The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the problem of built-up areas detection in single high-resolution SAR images. In consideration of the rich structure information of built-up areas in high-resolution SAR images, we put forward a multiscale CNN model to extract multiscale trained features directly from image patches to detect built-up areas. By processing features extraction and classification as a whole, we overcome...
This paper presents a symbolic dynamic method for real-time estimation of battery state-of-charge (SOC). In the proposed method, symbol strings are generated by partitioning (finite-length) time windows of synchronized input-output (e.g., current-voltage) pairs in the respective two-dimensional space. Then, a special class of probabilistic finite state automata (PFSA), called D-Markov machine, is...
This paper presents real-time parameter identification in battery systems as a paradigm of dynamic data-driven application systems (DDDAS). In the proposed method, symbol sequences are generated by partitioning (finite-length) time series data of synchronized input-output (i.e., current-voltage) pairs in the respective two-dimensional space. Then, a special class of probabilistic finite state automata...
It has become much more difficult to access relevant information from the Web With the explosive growth of information available on the World Wide Web. One of the promising approaches is web usage mining, which mines web logs for user models and recommendations. Different from most web recommender systems that are mainly based on clustering and association rule mining, this paper proposes an web personalization...
Based on JavaScript and the framework of Prototype, this paper studied the key technology in designing multimedia electronic map. The key technology concludes the organization with raster data, constructions of the virtual reality environment and so on. Furthermore, the paper demonstrated the feasibility of the technology with the instance of design, development and implementation of the system of...
From a large data set of documents, we need to find documents that relate to human interesting. The relevance feedback method needs a set of relevant and non-relevant documents to work usefully. However, the initial retrieved documents, which are displayed to a user, sometimes don't include relevant documents. In order to solve this problem, we propose a new feedback method using information of non-relevant...
We need to find documents that relate to human interesting from a large data set of documents. The relevance feedback method needs a set of relevant and non-relevant documents to work usefully. However, the initial retrieved documents, which are displayed to a user, sometimes don't include relevant documents. In order to solve this problem, we propose a new feedback method using information of non-relevant...
With the existing fault injection techniques, many faults that can fully expose testability design defects can not be injected. To solve this problem, a method of fault equivalent analysis is proposed. By this means, some characteristics are extracted from the faults those unable to be injected, and ldquoyield analysisrdquo or ldquoyielded analysisrdquo is performed. Then the minimal cut sets of atom...
In this paper we study the characteristics of warrant prices and their formation in China's stock market. We use Hull-White option pricing model (H-W model) to investigate the characteristics of warrant prices, and then adopt the behavior finance theories to study the formation of these characteristics. Our study results show that: all sample warrants have great pricing biases; out-of-the-money warrants...
The Wiener de-convolution algorithm has been used to improve the resolution of images acquired using a coherent terahertz imaging system at 186 GHz. Experimental results have demonstrated that the Wiener algorithm is capable of improving the resolution of images acquired with this system. A testing phantom will be designed and manufactured for quantitative analysis of the improvement in future research.
A novel compact planar inverted-F antenna (PIFA) with reconfigurable feedings for GSM/PCS/DCS applications is proposed in this paper. The U-shaped PIFA with only one branch is folded into 3 planes is designed to reduce the dimensions. The antenna occupies a relatively small volume of 50*7*7 mm3. Two feeds can be switched to achieve two different matching states, and GSM/PCS/DCS bands can be covered...
This paper applies the multi-agent system Strategy to collaborative negotiation in manufacturing supply chain coordination. Multi-agent computational environments are suitable for studying a broad class of coordination and negotiation issues involving multiple autonomous or semiautonomous problem solving agents.
In order to explore the speed-flow relationship under complicated roadway characteristics and heavy traffic volume, this paper established a new practical model based on one month serial data collected from loop detectors on different sites of the expressway in Beijing. Different from the traditional model, the relationship formulated here is composed by free flow segment, stable flow segment and...
Nationwide, financial losses due to financial statement frauds (FSF) are mounting. The industry recognizes the problem and is just now starting to act. Although prevention is the best way to reduce frauds, fraudsters are adaptive and will usually find ways to circumvent such measures. Detecting fraud is essential once prevention mechanism has failed. Several data mining algorithms have been developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.