Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Speech feature learning is very important for the design of classification algorithm of Parkinson's disease (PD). Existing speech feature learning method for classification of PD just pays attention to the speech feature. This paper proposed a novel hybrid feature learning algorithm which puts the features of all the speech segments of each subject together, thereby obtaining new and high efficient...
An efficient vehicle detection method is proposed for remote sensing images provided by Chinese GF-2 satellite with the 1-meter spatial resolution in this paper. Considering the characteristics of the vehicle on the road in GF-2 image, dark and light vehicles are firstly detected on the masked road using the semi-automatic dual-threshold technique. The residual disturbance (e.g. shadows, lane line...
Heavy metal stress will damage the normal growth and change the bio-parameters like chlorophyll, nitrogen and water content of rice. Simple, speedy, non-invasive test of heavy metal stress to crops means a lot to the agriculture and even the suspend of human being. Many traditional spectral index computed using hyperspectral data can inverse the above bio-parameters. While it is found that some indies...
For the problem of limited rule bases and inaccurate matching of Chinese Natural Language Processing (NLP), this paper presents a new NLP method based on Semantic Structure Tree (SST). Through establishing SST, this paper calculates the evaluation index to find out the most suitable semantic combination from all possible SST. In order to improve the semantic recognition recall and precision, this...
Quad-play intends to combine internet access, television and telephone with wireless access. It is a major vision for network convergence in the next generation networks. To deliver the streaming contents to user equipments is a key issue due to the high bandwidth consumption and the geographical spread of end users. Peer to Peer technology is widely adopted for this kind of service. Peer to Peer...
This paper investigates the problem of solving sup-conjunctor composite finite interval-valued fuzzy relational equations over complete Brouwerian lattices. First, we introduce the notions of tolerable solution set, united solution set and controllable solution set, respectively and discuss their properties. Secondly, we obtain some necessary and sufficient conditions that these solution sets are...
Continuously growing energy consumption in wireless cellular networks motivates the research towards energy saving approaches. Among previous works, many studies suggest different methods to reduce the transmission power for stationary wireless users. In this paper, we consider a challenging scenario which takes user mobility into account. Based on user mobility pattern, we propose the dynamic cell...
This paper studies and re-designs the performance appraisal system, concerning managers, technicians and serving staff of Guizhou Sante Fan Jin Mountain Tourism Co., Ltd. The AHP method is used to determine the weight of each index and 360 degree is introduced to the design process of performance appraisal.
Risk analysis of reservoir generation dispatching plays an important role in seeking the best scheduling scheme that gives consideration to both risk and benefit. Traditional risk calculating method can't meet the needs of medium and longterm electricity generation dispatching very well, so this paper proposed probability optimization method of risk analysis, and constructed a risk evaluation index...
In this paper, we develop an opportunistic spectrum-scheduling scheme for multichannel cognitive radio networks. In the proposed scheme, the primary user activity and channel quality (signal-to-noise ratio (SNR) at the receiving secondary user) vary on a slot-by-slot basis. The scheduling is performed at the beginning of the frame, which consists of multiple slots. The scheduling algorithm estimates...
Value at Risk (VaR) is a commonly statistical tool to measure market risk. In this paper, a mixture method of APGARCH-M model and EWMA algorithm is applied to measure VaR of a portfolio. Empirical study using three stock index of shanghai stock market shows the mixture method is advantageous and accurate to calculate VaR of a portfolio.
In this paper, a QoS-guaranteed cross-layer resource allocation algorithm for multiclass services in downlink LTE system is proposed, which takes EXP rule, channel quality variance, real-time services and non-real-time services and minimum transmission rate into account. The key features of the proposed algorithm are that all the users and resource blocks will be allocated step by step respectively...
Based on investigation, this article identified an evaluation index system of person-organization fit for enterprise technician through analysis data, and applied the comprehensive evaluation methods, such as Analytic Hierarchy Process, comprehensive index and clustering analysis, to evaluate and analyze a particular enterprise's technicians on person-organization fit.
In this paper, a trustable service selection model based on consumer reputation is proposed. Our model exploits evidence theory and extends deception detection of existing bodies of evidence to identify dishonest decision maker. The model defines the confidence intervals for bodies of evidence, and estimates the reputation of the Web service by collecting customer feedback via network referrals. It...
Vegetation canopy water content is essential to monitor crop water deficit and natural communities in the diagnosis assessment of drought, forest and grassland fire risk prediction as well. In this study, four 8-day composite MODIS surface reflectance images were used as the basic data. Global Vegetation Moisture Index (GVMI) and Equivalent Water Thickness (EWT) model were adopted to estimate the...
Path planning is an effective means to improve the operational effectiveness of aircrafts. A reasonable estimation and description of threats existing in operation space are significant before generating a specific path for an aircraft. To avoid depending on experts' experience excessively when we evaluate the threat situations, an index based threat modeling method named IBTMM is proposed. IBTMM...
"Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more...
Under the opening economic circumstances, evaluating the risk of cross-border capital flow has special significance. For effectively evaluating the risk associated with capital flow, a new evaluation index system of risk is created on the basis of fourteen influencing factors. The analytic hierarchy process is used to determine the weights of indexes and four-grade risk comment set is adopted. Using...
In this paper, quality of service (QoS) provisioning for voice service over cognitive radio networks is considered. As voice traffic is sensitive to delay, the presence of primary users and the requirement that secondary users should not interfere with them pose many challenges for QoS support for secondary voice users. Two cognitive medium access schemes are proposed in this paper for the secondary...
A novel steganographic scheme is proposed in this paper to embed secret message into Java executable files. It analyzes firstly the format of Java class file, and then reorder the indexes of constants to embed messages. Expensive experiments show that the stego file modified by the proposed scheme still have the same file size and the implementation performance as cover. It is concluded that our scheme...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.