The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The robust stability of uncertain neutral systems with time-varying and distribute delays is investigated. The robust stability criterion is proposed based on Lyapunov-Krasovskii and free weight matrices methods, we derive a new stability criterion. Finally, the numerical example was given to illustrate the effectiveness of the method.
Network-faxing service system is integrated with telephone network and Internet .NET Framework is an internal Windows component which supports to build and run nextgeneration applications and XML Web Services. Online payments provide a safe, fast and convenient electronic business environment and on-line financing settlement tools for enterpriser and individual. Network-faxing is a modern communication...
As cloud computing can achieve the goal that getting all information resources in a plug-and-play way, it is rising recently. Data Storage as a Service (DaSaaS) is a typical application of cloud computing. It provides data storage services for users. Because of security and reliability, DaSaaS is not widely adopted. When users store their data in the DaSaaS server, they mostly concern about whether...
Web service composition enables seamless and dynamic integration of business applications on the web. Due to the inherent autonomy and heterogeneity of component Web services it is difficult to predict the behavior of the overall composite service. Therefore, transactional properties are crucial for selecting the web services to take part in the composition. Transactional properties ensure reliability...
This letter focuses on the projective synchronization control of delayed recurrent neural networks with Markovian jumping parameters. The jumping parameters are modeled as continuous-time finite-state Markov chain. Based on the Lyapunov functional method and linear matrix inequality (LMI) approach, a novel control method is given. Simulations with matlab verify the effectiveness of the methods.
Real-time motion detection is a key technology in the intelligent video surveillance and traffic video flow. Widely used methods based on monocular vision are sensitive to light and have problems of black hole and shadow. To solve these problems, we proposed a motion detection method based on binocular vision. The segmentation of move object is based on the distinctive of depth information which is...
As an information of combining RFID and wireless data communication technologies, Internet of Things is making things all over the world connected. RFID (Radio Frequency Identification) technology is the most basic key technology in Internet of Things, which combines signal processing, wireless communication, embedded calculation and data management. RFID technology is being widely used in various...
With regard to the analysis of Web portable technology in the application of E-Learning teaching system, this paper studied the specific application process and provided a comprehensive evaluation result. It fully demonstrated that the Web portable technology based on B/S has high value in the development and application of teaching system.
In many application fields, an appropriate high-quality fast image up sampling method is required. Although many interpolation-based up sampling methods have been proposed, the quality of result images is not satisfactory. Some of them are very fast, but produce poor quality images, the others can produce high quality images, but the methods in them are slow. In our paper, we proposed a fast statistical...
In this paper, new classes of generalized in vex functions called B - (p, r, a)-in vex, B - (p, r, a)-quasi in vex and B -(p, r, a)-pseudo in vex functions are introduced, which are defined by relaxing the definitions of B - (p, r)-in vex, B - (p, r)-quasi-in vex, B - (p, r)-pseudo-in vex functions, an incomplete Lagrange function is defined to study saddle point optimality criteria for minimax fractional...
Provenance of data describes the process of the generation and transformation of the date, which is used in data mining, data verification, data recovery and reference and some other areas. For uncertain data, provenance plays an important role in query and analytical processing. K-anonymous data is a special kind of uncertain data, which is derived according to the generalization tree by the definite...
In this paper, we experimentally evaluate three different averaging methods for processing of electroencephalogram (EEG) event related potentials (ERPs) measured from scalp in response to repeated stimulus. In ERP applications, arithmetic mean (AM) is normally employed in processing the ERPs prior to ERP detection, whereas also other averaging methods might have beneficial properties. Fast ERP detection...
This paper focuses on two integration algorithms used for pseudo-dynamic test, explicit New mark algorithm and implicit alpha-C algorithm. The comparison study between the test and simulation results shows that: the non-uniform distribution of mass, restoring force characteristics and higher frequency vibration modality are simulated more accurately using the alpha-C algorithm than using explicit...
In this paper, we present our recent work on using a Recurrent Neural Network Language Model (RNNLM) in a Mandarin voice input system. Specifically, the RNNLM is used in conjunction with a large high-order n-gram language model (LM) to re-score the N-best list. However, it is observed that the repeated computations in the rescoring procedure can make the rescoring inefficient. Therefore, we propose...
Hierarchical prosody structure generation is a key component for a speech synthesis system. As the basic prosodic unit, the prosodic word plays an important role for the naturalness and the intelligibility for the Chinese TTS system. In this paper we proposed an approach for prediction of Chinese prosodic word boundaries in unrestricted Chinese text, which combines Maximum Entropy Markov Model(MEMM)...
This paper proposes an artificial immune system with social learning (AIS-SoL) for optimization. In the AIS-SoL optimization, the candidate antibodies is separated into two levels i.e., the top level of elitist antibodies (TLEA) and the bottom level of common antibodies (BLCA). Different level of antibodies experience different mutation processes, i.e., a self-learning strategy is used for the TLEA...
This paper introduces a concept of information entropy to judge web-page types, which associates with the method put forward by Roadrunner that pre-purifying topic pages and then using proportional relation to judge the type of pages. With some typical pages from large website home, the average precision could be reached to 96.7%, which lays foundation for further information extracting work.
The conventional resource allocation method is so-called two-step method in OFDM system. The two-step method can reduce the computational complexity. However, it's solution accuracy is not very good. This paper proposes an improved two-step method. This method combines evolutionary algorithm with simulated annealing thought, and can take into account the sub-carrier distribution and power distribution...
Vehicles' safety surveillances have been paid more attentions on by the governments with increasingly rampant terrorist activities like car bombing attacks and illegal immigrations. Lots of terrorists may hide the bombs under the vehicles to avoid the searches by the workers. Illegal immigrants usually adopt the same tricks. Hence, vehicles' bottom will be one of the most important searching places...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.