The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aiming at the deficiency in the field of marine engineers training at present, an entire virtual training system for marine engineers has been designed and developed, which is composed of the full mission marine engine room simulator module and three-dimensional virtual marine engine room module, respectively aiming at cultivating the operating ability for marine engine room system and marine engine...
This paper is aiming at the application of Virtual realization technology, based on the theory of particle system, introducing the basic principle of the particle system and the whole process of the motion about the particles of water in the Waterfall, and the process is accompanied by dying and producing continuously with movement of particles. In this paper, we also introduce some techniques such...
The workers' number of a specific topology is fixed once it starts in Storm. This causes unnecessary waste of resources when workload shrinks down. In this paper, we propose an approach called DBalancer to dynamically increase or decrease the number of workers according to statistics of real-time data rate. DBalancer consists of three components: (1) Collector is used to collect data information about...
The rapid development of the Internet provides a platform for the sharing of resource, and it has become a focus of the information society with user's increasing demand for network services year by year. With the development of cloud computing technology, it provides a solution for resource sharing. But due to uncertainty of cloud computing user requests, if there is not reasonable allocation and...
Radar detection has been an important means of detection in military and civilian monitoring and protection. In view of the circumstances where traditional radar is difficult to be applied to the distributed network, we propose a distributed networked radar detection scheme. Through the introduction and use of the potocol stack of IOT(Internet of things), message oriented middleware, real time database,...
In the recent decades, Internet of Things (IoT) is becoming much more popular than ever. The sensors in IoT are becoming heterogeneous and abundant. It is necessary to implement a middleware platform to deal with the tremendous growth in the number and variety of sensors. In this paper, we design and implement a modularized and dynamic platform based on OSGI framework to deal with the vast heterogeneous...
The Internet of Things (IoT) has been widely applied in sensing systems, which connect various sensors and gather their information. Data fusion, which is to integrate multiple data representing the same real-world object into a consistent and accurate representation, is an important issue. Most of existing approaches of data fusion involve various analytical procedures whose high computational complexity...
In this paper, we consider a mobile advertising recommendation system using item-based Top-N recommendation algorithm based on Hadoop framework and then propose a solution based on the Hadoop framework to build a distributed recommendation system. We also introduce advertising server into the system. Seller will pay for their advertising when it is clicked by users, so that this platform can make...
Distributed Real-time Embedded (DRE) systems working in open environments often need to enforce utilization bounds on multiple processors in order to manage CPU resources adaptively even when task execution times are unforeseeable. An event-based utilization control algorithm is proposed, and the algorithm applies to mixed (continuous and discrete) rate adaptation in DRE systems including tasks that...
With the development of embedded technology, digital image processing technology is widely used in various fields. A real-time image processing system based on FPGA is studied, which is composed of two parts, the basic algorithm of image acquisition and image processing. The QuartusII9.1 and Modelsim6.5b are used to develop the simulation environment. The structure system of the traditional line is...
This paper analyzed the existing network security situation evaluation methods and discovered that they can't accurately reflect the features of large-scale, synergetic, multi-stage gradually shown by network attack behaviors. For this purpose, under deep analyzing the association between attack intention and network configuration information, a network security situation evaluation method based on...
The communication ability of sensor network node is limited. When the data arrival rate exceeds maximum transmission rate of the node, packets will queue in node buffer. As a task-based network, the real-time information requirements of events are different for users in the sensor network monitoring area. Aiming at data transmission characteristics of monitoring multiple events with sensor network,...
In this paper, a RTP streaming media application for video signals on demand or multicast is proposed based on MPEG-4 coding features and RTP/RTCP principles. A optibase's MPEG-4 Movie Maker 400 card and Apple's DARWIN streaming media sever are used, and RTP packing algorithm based on the MPEG-4 transmission is also used. Experiments show that the algorithm has efficient transmission and packet loss...
The Least Mean Square (LMS)algorithm is the most basic adaptive echo cancellation algorithm. However, the fixed step size of LMS does not solve the contradiction between the convergence rate and the steady state error which are all used for judging the performance of algorithm. This paper references the Sigmoid function and creates the nonlinear relation between estimated error e(n) and variable step...
This paper presents a method of gesture recognition based on Leap Motion controller in the virtual maintenance training system. In order to realize the real action of the hand in the maintenance, we establish virtual hand model by combining the characteristics of Leap Motion device. The virtual hand model includes the use of the tool to enhance the diversity of maintenance actions. We analyze the...
By taking advantage of VC++, this paper has realized one kind of speaker-independent speech recognition system with small vocabulary and isolated words. By adopting the method of pre-emphasis endpoint detection, this system can eliminate effects of low-frequency noise. Moreover, it invokes HTK speech processing toolbox in VC to complete the feature extraction and pattern matching. According to the...
With the development of military technology, the large scale war, network war and the Group war have gradually become the main form of future wars. This brings a new demand of large scale multi-sensor data fusion and supercomputing capacity for information fusion system. Aiming at the shortcomings of traditional information fusion system, a new information fusion system is designed based on cloud...
Moving object images in video sequence are obtained by subtracting the background images with the current frame images, background extraction is an important process. Firstly, in this paper, the background and moving objects are extracted by using the improved Gaussian mixture background modeling. Then, the previous moving object and moving object of frame difference are effectively integrated into...
Currently, there are increasing demands for unmanned aerial vehicle (UAV) in urban application. UAV based on mobile communication network has further breached the limit of transmission distances. Taking into account the inherent characteristics of communication network infrastructures such as blind spots in distribution and space loss, this paper uses the wireless communication model of base station...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.