The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new image in painting method based on exemplar-based image in painting idea by Curvature-Driven Diffusion (CDD) model in this paper. This method improves effectiveness and the linear structure propagation by rational confidence and data computing method. Therefore, our method can effectively prevent the "garbage" from producing during the process of in painting, which is a common...
This paper discusses a method to forecast short term electricity load using genetic algorithm (GA) optimized Adaptive Network-based Fuzzy Inference System (ANFIS). The structure and parameters of the adaptive fuzzy neural network are synchronously optimized using an improved genetic algorithm. A fitness function is applied to guide the search process which makes the searching more efficient. The speed...
This paper uses LPC2138 of ARM 7 as the core controller in the smart vehicle so as to achieve a real-time operation system (OS) µC/OS-II. This controller works as the control system to operate the entire vehicle. The real-time µC. OS-II enhances the performance of control and simplifies the design and management of software. In addition, this system uses voice-driven principle, improving the human...
Cloud computing has been a study hot spot of computer network technology at home and abroad, since it was proposed in 2007. GIS raster data has amount of data, so when a large number of users access, traditional file mapping and network database, etc will have problems such as server overload, lower sharing efficiency. Cloud computing is undoubtedly the best ideas to solve storage and display of huge...
Presence of MCP (Micro-channel Plate) pore bias, which induce image replacement in single photon counting Imaging system, in which has two MCP stack. This is a precision study. In order to prevent ion feedback and acquire higher electron multiplication, MCP has their pore bias 6o~8o. However, the channel bias can shift the placement of image. To obtain better clear image, we take some steps to correct...
A preconditioned SOR iterative method with a preconditioner is proposed. The comparison result is given when the coefficient matrix of linear system is a nonsingular M-matrix. Numerical example shows that our method is superior to the basic SOR iterative.
Aiming to the knowledge representation and management existing issues of drilling accident emergency decision in current oil industry, using ontology technology, this paper designs a knowledge base system based on ontology for drilling accident emergency decision, establishes an ontology knowledge representation model, and constructs the emergency ontology knowledge base and case base. Consequently,...
The paper analyzes the design process and feature of corrugated box, puts forward the application of Visual C++ software, conducts research and development of the CAD software of corrugated box based on OpenGL technology. The software framework, the main function modules and development methods are introduced. Result shows: the software has functions of design calculation, strength check, scheme optimization,...
Elevator is served as a kind of convenient equipment, which has wide application in people's daily life. In order to satisfy with the quick development of elevator, the contol system consisted of MCS-51 single chip is adopted in this paper. Moreover, which is used to form the special control system and relevant procedures are solidified. Then, not only the cost is reduced, but also the privacy is...
A new vehicle recognition approach based on graph spectral theory and neural networks is proposed in this paper. In the approach, image threshold method based on graph spectral theory is used for image preprocessing. And after filter of undetermined regions with rules, regions left are gray-unified. These gray values are input into neural network to recognize vehicle and vehicle types. The experiment...
Aluminum cooling cycle with material volume is the key factor in improving the efficiency of the aluminum strip processing. The flow field's design of cooling chamber geometry model cooling cycle is discussed. The numerical model of the flow passage is built according to the geometrical model of the cooling cycle. Then the numerical simulation of flow field in flow passage was performed by using the...
The airborne GPS receiver is used to get the position information of an aircraft in the calibration flight test of radars. The position information is obtained by the carrier phase differential GPS techniques (CDGPS), which needs a network of GPS receivers as reference stations. Usually at least two GPS receivers are needed to get position information of decimeter level precision. In order to evaluate...
Computer network and communication technology have already been widely used in all aspects of our daily life, but the network security problem is getting more and more prominent, while the network wiretap is one of the biggest challenges of the network security. With the security problem caused by network wiretap becoming more serious, how to monitor the network wiretaps has been the primary problem...
In This article, a self-similar river networks model was put forward, which use strings code to identify the original unit and the generator unit of RSN (Random Self-similar river Network). This strings code is consist of four parameters: the river networks price, the node number in generator unit, the angle between adjacent chains, and the probability of replacement of generator unit. Set the basic...
This paper analyzes the construction and routing protocols for ZigBee networking layer, and other protocols as well, proposes a method that to develop specific ZigBee protocol suitable for cellular network topology structure, under the standard framework of IEEE802.15.4. The topology control algorithm is introduced into ZigBee protocol realization, combined with routing discovering. To increase the...
Two typical digital watermark algorithms were introduced in this paper, and did the simulation using MATLAB. In view of their advantages and disadvantages through analysis of the results, propose the digital watermarking algorithm based on discrete cosine transform and discrete wavelet transform. Analyze the application of the multiple digital watermarking in digital copyright protection and the pirate...
An adaptive marker extraction-based watershed algorithm is proposed to overcome the over-segmentation problem. By combining local minima depth and water basin scale information, markers are adaptively extracted for local minima, and the threshold for marker-extraction is automatically calculated according to the statistics of local extreme points in the gradient map. These markers are imposed on the...
Wideband radar with high range resolution can provide a wealth of objective information, but large volumes of data and calculations as a constraint to the problem of Wideband radar signal processing. Sub-band signal processing can decompose high-speed broadband signal to a low-rate narrow-band signals, greatly reducing the complexity of radar signal processing. The modulated filter design is the key...
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavior sequence analysis and the high false negatives. For this situation, this paper proposes a malicious code detection method based on least-squares estimation. In this method, it correlates...
With the development of 3G and smart phones, user's demands of mobile internet increase. The function of mobile browser should be more powerful. But there is limitation of mobile browser on supporting different terminals. This paper proposes a mobile terminal adaptive browser, shows the basic process steps of mobile browser, and brings out the concrete realization of mobile terminal adaptive engine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.