The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modelica is a new object-oriented multi-domain modeling and simulation language and used for solving large, complex, and heterogeneous physical systems with differential-algebraic equations (DAEs). Presently there is no simulation support available in Modelica for solving partial differential equations (PDEs) problems. This paper describes how to solve the PDE models in Modelica and provides a preliminary...
Testing procedure can be described by the testing and test control notation-version 3(TTCN-3). The automatic execution of TTCN-3 test scripts is transformed to automatic testing of system under test (SUT). We propose a framework, which uses combined symbolic and concrete execution of TTCN-3 test scripts to automatically generate test inputs for most of the feasible paths. Meanwhile most of the test...
This paper shows that the Shannon information theory is not suit to describe the semantic interoperability of distributed information resources. It proposes the spatial-temporal channel concept based on the channel theory to support networking semantic information sharing. The paper analyses the communication semantic stack model and presents a new model to describe information semantic interoperability.
The data stream problem has been studied extensively in recent years. This is because the great in collection of the nature of data stream. The nature of stream data makes it essential to use algorithms which require only one pass over the data. And single-scan, stream analysis methods have been proposed in this context. However, clustering is still a challenging task since many published algorithms...
The difference of the image generated by real target and digital-image-synthesiser (DIS) is analyzed. Then two methods are deduced to recognize deceivable jamming generated by DIS. One is the uncontinuity of the false target in Doppler section which is caused by the quantization of phase increment. The other is the target number and pose in the imaging field after ISAR processing when the pulse repetition...
In this paper, the parallel alternating algorithm for solving the system of linear equations Ax = b is investigated. The convergence result for the method is given when the coefficient matrix is a nonsingular H-matrix.
QFD is a customer-oriented approach to product innovation. The weight of customer requirements and engineering measures are important. The mathematical models are critical tools to get the weight. Both the models of other scholars and the writer are introduced in detail. A comprehensive analysis of the models is done. At last, conclusion and prospect are given.
This paper proposes a novel method for facial expression recognition by using independent component analysis of Gabor features. In the feature extraction stage, Gabor feature vectors are firstly extracted from a set of facial expressions images, then using independent component analysis (ICA) to extract the independent Gabor features. After that, the independent Gabor features are used to train SVM...
In view of the analysis of hostility and working principle of the malicious software and their actions, based on the kernel driver, this paper designs a real-time inspection system framework and solution of malicious software and actions. This system applies shared memory, Windows message mechanism, I/O driver technology and others, implements information synchronization and data communications in...
The improved fisheye views algorithm is introduced as a method to deal with the visual problems in traditional 2D visual programming languages where programming elements are represented by 2D graphical objects. A prototype VPMF is developed to show the dynamically adjusting of the graphical objects and to see the local details and global context simultaneously. The validity and effectiveness of our...
Today collaborative filtering is the most successful recommender system technology. However, in traditional collaborative filtering algorithms, users' interest is considered to be static. That means, in these algorithms, ratings produced at different times are weighted equally, and changes in user purchase interest are not taken into consideration. For this reason, the system may recommend unsatisfactory...
This paper investigates how the small world concept can be applied in the context of wireless sensor networks. We investigate the use of wired short cuts in clustered wireless sensor networks. Before adding wires, we divide the network into clusters with high clustering coefficient. Then add wires acting as shortcuts to bring down the hop count in order to construct a small world. We have developed...
A new universal steganalysis algorithm using YUV color space conversion and feature combination of DCT (discrete cosine transform) and DWT (discrete wavelet transform) domains is proposed. It follows the philosophy introduced in in which the features are calculated from the luminance and chrominance components of the images. Instead of using single wavelet high-order statistics for luminance component...
In view of computer technology widespread application in building where all kinds of information convergence, proposing the building numerical information integration, which aims at impelling the level conformity information of building, providing the advantageous support for intelligent building, the ecologically-safe building, and the energy efficiency of building, exploring the new direction of...
This paper proposed an adaptive shadows detection algorithm based on Gaussian Mixture Model to improve the performance of video object segmentation. This method takes advantage of luminance weight to model the background of the image and obtains a primary segmentation in CIE Luv color space. In this way, it improves the real-time ability of detection. It also becomes more efficient, comparing with...
Most CMPs use on-chip networks to connect cores and tend to integrate more cores on a single die. As the number of cores increases, on-chip networks will play an important role in the performance of future CMPs. Due to its low area cost, triplet-based network is a good choice for the designers of CMPs. In this paper, we analyze the traffic in the terms of latency and link load. Our models for 9-node...
Automated termination analysis is important in the mechanic verification of many programs. However most of existed works analyze the termination based on the construction of linear ranking function. In this paper, we present an algorithm to analyze termination of P-solvable loops with assignments only. The algorithm is based on the recurrence solving and quantifier elimination. In order to prove termination,...
Digital subtraction angiography (DSA) is a type of medical imaging technique used in interventional radiology, which can eliminate the interferential background and give prominence to blood vessels by computer processing. By analyzing the characteristics of DSA medical images, this paper proposes a new solution for this particular image de-noising, which is using improved soft thresholding. In order...
In this paper, a multiple piecewise-linear function is constructed for generating multi-scroll chaotic attractors from the sixth-order Chua system. This approach has been verified both in theoretical analysis and computer simulations.
A particular kind of invariants known as moment invariants have been used for object recognition and identification due to its invariabilities under translation, rotation and similitude transformation and approximate invariability even under small-scale perspective transformation, while contours representing shapes and structures play key role in people's tasks of reorganization and identification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.