The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lightning flashover risk evaluation is the basis for choosing proper measures to improve the lightning performance of the transmission lines. Thus, the effectiveness of the measures adopted is directly determined by the evaluation accuracy. At present, the risks are mainly evaluated through comparing the calculated lightning flashover rate (LFOR) of every tower. However, there are so many assumptions...
A new index mode for extraction of water body with HJ-1 satellite CCD imagery - Normalized Difference of RVI and NDWI(NDRW) which combined both RVI and NDWI values is purposed in this paper based on analyzing the spectral characteristics of water in HJ-1 satellite CCD imagery and the advantages and disadvantages of three the most frequently used indexes, which are Ratio Vegetation Index(RVI), Normalized...
In this paper, we address the solution of solving the following problem: given a known workspace and a robot with limited sensors compute a short path for the vehicle so that every space in the workspace could be detected by the limited sensor of mobile robot on at least one point of the path. Visibility constraints including range of distance and angle of incidence are taken into consideration to...
In order to solve the problem that there exists unbalanced detection performance on different types of attacks in current large-scale network intrusion detection algorithms, distributed transfer network learning algorithm is proposed in this paper. The algorithm introduces transfer learning into distributed network boosting algorithm for instructing the attacks learning with poor performance, in which...
Searching the unknown or partially known region or acquiring the new information in the map is an important mission for vehicle in the areas of military and civilian use. Planning the lowest-cost path is one of the primary work for searching the environment. This paper develops a planning strategy which could minimize the cost and every corner in the map can be seen on the path based on cell decomposition...
In mobile multiple-access communications, not only the location of active users, but also their number varies with time. In typical analysis, multiuser detection theory has been developed under the assumption that the number of active users is constant and known at the receiver, which coincides with the maximum number of users entitled to access the system. This assumption is often overly pessimistic,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.