The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Gaussian Mixture Model (GMM) and its variations process images by per pixel, so they may be corrupted by noises and the computational cost is high. In this paper, we propose a robust moving object detection algorithm with a background dictionary learning. To do this, we first divide an image into multiple image patches that have the same sizes. Each patch is the object or background. Then, A background...
Training samples of the intrusion detection algorithms based on supervised learning is hard to acquire. The accuracy of the intrusion detection algorithms based on unsupervised learning is low. Common semi-supervised intrusion detection algorithms need parameter k which is selected by human. To solve these problems, a semi-supervised intrusion detection algorithm based on natural neighbor is proposed...
This paper focuses on the problem of feature extraction and the classification task of microvascular morphological type to aid esophageal cancer detection. A specialized convolutional neural network (CNN) is designed to extract hierarchical features and Support Vector Machines (SVMs) are introduced to enhance the generalization ability of classifiers. Experiments are conducted on the NBI-ME dataset,...
Through silicon via (TSV) is a critical element for three-dimensional (3D) integration of devices in vertically multilevel stack-die microelectronic packages. In this paper, the microstructure evolution of TSV-Cu under thermal cycling was studied and the topography of TSVs under thermal cycling tests was examined by white light interferometer. It was found that the Cu was intrude inside the Si die...
In this paper, we cite the deficiencies of the traditional web page editor, which leads to the research and design of the web information system page editor based on eclipse plug-in. This paper also points out the features of this page editor. The main contents are as follows: the interactive research and design of the plug-ins of the page editor of web information system, the code generator and the...
In this paper, a novel hash-based image content authentication scheme for tamper detection and localization is proposed. The original image is divided into sub-blocks whose size can be tuned with the accuracy of tamper localization, and the measurements which are obtained in the compressed sensing (CS) process contain all the information of the subblocks. Moreover, singular value decomposition (SVD)...
In this paper, the problem of adaptive backstepping repetitive learning control is addressed for a class of periodically time-varying discrete-time strict-feedback systems. A repetitive learning least squares algorithm is applied for parameter estimation, where the lower bound for the control gain is introduced to avoid the potential singularity. An iteration-domain key technical lemma is given for...
As an emerging biometric technology, palm print recognition technology has been researched widely and developed rapidly, which is well known for its high verification accuracy, low-price capture device, high reliability and user acceptance. Feature extraction as a core part of palm print recognition, can effectively extract the characteristics or not, largely determines the system recognition rate...
Under the condition of open boundary, it proposes a new model which is based on the improved two-way two-lane cellular automaton traffic flow model. It is a T intersection traffic flow model which consists of two independent running main roads and two cross by-roads which allow overtaking. The running forward vehicles runs by the NS rules. It simulates the fundamental traffic flow diagrams of every...
In this paper, an adaptive robust repetitive controller is presented for a class of nonlinear systems with input deadzone under the condition that system nonlinear uncertainties can not be parameterized. With the assumption that the desired trajectory is periodic, the non-parametric uncertainties are written as polynomials which contain periodic time-varying parameters that are estimated by periodic...
This paper introduces the concept of minimum correlation decision reduct in inconsistent target information systems based on dominance relation. Moreover the judgment theorem and discernable matrix of the minimum correlation decision reduct are obtained, from which it can effectively provide the approach to this reduction in inconsistent target information systems based on dominance relation. Finally,...
The rapid increasing of variety and quantity of business brings about serious challenge to the server resources of datacenters. It is difficult for the traditional solution of server running and management to tackle with the changing need of services. The physical server sprawl leads to shortage of computer rack and room space. Meanwhile, the energy consuming increases, so do the difficulty of the...
Electricity demand forecasting is very important for electricity systems to plan. The aim of this work is to develop a modified grey prediction method for electricity demand forecasting. In this method, the error in grey theory model was used to correct the forecasting results. Our approach helps to improve the forecasting accuracy. In order to study the performance of modified grey theory, general...
Various factors have contributed to China's rapid economic growth, such as capital accumulation, technological progress, structural change, resource optimization, system and institutional innovation. But the rapid growth is motivated by other reasons as well, for example, the demographic factor. This paper contributes to the domain by analyzing and studying the relationship between labor force and...
This paper analyses the functions and setting problems of corona ring on composite insulator, use the neural network model to fit the relationship between the structural parameters and the optimization goals, and thus draws the optimal solution of corona ring structure parameters. Finally, it gives optimization parameters of corona ring which can effectively improve the insulator electric field distribution...
Power grid emergency easily leads to uncontrolled chain reaction, exerting an adversely serious impact on the society, thus effective emergency linkage mechanism is needed. The flexibility and high efficiency, as the characteristics of emergency linkage mechanism, is figured out, based on the research on emergency linkage mechanism of US, EU and Japan; the problems in establishment of China's emergency...
Petrochemical industry is a high risk industry of accident-prone, through safety technological transformation, improve safety state of petrochemical industry has important practical significance. Through statistics on unsafe state of equipment in typical accident of petrochemical industry, and essential reason analyses, the weak link in security technology of current equipment in petrochemical enterprises...
Two-person zero-sum games with fuzzy payoffs are investigated on credibility space. In other word, this paper introduces the credibility measures and presents the credibility space based on it. Then, some basic characteristics of fuzzy events were given in the credibility space and the expected value of the fuzzy variables is propoed based on the credibility measures. Last, the expected model of two-person...
Weld bead surface quality has an important effect on the quality of prototyped products .In the paper, hierarchy analytical theory, combined with the experiment, is employed to determine the weld bead surface quality synthesis evaluation weight coefficient of bead uniformity, bead continuity and spatter. The membership degree tables of bead uniformity, bead continuity and spatter are created by using...
This paper analyzes the transmission characteristics of the Hodrick-Prescott (HP) filter and frequency characteristics of exponential series, defines 3dB bandwidths of both the HP filter and exponential time series. Formulas of the 3dB bandwidths of the HP filter and exponential time series are derived. Thus, a method to determine the smoothing parameters of the HP filter by the series length is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.