The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Blind deconvolution algorithms for blur images have been in widespread use for a decade. However most of the methods suffer from issues like processing speed defects, robustness, ill-posed ness. In view of the current research for blur images, a fast, robust blind deconvolution algorithm based on new cepstrum and total variation is being proposed in this paper. This new method can preserve image details...
With the development of cognitive science after the behaviorism theory and universal grammar, the researchers pay attention to language transfer again. In cognitive science, the researchers hold that what influences language transfer is no longer a single factor, but the multifactor. This paper mainly analyzes the factors affecting language transfer in SLA based on language, learners and context....
IGMP is an important multicast protocol in internet. Its work mode can either be proxy mode or be snooping mode. A resolution for IGMP v3 protocol using Finite State Machine which works at proxy mode has been proposed. The IGMP proxy contains three parts: the IGMP proxy router, IGMP proxy host and IGMP querier. The IGMP proxy router handles the received IGMP packets from subscriber ports, stores and...
With network resource virtualization and the rise of user experience demand, it is needed to design a system architecture based on the cooperation of multiple virtual machines, which can detect customers' business needs prospectively and manage network resource legitimately. It is also needed to design a highly reliable virtual machine resource unified dispatch program, which detects customers' business...
The plasma produced in Tokamak experiment is extremely unstable. In order to realize effective plasma control, physical experts need to know the real time plasma data, such as position, shape, current, and other parameters. The paper proposes a method of acquiring plasma data from the Plasma Control System (PCS) by reflective memory (RFM). Once the PCS produces plasma data, the RFMs share the data...
Ethernet OAM is a requirement from network provider to maintain Ethernet service networks. So ITU-T developed Y.1731 protocol and IEEE developed 802.1ag protocol, they are the mainly standards about Ethernet OAM currently. Base on Y.1731, a resolution of Ethernet OAM for DSLAM is proposed and implemented successfully. The ETH-CC function is implemented by hardware to reduce consumption of the CPU...
Background: The hierarchical prognosis and risk factors in patients with CKD is less well studied. Methods: 272 CKD patients were investigated. Markov model including six states [CKD1, CKD2, CKD3, CKD4, CKD5 as well as death/ end-stage renal disease (ESRD)] were established. Results: The mean follow-up was 2.0 years. The mean duration in state CKD1, CKD2, CKD3, CKD4 and CKD5 were 8.4 years, 5.8 years,...
To evaluate the ambient air quality status of the Fuxin city in Aug-Nov, 2011, we established fuzzy comprehensive evaluation mathematical model and membership function using lower semi-trapezoid distribution through the distribution of data collection and selecting the main factor affecting air quality, and have the result that urban monthly average air quality has declined with the temperature during...
Focus on the inconsistency between the convergence rate and the steady state error in LMS algorithm, this paper proposed a new variable step size LMS(VSS-LMS) algorithm, by constructing a nonlinear function between the step factor µ and the error signal e(n). The algorithm which modified the weight vector appropriately achieving the optimal by adjusting the step size parameters, could improve the...
A simple compact multi-band planar inverted-F antenna(PIFA) for mobile devices is presented. The particular shape of the proposed PIFA patch is a compact rectangle with several slits. These slits separate the patch into two resonant paths, generating two bands of about 900 and 1800MHz. The obtained bandwidth covers CDMA, GSM, DCS1800, and PCS1900 bands. Details of proposed antenna design and experimental...
Smart meter is an intelligent instrumentation whose core is the microprocessor application and network communication technology. Smart meter is getting the popularizing and applying at home and abroad. Except for having the basic function of the two-way measurement, Smart meter also has other various functions, for example, the point classification measurement, two-way communication, various control...
The main drawback of free-form deformation method is not able to preserve the features of shape. To address it, an efficient shape deformation algorithm is proposed based on least-square mesh. By using the global Laplacian smoothing with positional constraints, the least square mesh (LSM) including only low-frequency component of a shape is first extracted, and the high-frequency signals of the shape...
In order to increase the spectrum resource utilization, Flexible Bandwidth Optical Networks is developed to adaptively allocate an appropriately-sized optical bandwidth to an end-to-end optical path. In this paper, a novel collision-aware spectrum assignment scheme called Collision-aware Weight based Fit (CWF) has been proposed for Flexible Bandwidth Optical Networks. Based on the weight-based idea,...
Patent risk assessment in automatic control technology development process can not be ignored. Most main factors of the patent risk assessment in automatic control technology include the possibility of infringement, the possibility of losing the lawsuit, degree of impact of losing the lawsuit, the alternative of technology and authorized necessity. Automatic control technology patent risk prevention...
authentication of web service combination is the key to ensure the normal working of the combination service. Many methods of current web service combination are half-formalization, which can come out many errors and not easy to be detected, so the correctness is hard to be ensured. The paper introduces the Transfer matrix to analyze the deadlock problem in web service combination, and adopt Incidence...
after analyzing the present title assessment a system is designed and implemented, this is suitable for city-region. The system is designed based on the ideology of software component, so the encapsulated function can be reused and the system possesses good extensibility and maintainability. The system can meet the requirement of title assessment management and is beneficial to the improvement of...
Internet of things (IOT), as a third high tide of information industry, the safety of it has arose wide attention. To improve research and application of safe internet of things, this paper deeply researched the process of IOT's development, key technique, and frame. Based on all these above this paper analyzed safety threatens and primary prevent measure. At last, the impact of IOT to safety grade...
The public transportation query system is a distributed system based on fixed platforms, which does not meet users anytime, anywhere on the move process of getting the desired information. This article combines public transportation query results and the latest technology to design a new query system. Server-side uses resource-oriented Rest style Web-Services framework to facilitate the access of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.