The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Two GF-1 WFV images on August 3, 2015 and October 2, 2015 were selected to extract the cultivated area of paddy rice in Jianhu county of Jiangsu Province. Vegetation indexes were extracted from the original spectrum data in order to extract paddy rice area with Maximum Likelihood Classifier (MLC), Support Vector Machine (SVM) and Classification and Regression Trees (CART). The extraction accuracy...
Agricultural landscape is designated as important landscape components for partly controlling water quality, biodiversity, as well as for their aesthetic role in landscapes. Therefore, the change of agricultural landscape is at the top of the agenda for many policy makers and landscape planners. As a basis for conservation management, sufficient information about landscape structure should be providing...
How to enhance security and stability of the cyber physical systems (CPSs) becomes a critical issue. In this paper, we propose a solution from the perspective of users' information diffusion process in CPCs. Relying on the virus propagation model, we conceive an idle-carrier-idle (ICI) model to characterize the information diffusion. Moreover, `effective diffusion rate' is defined in order to benchmark...
Recommenders widely use collaborative filtering schemes. These schemes, however, threaten privacy as user profiles are made available to the service provider hosting the recommender and can even be guessed by curious users who analyze the recommendations. Users can encrypt their profiles to hide them from the service provider and add noise to make them difficult to guess. These precautionary measures...
This paper presents an 11bit 200MS/s SAR-assisted pipeline ADC with a 2.5bit front end stage and two time-interleaved 9bit sub-SAR ADCs, implemented in 65nm CMOS process. The bias-enhanced ring amplifier works as the residue amplifier for power efficiency and large signal swing. Two self-biased inverter stages are designed in the ring amplifier to maintain the closed loop stability. The SAR ADCs with...
How to improve the information diffusion coverage rate in socially-aware mobile networks has drawn great attention. To address this issue, the concept of the tie strength, the partial strength and the value strength were proposed in order to achieve a superior criterion for information diffusion. However, the previous works did not consider the existence of various patterns among the nodes in socially-aware...
Thanks to recent advance in massive social data and increasingly mature big data mining technologies, information diffusion and its control strategies have attracted much attention, which play pivotal roles in public opinion control, virus marketing as well as other social applications. In this paper, relying on social big data, we focus on the analysis and control of information diffusion. Specifically,...
The high-probability ictus of cardiovascular diseases as well as the rapid proliferation of personal wearable devices points to the emergence of machine aided automatic identification and diagnosis with electrocardiograph (ECG). Most of existing algorithms of the identification of normal/abnormal ECG waveforms are computationally complicated and time-consuming, which cannot couple with the constant...
Recently, CNN (Convolutional Neural Network) based trackers have achieved promising results benefited from their robust feature representation. However, most trackers only use features from a certain layer, which limits their performance. In this paper, we propose a novel CNN based tracker. Firstly, we use local detection and global detection network for target localization. In local detection network,...
Relying on clustering and the cluster head selection algorithms, vehicle-to-vehicle (V2V) and vehicle-to- infrastructure (V2I) based vehicular ad hoc networks (VANETs) play a critical role in intelligent transport system (ITS). However, the existing clustering and cluster head selection algorithms did not consider the influence of the vehicles' communication contents and their correlations. Specifically,...
Online social networks have become ubiquitous in our daily life, which create the phenomenon of the Big Data. Figuring out the information diffusion over online social networks has become a hot topic. However, most of the existing works focus their attention on the spreading dynamics of users' information rather than on the essence of the network topology. In this paper, we propose a value strength...
Crowdsourcing services make it possible to collect huge amount of annotations from less trained crowd workers in an inexpensive and efficient manner. However, unlike making binary or pairwise judgements, labeling complex structures such as ranked lists by crowd workers is subject to large variance and low efficiency, mainly due to the huge labeling space and the annotators' non-expert nature. Yet...
Combining actual demands for ultra-high voltage (UHV) power grid of our country electricity production, power collection, electricity transmission and distribution, functions, adequacy and reliability of different UHV power grid projection are discussed in this paper. They were discussed that differences in function and reliability of different UHV power grid structure, and the development necessity,...
The development of high voltage technology provides technical conditions for the transmission of offshore new energy, but it is necessary to consider the operation status of power grid when we decide the way of grid connection. This paper focuses on the stability of the system and evaluates three access form — the high voltage alternating current (HVAC), traditional direct current (DC) and flexible...
Recently, graph ranking-based methods have been introduced to visual tracking and achieved promising results due to the local structure preserving property. However, existing graph ranking-based trackers use holistic templates to construct the graphs which makes the trackers sensitive to occlusions. In this paper, we propose a part-based multi-graph ranking algorithm for robust visual tracking. In...
This paper presents a framework for anomaly detection in videos which considers both motion and appearance features. For motion cues, we propose a new feature called 3D-HOF, which effectively extracts both velocity and orientation from the optical flow map. At the same time, we introduce the concept of “depth of field” problem to make the detection more accurate when the velocity of an object may...
A mutli-band photonic-assisted RF photonic frontend based on the high Q bandpass filter has been experimentally demonstrated at U- and V-band. The SFDR from 40 GHz to 65 GHz are larger than 95 dB-Hz2/3.
Very deep neural networks with hundreds or more layers have achieved significant success in a variety of vision tasks spanning from image classification, detection, to image captioning. However, simply stacking more layers in the convolution operation could suffer from the gradient vanishing problem and thus could not lower down the training loss further. The residual network [1] pushes the model's...
Image retrieval and classification are hot topics in computer vision and have attracted great attention nowadays with the emergence of large-scale data. We propose a new scheme to use both deep learning models and large-scale computing platform and jointly learn powerful feature representations in image classification and retrieval. We achieve a superior performance on the ImageNet dataset, where...
A better understanding of travel demand will enable transit authorities to evaluate the services they offer, adjust marketing strategies and improve overall transit performance. In this paper, we aim to develop a method to identify the trip purpose of passenger flow who have trips to commercial district. While the same region always has the different functions, it is fairly challenging to identify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.