The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Background subtraction is a traditional method for detecting objects in stationary background. However, this traditional method is difficult to detect objects accurately in the real world, because the background is usually cluttered and not completely static. In this paper, we propose an object detection approach using Ant Colony System (ACS) in a MAP-MRF framework. For object segmentation, a MAP-MRF...
With the increasing development of e-commerce application, e-commerce system security is facing the heavy challenge. To solve the purpose of intensifying the behavior trustworthiness and controllability of e-commerce system, we focus on building the trustworthy model between e-commerce system and user behaviors and strengthening the manageability of e-commerce systems. This paper by setting up the...
This paper tackles the problem of fast varying channel estimation in LTE systems. Particular attention is given to downlink transmission where OFDMA is used as the multiple access technique for the air interface. In OFDMA, fast variation of the channel results in significant inter-carrier interference (ICI) which cannot be mitigated with conventional estimation and equalization techniques. In this...
Wireless Sensor Networks (WSNs) have been of high interest during the past couple of years. One of the most important aspects of WSN research is location estimation. As a good solution of fine grained localization Reichenbach et al. introduced the Distributed Least Squares (DLS) algorithm, which splits the costly localization process in a complex precalculation and a simple postcalculation which is...
The standard transmission control protocol(TCP) can not distinguish between the random packet losses due to high bit error rate(BER) and the packet losses due to network congestion. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. Meanwhile, the performance of TCP would be deteriorated very...
In computer animation, animation tools are required for fluid-like motions which are controllable by users or animators. One of the popular and widely used methods for simulating fluid flow in computer graphics is Smoothed Particle Hydrodynamics (SPH). Although SPH is practical for applying to fluid movement control and also preserves efficiently properties of fluid flow, it is complicated to simulate...
A new adaptation method for local model networks with higher degree polynomials which are trained by the polynomial model tree (POLYMOT) algorithm is presented in this paper. Usually the local models are linearly parameterized and those parameters are typically adapted by a recursive least squares approach. For the utilization of higher degree polynomials a subset selection method, which is a part...
Predicting network latencies between Internet hosts can efficiently support large-scale Internet applications, e.g., file sharing service and the overlay construction. Several study use the hyperbolic space to model the Internet dense-core and many-tendril structure. However, existing hyperbolic space based embedding approaches are not designed for accurate latency estimation in the distributed context...
Product family-based configuration with respect to mass customization has been well recognized. In product configuration, a Product Data Model (PDM) is widely used to capture various semantic and structural information in product configuration tasks. However, PDM is not suitable for computational purpose. Constraint Satisfaction Problem (CSP)-based product configuration is a promising approach for...
To alleviate positioning error using wireless ultra wideband (UWB) is primary concern, and it has been studied how to reduce the positioning error effectively. Thanks to many repeated transmissions of UWB signals, we can have a variety of selections to point out the most precise positioning result. Towards this, scanning method has been preferred to be used due to its simplicity. This exhaustive method...
Managing power consumption in a System-On-Chip (SoC) design is becoming increasingly important. SoCs generally consist of various co-processors. Accurate power estimation of these co-processors at the highest possible abstraction level helps in performing early power-aware design tradeoffs. This paper presents a methodology to create abstract statistical power models for hardware co-processors and...
This article proposes a new method for sensor fault detection, applicable to systems modeled by conservation laws. The state of the system is modeled by a Hamilton-Jacobi equation, in which the Hamiltonian is uncertain. Using a LaxHopf formula, we show that any local measurement of the state of the system restricts the allowed set of possible values of other local measurements. We derive these constraints...
The modern-day system-on-chip communication posses complex characteristics- (a) the communication times of individual transactions are difficult to predict, (b) concurrent communication techniques are employed to meet the performance of emerging applications, and (c) communication is hierarchical. Thus, performance of communication architecture plays major role in determining the performance of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.