The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research has predicted the existence of the interface charges between nano particles and matrix polymers in nano dielectrics, which may become a dominant factor as the electrical properties of composites continue to improve. But until now, no experimental evidence has been found to prove this prediction. This research try to prove that the charging abilities of the nano particles in liquid suspension...
According to the characteristics of wind field control system such as delay and uncertainty, hydrodynamics theory and modern control theory are used to design and achieve a practical wind field control system. Firstly, the mathematical model of the wind speed distribution of the system is analyzed from the angle of hydrodynamics. Then the Galerkin method is used to turn it into state space expression...
Here we examine the partial regularity of minimums of a Laplace functional with the Weber TV image restoration in Bounded Variation space. Most conventional image processors consider little the influence of human vision psychology. This paper proposed a new functional. Furthermore, this functional is not only to use Laplace operator but also to add the human psychology system. Of course, because we...
This paper proposes a robust rear-view camera based moving object detection algorithm for backup aid and parking assist applications. A single fish-eye camera is used in order to get much larger FOV (field of view) for object detection. To detect various moving objects such as vehicles and pedestrians, the ego-motion of host vehicle is firstly estimated by A robust NGPP (near ground point projection)...
Based on the clinical date of the Peginterferon Alfa-2a plus Lamivudine (combination therapy) for HBeAg-Positive chronic hepatitis B patients, this paper sets up a mathematical model consisting of two differential equation systems that enable us to describe and understand the dynamics of host cells, virus and the immune system. Our model provide a possible interpretation for the effect of combination...
The initial voltages are great important to the convergence property of Newton power flow in rectangular form. The flat voltage start is very available for power systems with normal branches, but invalid for power systems with small impedance branches. So an improved voltage start is presented to solve the divergence problem of Newton power flow in rectangular form caused by small impedance branches...
Image contrast enhancement is a very critical step for automatic medical image processing and analyzing applications. In this paper, we described a novel image enhancement algorithm based on the single-scale Retinex (SSR) theory to enhance the tiny anatomical structures and other regions of interest on the Low-dose CT ??LDCT?? images. This algorithm applies a three-stage approach: (a) separating the...
Image contrast enhancement is a very critical step for automatic medical image processing and analyzing applications. In this paper, we described a novel image enhancement algorithm based on the single-scale Retinex (SSR) theory to enhance the tiny anatomical structures and other regions of interest on the low-dose CT (LDCT) images. This algorithm applies a three-stage approach: (a) separating the...
Based on Cheng-Liu-Wang identity-based signature scheme and Baek-Zheng pairing-based verifiable secret sharing scheme, a new secure monitoring scheme using identity-based threshold signcryption scheme for wireless sensor networks is proposed. The goal of this scheme is to provide a confidential and authenticated transmission channel for monitoring messages sent by nodes to BS over an insecure wireless...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.