The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a precise and intelligent deconvolution process is developed in order to further extend its applications in discovering bearing faults and characteristics. A new index, harmonics-to-noise ratio (HNR), is introduced to extract the period. At the same time by combining HNR with the characteristic of kurtosis which is sensitive to the impulsivity of the fault signal, a novel deconvolution...
A new intrusion detection mechanism in SELinux based on dual-Markov chain and triggered by critical system calls is put forward in this paper. The mechanism integrates access control with intrusion detection by Linux Security Module (LSM) in SELinux and considers both the global behaviour characteristics and local behaviour characteristics. Theoretical analysis and experimental results show that the...
Image blur assessment has always played an important role in the image quality assessment (IQA). In fact, many methods have been used to measure the blur of an image, but we find that lots of the traditional methods can't effectively compare the blur among images with different contents, leading to the blur measuring more difficult. Recently, we find a perfect method based on the idea that it is difficult...
Over-the-air reprogramming is a key service in wireless sensor networks. The service can disseminate a new code image to every sensor node in the network. For security reasons, every code image must be authenticated to prevent an attacker from installing its code to the network. In this paper, an authentication method named Hierarchical Hash Tree (HHT) is proposed to reduce the overheads of Sreluge,...
As more and more distributed generations are connected into the distributed network, the traditional fault location methods are not accurate or suitable. A method of fault location for distribution network based on voltage change was proposed. The method has two steps: firstly, calculating the line group on which the fault may occur by the error index obtained from voltage change; secondly finding...
Content distribution on today's Internet operates primarily in two modes: server-based and peer-to-peer (P2P). To leverage the advantages of both modes while circumventing their key limitations, a third mode: peer-to-server/peer (P2SP) has emerged in recent years. Although P2SP can provide efficient hybrid server-P2P content distribution, P2SP generally works in a closed manner by only utilizing its...
Locality sensitive hashing (LSH) has been introduced as an indexing structure for fast large-scale data retrieval. A significant drawback of this technique is that a large number of hash functions require lots of hash computation time. To resolve this issue, the paper presents a new index construction algorithm called boundary-expanding LSH, where the boundary of each bucket is expanded so that each...
Nearest neighbor problem has recently been a research focus, especially on large amounts of data. Locality sensitive hashing (LSH) scheme based on p-stable distributions is a good solution to the approximate nearest neighbor (ANN) problem, but points are always mapped to a poor distribution. This paper proposes a set of new hash mapping functions based on entropy for LSH. Using our new hash functions...
In this paper we propose a methodology of multilayer filters based on tempo variation for realizing a query by humming (QBH) system. Firstly the original query clip is used to search for the candidate songs. If the results are unreliable, the clip is linearly scaled twice for more candidates. If the results are still unreliable, the clip is scaled more times for retrieval. To sort all the candidates,...
on mobile terminals, voice-based local search services are quickly becoming a new important application. Voice search is essentially a large vocabulary speech recognition task with an open ended vocabulary, and this is a problem because speed and accuracy are essential for a good user experience. Fortunately when a user submits a local search query, contextual information such as the user's current...
Objective To investigate the feasibility of using PWI analysis software in assessment of carbogen breathing BOLD-fMRI in normal prostate. Materials and Methods BOLD-fMRI was performed using a 1.5 Tesla superconducting magnetic scanner (Siemens) equipped with a pelvic phased-array multi-coil in 15 healthy volunteers. BOLD (T2*-weighted EPI sequence, 13 slices, 3mm thickness) were acquired during 5×2minute...
As the rapid growth of Internet and the communication link speed, it becomes increasingly challenging for network processors to timely route the incoming traffic to the destination ports. The traditional approach must look up the routing table based on the destination IP address to determine the output port. The ternary CAM approach provides fast associative look up, but is very costly for large routing...
As an important method for the evaluation of quantity of area rainfall, Thiessen polygon method is widely applied because of its high calculation accuracy and fast computation. The calculation of Thiessen polygon method is simple because only area data of sample point is needed. When dataset is stable, accuracy of Thiessen polygon method is higher than the arithmetic average method. But there are...
When considering on planning and designing of Urban Comprehensive passenger transport hub in China, it just aims on convenient construction for various transport modes. The need of passenger is seldom taken into account, which lead to single-mode and flat hub adding the burden of passenger when transfer. The fundamental object of transport hub design is mean to meet passenger needs, which is also...
In this paper, we investigate the influence on shear strength of the roots of four typical plants which can fix the soil in coal mining subsidence area by direct shear tests ,and the shear strength of the root soil composite .The results indicate that with the same root diameter (1.25 mm) , Sabina valgsris Ant., Salix psammophila, Caragannmicrophylla Lam. Artemisia sphaerocephala Krasch are more intensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.