proposes...
To effectively manage the task allocation, especially when handling with numerous different peers' qualities, is one of the greatest challenges to be faced in order to guarantee the success of P2P-based e-services composition. In this context, various QoS descriptive frameworks and Web services technologies (such as WSDL and BPEL) are being considered as the most affordable solutions to promote the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.