The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 3D conversation based pronunciation rehabilitation method for impaired hearing children is a new visual teaching auxiliary technology, which overcomes traditional teaching model and is used more widely. The key techniques are extracting 3D facial features and driving 3D head models. To solve the existing problems about traditional methods, the paper proposes a kind of 3D face feature extraction...
In 2011, Cheng-Ma proposed an improved authenticated multiple key exchange (AMKE) protocol based on bilinear pairings with reflection attack resilience. However, Chang-Ma's AMKE protocol designed inefficiently because it requires additional pairing computations and scalar multiplications on an elliptic curve to prevent their proposed reflection attacks. Based on this motivation, this paper proposes...
E-paper screen mobile handheld devices primarily process multimedia data, such as image, audio and text, are expected to become important platforms for pervasive computing. Nowadays, mobile web browser is widely used in mobile handheld devices, such as cell phone, PDAs(personal digital assistants). Accessing web content defined in Wireless Application Protocol(WAP) is fast and comfortable with mobile...
Facial expression recognition research is an important research direction of computer vision on human face analysis field. This paper propose a mark scheme which can be compatible with Constrained Local Model (CLM), and then propose a method which combines local binary patterns' features and SVM classifier to recognize specific expressions. Our method first extracts LBP features from training data,...
For performance and security concern in large-scale application environment, based on "follow the chain" mode, a distributed RFID discovery system is proposed and implemented. At first, system architecture is given. Secondly, core components, such as query engine, local cache and client, are formally specified with TIOA. Experiments on query execution time and accuracy show that this distributed...
For a long time articulatory modeling of vocal tract and speech production organs have been widely researched. This paper firstly introduced the natural speech production process. Then the paper presents the methods for articulatory measurements, geometrical synthesis of articulation and synthesis of speech sounds. The measurement methods are divided to static and dynamic methods according to whether...
Combining the resulting lists of multiple information retrieval (IR) systems has been known to outperform, in many cases, the best of the individual systems. However, it remains a challenging question to know what combination method to use and in what conditions the combination system can perform better than its individual systems. In this paper, we use an information fusion paradigm: Combinatorial...
The topology of a tensor field is partially defined by its degenerate points, called umbilical points. We proposed a new approach for distinguishing them as trisector and wedge points on polynomial fitting surface of point-sampled models. Firstly, the polynomial fitting surface over neighborhoods of each point is obtained, and then the degenerate points are preliminary detected by building a Hessian...
Authenticated encryption scheme is very useful for transmitting a confidential message in insecure networks. Recently, Tzeng et al. proposed a convertible authenticated encryption scheme with message linkages. However, this paper points out that Tzeng et al.'s scheme cannot provide forward secrecy and then proposes an improvement that can provide forward secrecy for practical application.
The service management is brought into the management of ASIIN ( Aero Space Integrated Information Network ) based on the CCSDS AOS recommendation of service division of the spatial network, this paper proposes service-oriented management technology for ASIIN network, and analyzes the advantage of service-oriented ASIIN network management and the relationship between services, applications and network...
Cognitive Radio technology improves spectrum utilization by enabling secondary users to access primary user's unutilized spectrum in an opportunistic manner. However, it causes disruptions to both primary and secondary communication and leads to high switching overhead. In this paper, we propose a novel proactive spectrum handoff approach based on time estimation(TPSH) to reduce the communication...
The Serial Minimum Shift Keying (SMSK) modulation is easy to realize, and can meet the hardware demands of the high-data-rate Direct Sequence Spread Spectrum (DSSS) system. Thus, this method has received considerable attention. For the realization of this modulation, building an appropriate Transformed Filter (TF) becomes the crux of modulator. Based on the character of TF, three types of methods...
Electronic Paper (E-paper) is a new promising display technology which attracted great attentions in industry and academia recently. Existing mobile ad devices have disadvantages such as inflexibility of updating ad contents and timely reacting to different consumers and areas. In this paper, a novel application of Electronic Paper in mobile advertising service is studied. We modified the off-the-shelf...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.