The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
LAMOST is an innovative active reflecting Schmidt telescope in combining a large aperture with a wide field of view, and releasing more than 5,000,000 spectra in DR3. A considerable part of the low SNR spectra are not released or measured parameters, some of these can improve the SNR by the method of spectra stacking. Firstly, targets are selected whose distances of latitude or longitude are less...
We compared two different cosmic ray location algorithms—Laplace and GUO methods. They are useful for a two-dimensional optical fiber to position on the cosmic ray spectrum image. Removing the cosmic rays belongs to the category of the pretreatment. The pretreatment method for two-dimensional optical fiber spectral image is important, it effects the subsequent stellar spectral processing. Cosmic ray...
Spectrum extraction plays a crucial role in two-dimensional spectrum data processing. One of the most important spectrum extraction methods is profile fitting algorithm. In this article we studied the spectrum profile fitting method of non-Gaussian model. The general solution methods always have poor adaptability and some limitation, in order to approximate spectral profiles better, we introduced...
GSM-R is an important transport communication system to realize moving block control so as to maximize the transfer capacity. However, if the GSM-R system is compromised, the transport system has to downgrade to fixed block control which is of low capacity. This paper presents secure train-to-train communication schemes which enable moving block control even if the GSM-R system is under attack. Particularly,...
Power minimization is a traditional method for interference suppression in satellite navigation systems. It works when the interferences are much stronger than the desired signals and noise, and its main advantage is that the direction of arrival (DOA) information of the desired signals is not required. In this paper, a new method for suppressing strong interferences for satellite navigation based...
In order to solve the problem that the coverage area of ZigBee tree network is restricted by the depth, so that new nodes can not join the network and become a orphan, this paper introduces a project of expanding network coverage area. In this project, through the manual of the button, we can choose a qualified end device to convert to the router configuration, then the device as a router receives...
To solve the problem that the cluster heads consume a lot of energy in the cluster tree network, a new method which can balance energy consumption and improve the energy utilization ratio is proposed in this paper. This method employs the existed network address resource to select the reserved cluster head. By this method, the convert of network structure which caused by changing cluster head is also...
In this paper, the reasons for diseases of long span two-way curved arch bridges is analysis and the strengthening methods are illustrated; Research is make on this case and some new materials is used into the strengthening of the bridges; After the strengthening works finished, the efforts is evaluated.
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature points. One method is to recover a secret based on Chinese Remainder approach. Another is to fake some chaff points based on the general biometric feature points, and then recover the secret based on polynomial fitting. In order...
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects per se mainly with the help of the contextual information from the surrounding environment and nearby objects. Without this contextual information, distinguishing an object from an image of the object becomes subtle; it is...
In this study, we examined the effects of exposure to electromagnetic pulse(EMP) on the functional integrity of the BBB and, on the expression of tight junction (TJ) protein (occludin, ZO-1) in rats. Animals were whole body exposed or sham exposed to EMP at 200 kV/m for 400 pulses. The permeability of BBB was examined using Evans Blue (EB) as vascular tracer. The expression of the level of TJ proteins...
This article gives analysis AODVjr routing protocol used by Zigbee technology based on IEEE802.15.4 standard in detail. It supposed to carry out routing across bad node in the use of local repair mechanism of AODVjr routing protocol. The simulation proved that the improved routing protocol shortened the time to repair the break communication link; it has an active significance for shorter delay because...
It is a traditional method that using serial port or JTAG port to download application programmes with complex multi-layer protocol or operation system core into the target evaluation board. However it has become harder to satisfy the needs of the increasing extended development requirement because of the speed limit. The paper proposes a scheme that can complete the downloading operation to the evaluation...
The development trend of embedded technology need the web/server technology applies into embedded fields and provides a flexible remote device monitoring and management function based on Internet browser. But, due to the limitation of hardware resource and the low-efficiency of general purpose TCP/IP protocol stacks and protocol models, it is quite difficult to implement full TCP/IP protocol into...
Topic models are increasingly studied in summarization and other application of discrete data. Though latent Dirichlet allocation (LDA) is one of the widely-used topic models for textual and image data, its Dirichlet distribution does not capture correlations between topics very well. To overcome the drawback, directed acyclic graph (DAG) and other algebra distribution, such as logistic normal distribution,...
The characteristics of pulp fibre influence the final qualities of paper production, but the phenomenon of intersectant, curled and bifurcate of the pulp fibre is very familiar, as a result the routine methods can hardly achieve the analysis and recognition of complex pulp fibre image preferably. The paper introduces the basic principle, structure and recognition tactics of the pulp fibre recognition...
Image segmentation has been studied for many years. But what factors influence segmentation results indeed? Why some images are easy to be handled while the others are not? In this paper we put forward the so-called 'image structure constant' and 'image structure map' to judge the complexity of an image. They can be applied on any image. 'Structure constant' can be found by a hierarchal segmentation...
This paper evaluates Ouda and El-Sakka scheme (OE for short) which is a tamper-localization watermarking. OE is a public block-wise scheme which enables everyone to identify the tampered regions. However, we point out OE scheme may identify a forge blocked to be intact, and accuse an intact block to be corrupted.
In this paper, a multi-class classification system is developed for medical images. We have mainly explored ways to use different image features, and compared two classifiers: principle component analysis (PCA) and supporting vector machines (SVM) with RBF (radial basis functions) kernels. Experimental results showed that SVM with a combination of the middle-level blob feature and low-level features...
In this paper, we present an efficient and convenient relevance feedback (RF) by using a semi-supervised kernel-specified k-means clustering (SKKC) technique. SKKC is used to cluster the retrieval results so that RF can be conducted on the cluster level. Compared with traditional RF conducted on the point/single-image level, the new RF will facilitate the RF selection and reduce user's efforts on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.