The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Visual shape matching is a critical topic in pattern recognition applications. Atomic potential matching (APM) model is a relatively new shape matching methodology inspired by potential field attractions. Compared to the conventional edge potential function model, APM not only encourages the right matching parts through attraction, but also repels the wrong matching parts. This feature enables APM...
Introduce the hardware structure of data acquisition system. The embedded Linux data acquisition system driver is designed by analyzing the Linux device structure and implementing mechanism and utilizing key technologies like DMA, asynchronous notification, memory map, interrupt processing. The designed driver was proved work well.
Through analysis of the shortcomings of traditional force requirement model and taking into full account of soldiers' great contribution to the enhancement of army operational ability, this paper puts forward a warfighting capability index-based force calculation method, abandoning the force requirement ideas stressing only the weapon and equipment. It then introduces the Lanchester Equation, determines...
Aiming at the problems that the implicit Runge-Kutta method is hard to programming use, and lack precision analysis of implicit Runge-Kutta methods, several classic five-stage implicit Runge-Kutta methods are used to compare their calculation accuracy and the sensitivity of calculation step. The study results provided a reference for the selection using of five-stage implicit Runge-Kutta methods.
In order to improve efficiency of parameter curve or surface machining, NURBS interpolation algorithm is proposed based on piecewise feed-rate planning. NURBS curve is initially dispersed into micro lines segmentations by uniform error method. With constraint of kinematic characters of machine tool, NURBS curve is divided into curve segmentations and feed-rates are planned in these segmentations,...
This paper focuses on the capacity-investments in a duopoly setup where quality is determined by congestion. Network providers invest in capacity-expanding measures first and then compete in prices. A continuum of consumers have to decide which firms they connect (or do not connect at all). A unique profit-maximizing capacity-investment level is found, and a threshold condition to determine whether...
Gray correlation analysis combined with improved AHP (Analytic Hierarchy Process) method is applied to evaluate intelligent U-turn behavior of unmanned vehicles. On the basis of establishing the evaluation index system of intelligent U-turn behavior, improved AHP is used to determine the weight of every evaluation index, and then the gray correlation comprehensive evaluation model is constructed,...
In order to quantitatively research on driving distraction, a method based on peripheral detection task (PDT) of measuring driver's reaction time is established. The method is applied to measuring the reaction time of the driver in the virtual driving simulation platform when the driver is answering the phone during driving, and through analyzing the difference of the reaction time in two different...
Tibetan text representation, which has great influence on Tibetan text Categorization and Cluster, is the groundwork in Tibetan text mining. Tibetan microblog is one of the most popular Tibetan network media. Researches on Tibetan microblog are now increasing. However, because of the special features of microblog text and the features of Tibetan language, traditional Tibetan text representation method...
PID control algorithm has been extensively used in process controls. But the PID control parameters tuning is a complicated process in the controller. This paper proposes a solution to do optimal selection of process control parameters by particle swarm algorithm. The particle swarm algorithm can be applied to obtain the best control parameters of the fitness function with least-error and least-overshoot...
Since the mainstream methods of hardware trojan detection all need a reference IC which definitely have no Hardware Trojan Horse (HTH) implanted in and hardly be obtained, a novel hardware trojan detection method that doesn't need to rely on a reference IC based on low toggle-rate nodes is proposed in this paper. The gate-level netlist after layout of AES circuits was extracted to verify the detection...
In the field of the Semantic Web, ontology plays a crucial role. In this paper, for the user's choice and retrieval needs, ontology language grammar-based content, research and construction are hot tourist areas in Africa ontology knowledge of the domain ontology, the knowledge base can not only meet the user's needs, but also scalability. In this paper, the process of constructing domain ontology,...
Sparse representation classification (SRC) and kernel method have been successfully used in pattern recognition. On account of the limitations of the single kernel function, we proposed multiple kernel sparse classification method in face recognition to improve human face recognition rate. The Power kernel function has a good stability, and the Gaussian kernel function has good practicability. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.