The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The streaming media protocols including SIP(Session Initiation Protocol), RTP(Real-time Transport Protocol), RTCP(RTP Control Protocol) and RTSP(Real-Time Streaming Protocol) is the basic technology of the video surveillance system. A video surveillance system based on SIP, RTP/RTCP and RTSP is designed and implemented in this paper. The video surveillance system uses the SIP protocol to connect the...
Outdoor images captured during inclement weather conditions generally exhibit visibility degradation. Localized light sources often result from activation of streetlights and vehicle headlights and are common scenarios in these conditions. The presence of localized light sources in hazy images may cause the generation of over saturation artifacts when those images are restored by traditional state-of-the-art...
The visibility of outdoor images captured in inclement weather will become degraded due to the presence of haze, fog, mist, and so on. Poor visibility caused by atmospheric phenomenon in turn causes failure in computer vision applications, such as outdoor object recognition systems, obstacle detection systems, video surveillance systems, and intelligent transportation systems. In order to solve this...
The visibility of outdoor images captured in inclement weather will become degraded due to the presence of haze, fog, mist, and so on. Poor visibility caused by atmospheric phenomenon in turn causes failure in computer vision applications, such as outdoor object recognition systems, obstacle detection systems, video surveillance systems, and intelligent transportation systems. In order to solve this...
Objects need to be analyzed in the video surveillance system, while motion detection can be applied to define the analyzable area. This paper proposes a novel motion detection algorithm with background model generation. In order to accurately generate background model, 4-connectivity function is directly used to approximately label the background region. The labeling function makes the background...
Automated motion detection, which segments moving objects from video streams, is the key technology of intelligent transportation systems for traffic management. Traffic surveillance systems use video communication over real-world networks with limited bandwidth, which frequently suffers because of either network congestion or unstable bandwidth. Evidence supporting these problems abounds in publications...
This paper presents a novel physical layer signalling method for OFDM systems, where the signalling information is conveyed by a pair of orthogonal Walsh sequences. Compared to SI and S2 signalling in DVB-T2 standard, the signalling with the same priority is transmitted and the computational complexity is greatly reduced by the proposed scheme. Computer simulations verify that the 7-bit signalling...
Automated vehicle detection plays an essential role in the traffic video surveillance system. Video communication of these traffic cameras over real-world limited bandwidth networks can frequently suffer network congestion or unstable bandwidth, especially in regard to wireless systems. This often hinders the detection of moving vehicles in variable bit-rate video streams. This paper presents a novel...
In argumentation-based negotiation based on multi-agent, if a negotiator agent is endowed with ability of self-learning, then it can acquire much more information about opponent's costs and benefits to achieve the purpose of improving negotiated efficiency. This paper discusses the problem of adaptive strategy in intelligent argumentation-based negotiation, presents a generating process of adaptive...
The slicing-tree representation had been proven to be very effective and efficient in optimizing floorplanning/placement and handling design/layout migration in modern system-on-chips (SoCs). However, none of the previous works introduced any symmetric-feasible condition in the slicing trees for analog device-level placement. This paper augments the slicing trees by introducing a new insertion operation...
This paper presents a heterogeneous network interconnection model based on a kind of translucent routing gateway and Linux virtual device to tackle with the communication issue about heterogeneous communication between various devices and Internet in the vehicular networks. In this model, an in-vehicle CAN node is regarded as a usual node in the Internet and will be assigned an IPv6 address and a...
In view of the blur operation in the image tamper, a blur image blind identify algorithm based on the edge feature was proposed. Firstly, the algorithm made the logarithm operation to the image according to the edge feature of out-of-focus blur and artificial blur, and separated image's the incident component and the reflection component. Then it used homomorphism filter to the wavelet region, and...
In order to prevent the harm of corona, the power sector needs to detect and analyze the fault of corona discharge. This paper put forward a single-channel structure corona detection system based on solar-blind UV detection technology, which is able to locate corona discharge effectively. And the absolute discharge area formula has been derived to quantify the corona discharge intensity. On that basis,...
A new static pointer dereference detecting method based on the finite-state machine is presented, and the definition of the finite-state machine for pointer-state transition is given. According to the semantic analysis of source codes, the point-to information is gotten and the mapping relationship between the pointers and the memory units is built up to judge whether the pointer is legal to use....
Abnormal behavior detection refers to the problem of finding patterns in data that do not conform to expected behavior. Detection of abnormal behavior is an important area of research in computer vision and is also driven by a wide of application domains, such as smart video surveillance. In this paper, we present a novel based-energy approach for abnormal behavior detection. Use an adaptive optical...
Arming at the characteristic of shrapnel multi-type and variable batch, developing tools Visual C++ 6.0 and Pro/Toolkit are used, the CNC system based on SmarTeam Data Model is put forward. Effective management and utilization are carried out which are in the fields of the processing parameter inquiring, experience inquiring and G code of numerical control cutting, milling, drilling, boring and so...
To the actual circumstances of the plants studied adapted to the processing plant design technology, including the ability to provide a knowledge-based database, which includes all of the processes, all of which use the resources, such as tools, measuring tool, fixture, but also the management of all the typical processing, process design and use of interactive design derived from a combination of...
Based on semi-analytical theory, end-pumped thermal lens and distortion field of a rectangle YVO4-Nd:YVO4 composite crystal by the diode laser with super-Gaussian mode was researched. The result shows that when the output power of diode laser is 10 W, the pump-face centre of 0.5 at.-% neodymium-doped YVO4-Nd:YVO4 composite crystal can get 147 mm maximal thermal focal length (when k = 5) and has 2...
This paper introduces the basic principle and algorithm of forward deduction, creating knowledge base and integrating database in SQL Server database, and realizing expert system tools by using SQL Server database and C++ in Windows environment. Only if creating different knowledge bases in SQL Server database, can users get dissimilar expert systems.
Cooperative coverage by multiple robots with contact sensors is studied in this paper. Multiple robots internal spiral coverage algorithm is presented to overcome the sensing limitation of the robot whose sense range is the radius of the body. The algorithm guarantees complete coverage by repeating covering portion of the environment and setting the GATE grids. The algorithm is also robust in that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.