The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new method for determining the broadband characteristic impedance of CMOS interconnect transmission lines using the measured S-parameters of a line, a serial resistor and a shunt resistor where the impedances of the resistors need not to know. The unknowns are evaluated by minimizing an objective function consisting of nonlinear equations regardless of the parasitic effects among...
A model for studying the impacts caused by emotions of individual agents in a crowd is presented, the model is based on the crowd model proposed by helbing, every agent can have emotion and motivation attributes, the behaviors of different agents are set up by a function with individual parameters. The method of an individual's joining a crowd is proposed, and reactive mechanism between crowds is...
In GPS signal indoor positioning system, the signal intensity received by the different channels of receiver are diverse when GPS signal penetrate buildings. In the process of weak signal acquisition, the cross correlation interference between the strong and weak signal will lead to the decrease of the signal to noise ratio of weak signal. However, it is difficult to assess the attenuation degree...
In the area of ocean fisheries research, one hotspot is the use of marine environment factors for fisheries forecast. This paper fits in the category using fishery knowledge discovery based on support vector machine (SVM) and fuzzy rule extraction. It takes the Indian ocean big-eye tuna fishery as its testing ground. Firstly, the support vectors are obtained by training the SVM with some sample data...
The dimension reduction is necessary steps for face recognition based on subspace analysis. The proposed method employs class information for structure of similarity matrix when implement of 2DLPP. A subspace which preserves local neighbor structure and centralizes same class samples of training images is got. Moreover, it has available computation efficiency and accuracy because it belongs to the...
Aiming at the problem that the accuracy of an individual classifier such as Naive Bayes (NB), is not satisfactory in the present e-learning performance evaluation system, a classifier combination system has been constructed. Classifier fusion is a process that combines a set of outputs from multiple classifiers in order to achieve a more reliable and complete decision. In this work, the application...
The design of a compact microwave diplexer is presented. Folded structures with coupled cavities are used to minimize its size. The sample diplexer is fabricated and the tested results show good agreement with the design target.
Reobtaining sustainable competitive advantage is the primary goal for company in transition. Beginning by literature review of researches of competitive advantages, this article establishes a core competence model and explains the relationship between environmental changes and company decline based on detailed analysis of competencies dimensions. Finally, the core competence mechanism shows how to...
Existing O/R mapping based object persistence technologies for Java programming, such as Hibernate and iBATIS, donpsilat realize transparency of relational model to developers. This makes Java developers work with both object model and relational model at the same time. As a result, the mapping of these two different models has to be maintained manually. This gives rise to higher complexity and hence...
A compact filter with coupled shorting stubs is proposed, which also has excellent out-of-band elimination. The structure can produce transmission zeros at both sides of the pass-band of a broadband or a narrow band filter. The configuration parameters and simulated results are presented. Tested results from a sample filter show that the insertion loss is lower than 0.4 dB in the pass-band from 7...
Image principle component analysis (IMPCA) is a rapid direct feature extract approach from matrix. We present the basic theory of IMPCA from the view of minimizing the mean reconstruction error. We analyze the feature generated from IMPCA and find they present row characters. Wavelet transform can be used in reducing noise of images and the wavelet image should be more suitable for recognition. Our...
The directional characteristic of the parallel coupled printed dipole is analyzed in this paper. The balun structure is used as the feed structure. The far-field pattern of this antenna is formulated, and an example is simulated by using HFSS. The center frequency of this example operates at 5.5 GHz and it has about bandwidth of 20%. The simulated results demonstrate its directional characteristic.
This paper presents a method to integrate computational models in emergency intelligent decision support system (IDSS) for more scientific and effective loss prevention and disaster manipulation. Various computational models that support disaster evolution forecast, impact analysis on infrastructure and human as well as rescue actions are integrated in this IDSS. Moreover, the pertinency between original...
This paper proposes a positioning method for the GPS receiver used in fuse with single antenna as compared to the traditional multi-antenna mode. For that purpose, the intermediate frequency signal received by the single antenna is modeled and simulated, and a positioning method with partial GPS signals is proposed. Based on the positioning method with partial GPS signals and Kalman filter theory,...
This paper analyze the structure and network security strategy as well as expounding the key technologies and methods based on characteristics of small town's e-government system. Its discuss the main difficulties of database access and network security of small town's e-government system. After a case of e-government system is studied in Hengdian (a town in Zhejiang province), solutions are put forward...
This paper presents a method to integrate GIS and computational models in emergency intelligent decision support system (IDSS) for more scientific and effective loss prevention and disaster manipulation. The value of GIS in emergency management arises directly from the benefits of integrating a technology to support spatial decision making. Now many simulation models requiring spatio-temporal information...
A novel fusion method is proposed for image sequence which based on the non-Gaussian statistical modeling of wavelet coefficients. Firstly, the source images are decomposed by dual tree complex wavelet transform (DT-CWT) respectively. Then, the wavelet coefficients are modeled using the generalized Gaussian distribution (GGD). Saliency measure, the weighted coefficient, is calculated by estimating...
This paper presents a new uniplanar hexagon EBG structure for circuit size reduction applications. The EBG is placed at the ground plane of the microstrip line to increase the distributed capacitances and inductances for slowing the wave propagation. The simulations are performed by the commercial software using finite-element-method (FEM) to check the insertion loss and the slow wave behavior for...
Safeguarding patientspsila private information is one of the most challenging issues in the design and implementation of modern e-Health systems. Recent advances in Hippocratic Databases (HDB) show a promising direction towards the enforcement of privacy policies in e-Health systems. This paper tackles issues in applying the HDB design to e-Health systems. More specifically, we design an architecture...
Telehealth applications can deliver medical services to patients at remote locations using telecommunications technologies, such as the Internet. At the same time, such applications also pose unique security challenges. First, the trust issue becomes more severe due to the lack of visual proofs in telehealth applications. The public key infrastructure (PKI) is insufficient for providing the same kind...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.