The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is about the research on the industrial Ethernet communication between industrial PC (IPC) for a spinning machine and OMRON programmable logic controller (PLC) based on FINS protocol and Winsock in VC++. This proposed networked communication has been successfully designed, installed, commissioned and realized. This paper focused on reliable real-time communication transmission and integrated...
Facial Expression Recognition (FER) is one of the most active topics in the domain of computer vision and pattern recognition, and it has received increasing attention for its wide application potentials as well as attractive scientific challenges. In this paper, we present a novel method to automatic 3D FER based on geometric scattering representation. A set of maps of shape features in terms of...
We study invulnerability of complex networks subject to attacks on nodes and links. For the purpose of precisely assessing invulnerability of complex networks, in this paper we proposed an invulnerability assessment on the basis of importance-degree and partial attack information by measuring two metrics of network invulnerability, robustness and efficiency. We defined the term of importance-degree...
Through thinking deeply on the algorithm of standard median filter, the algorithm is improved in order to make it faster. A fast filtering algorithm is proposed with the help of the relevance between filtering windows. The improved algorithm takes the indexes of the array storing the data of an image as media cleverly and takes the method combining the one-time total ordering with insertion sorting...
Cloud computing is one of the most significant latest efforts in the field of information technology, which may change the way how information services are provisioned. In a Cloud environment, different types of resources need to be virtualized as a collection of Cloud services using virtualization technology. End-users in the Cloud are usually provided with customized Cloud services that involve...
This paper proposes two types of tools information coding rules to meet the requirements of the code marking and identifying in a tools management system. Besides, the tools classification is briefly introduced at first, which is beneficial to establish the tools coding rules. Then rigid coding rule is presented. It can satisfy most the requirements but the fatal limitations of lack of flexibility...
In Peer-to-Peer (P2P) trust management, feedback provides an efficient and effective way to build a reputation-based trust relationship among peers. There is no doubt that the scalability of a feedback aggregating overlay is the most fundamental requirement for large-scale P2P computing. However, most previous works either paid little attention to the scalability of feedback aggregating overlay or...
Focusing on difficulties in the model establishment and analytical method during the simulation analysis of sweeping-suction typed suction, Fluent's MFR model is chosen as the modeling method, the speed conversion formula between roller brush and suction encloser is determined. By changing rotation speed of roller brush and center distance between deliver pipe and roller brush, the paper studies the...
Center Plate Bolts on the train after the photos were analyzed to observe the morphological characteristics, a gray map based on computer vision recognition algorithms. According to the physical characteristics of the train bogie image positioning, Gray mapping used in conjunction with the gradient mapping and transformation using adaptive threshold filter out irrelevant features, and image segmentation,...
Accident hazard control is the main objective of safety management activities of water conservancy and hydropower engineering. This paper is starting analysis from water conservancy and hydropower engineering hazards. After defining the definition, classification and characteristics of that ,this paper puts forward the construction principle of safety management process of water conservancy and hydropower...
Much research has been done on construction safety cost. However it is always on a qualitative level, little quantitative research has been done, especially on the safety cost of water conservancy construction project. In this paper, by the combined use of grey correlation model and optimal safety cost model which is under dialectical understanding, a dynamic management model on the safety cost of...
In traditional aviation corporations, there are several problems, such as the variety of tools, the cumbersome business management and the information isolation between different departments. Aiming at solving these issues, this paper presents an integration management methodology combining the data management and information collection, applying tool marking and identification technique in tool management,...
Tag anti-collision algorithm is a significant technique in RFID system. This paper introduced its two wide used categories, stochastic anti-collision algorithm and deterministic anti-collision algorithm, and then proposed an improved algorithm using hash method. The proposed algorithm divides the tags into a number of groups using hash function and allows only the tags in group0 to respond. If there...
Mobile ad hoc networks consist of mobile nodes which have no fixed infrastructure or centralized administration. Routing protocol design is critical to the performance and reliability of mobile ad hoc networks. Traditional routing protocols have been shown ineffective in coping with unreliable and unpredictable wireless medium. In this paper, we propose a location-aided opportunistic routing protocol...
The fast extraction of segmentation characteristic from images constructed by complex objects and contaminated by noise is a difficult problem in image process domain. A fast extraction algorithm of linear segmentation characteristic based on multiple processing to gray scale projection is proposed. The original gray scale projection of image is mapped with rectangle window to obtain statistics distribution...
Automatic recognition of losing of bogie center plate screw (BCPS) on digit images is a hard problem that due to the vast differences and impreciseness associated with the poor sampling environment and moving photographing. This paper presents a multiple-fuzzy relation tree to solve this problem. Single sample is preprocessed by the method such as finite-radius Hough transformation, constraint-rectangle...
Aim at the unilateral penalty for treating intermediate density elements in traditional topology optimization, a bi-directional interpolation model (BDIM) is developed to treat intermediate density elements during the topology optimization process. By introducing a threshold, the BDIM model can rationally treat intermediate density elements through penalizing and promoting them toward void and solid...
This paper presents a novel priority queue scheduling algorithm named energy-efficient and load-balanced queue scheduling algorithm (ELQS) for Mobile Ad Hoc NETwork (MANET) considering both mobile nodes' congestion levels and the nodes' energy usage, which uses mixture of energy balance and traffic balance to solve the problem of "hot spots", some mobile nodes with heavy traffic load using...
Chord is the most essential and efficient peer-to-peer routing algorithm that, however, cannot reflect the hot resources problem in practical networks. To solve the problem, an optimized Chord algorithm has been put forward in this paper to accelerate locating the hot resources. The optimized Chord algorithm records the access time of resources and categories the resources into three classes. As for...
With the overall popularity of the Internet, e-learning has become a hot method for learning, enabling people to absorb new knowledge without restrictions on time or place. Shareable course object reference model (SCORM), the most popular e-learning standard, has been adapted in many different e-learning platforms. Generally, courseware meeting SCORM standards is shareable with other e-learning platforms;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.