The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital TV broadcasting network, including digital cable TV, digital territorial TV, and digital satellite TV, has been built and spread out nationwide. Emergency message can be displayed in various forms with digital TV broadcasting network, such as text, picture, audio, and video. In this paper, we propose an emergency broadcasting system using transport stream (TS) to carry emergency message in...
As the panorama has been used widely in various aspects and the demands of market increase, we should attach importance to the difficulty and cost of generating the panorama. So we describe a portable device of generating the panorama in this paper. The device takes advantage of the coordination of the tilt angle sensor, GPS module, the controller and embedded MCU etc. Then a serial of images which...
With the development of many-core processors, programmable intelligent engine many-core processor CPU allocation, and custom packet classification and load balancing transceiver offers the possibility, however, faced with a dozen or even hundreds of CPU core, how each CPU core task assignment, so that the execution of the current task to achieve the most optimal allocation, how the CPU core layer...
The deep learning is a growing multi-layer neural network learning algorithm in the field of machine learning in recent years. Firstly, this paper analyzes the superiority of the deep learning at the aspect of feature extraction. Aimed at the lack of feature expression capacity and curse of dimensionality results from excessive feature dimensions of shallow learning, this paper proposes that using...
Aiming at the problem that the digital signal modulation mode is difficult to be accurately identified in communication system, according to the digital signal wavelet amplitude difference between before and after normalized, this paper puts forward a recognition algorithm based on the wavelet variation coefficient difference and similarity feature. This algorithm according the variation coefficient...
Web image retrieval technology is a hot research topic nowadays, many research institutions at home and abroad are engaged in the research of this topic, and has obtained certain research results. In this paper, at home and abroad about the Web image retrieval technology, on the basis of similarity matching algorithm for image retrieval technique and image analysis and verification. In the Web image...
With rapid progress of 3DTV (Three-Dimensional Television) and 3D film industry, stereoscopic technology has become an increasingly important aspect of image technology in recent years. Stereoscopic 3D (S3D) image brings enhanced 3D experience to the viewer, but also may lead to visual discomfort. However, it needs to control the perceived depth of S3D image within a certain range around the screen,...
The global open source software resources have become an Internet-scale repository, which provide abundant resources for software reuse. However, how to locate the desired resource efficiently and accurately from such large amounts is quite a challenge problem. Most of recent works barely focus on the semantic similarity by analyzing the software itself, which often result in inappropriate ranking...
In this paper, a new fault diagnosis method is proposed. First, a fault transferring directed graph(FTDG) G(V,E) is created according to the principal of the system. Second, we convert the FTDG into a fault transferring probability matrix(FTPM). Third, for any input node i with false output, its probable faulty element set corresponds to a fuzzy set V with membership of the ith column of FTPM, and...
With the development of cloud computing technology, the cost of commercial cloud resources is getting low, a malicious user could use the same cloud platform resources in a virtual machine to implement intrusion. For existing cloud Intrusion Detection System Only detect known attacks, the lower compatibility of different virtual network model. Based on the analysis of KVM network model, we propose...
In this paper, we present a practical Electrocardiogram-based (ECG) human authentication method which is very suitable for deployment in mobile devices like smart phones. A user only needs 20 seconds to register his ECG template at the first time and about 4 seconds to authenticate afterwards. We firstly extracted heartbeats of every cardiac cycle and then separately corrected PQ segments, QRS segments...
Traditional delay scheduling algorithm processes the task scheduling through a fixed time waiting threshold to achieve better data locality. However, this fixed manner often leads to low resource utilization and job performance degradation, especially for short jobs. This paper proposes a predicting delay scheduling algorithm, called P-Delay. P-Delay leverages both the job characteristic and dynamic...
In this paper, we propose a method by introducing the software evolution information into the process of software clustering with the aid of a prototype tool support. By using the method, user can reconstruct the java software into several package according to the parameters set in the system. An example is also given in this paper to show how to use the tool.
With the rapidly growing in number of service providers and service users, as a result, there are three important issues that we now have to deal: Firstly, we face challenges with increasing large data sets. Secondly, many Web service providers have similar functionality but differ in quality properties and services. Finally, there will have many number of missing QoS values in history records. Therefore,...
Recommender system is to establish the relationship between the user and the information products, to use the existing selection habits and the similarity of each user's potential interest in the object, and then personalized recommendation. It is one of the effective ways to solve the information overload in the Internet age. But in practical application, because of the large number of products and...
The normalized Laplacian spectrum is a good indicator of connectivity for comparing graphs with different sizes (i.e., the number of nodes). This paper shows the performances of several random-walk sampling algorithms using the spectral indicator. Based on two types of complex network models with exponential and power-law degree distributions, we determine that the sampling algorithms do not perform...
This paper does research on the Internet visit traffic prediction by using time series and apply it to server configuration. After analyzing the periodicity and regularity of typical periods of time series, we propose the multi-dimensional model establishment method, which is both applicable for long-term and short-term prediction. In addition, for immediate prediction we propose dynamic change rate...
Routing protocols have a significant impact on performance in mobile Ad hoc networks. In order to find the right routing protocols for “linear structure” of Ad hoc network, the principle of dynamic source routing (DSR) and Ad hoc on-demand distance vector routing (AODV) is studied, the same and differences of DSR and AODV is compared and analyzed. This paper analysis and comparison network performance...
In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high...
Transit network design problem is a typical NP-complete problem, when designing the transit network, we have to maximize the number of satisfied passengers, the total number of transfers and the total travel time of all served passengers. To some extent, it is also a multi-criteria decision-making problem. In this paper, a new model based on discrete wolf pack search algorithm (DWPS) is proposed to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.