The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Finding highlights relevant to a text query in unedited videos has become increasingly important due to their unprecedented growth. We refer this task as semantic highlight retrieval and propose a query-dependent video representation for retrieving a variety of highlights. Our method consist of two parts: (1) “viralets”, a mid-level representation bridging between visual and semantic spaces; (2) a...
In this paper, we consider the problem of example based single image super-resolution. Our main contribution is introducing a new framework that makes no assumption about the structural similarity between the high-resolution (HR) and low-resolution (LR) manifolds. Instead, we use a subspace affinity measure to exploit the similarity between each HR and LR subspace. First, we train both LR and HR manifolds...
We present a fully trainable solution for binarization of degraded document images using extremely randomized trees. Unlike previous attempts that often use simple features, our method encodes all heuristics about whether or not a pixel is foreground text into a high-dimensional feature vector and learns a more complicated decision function. We introduce two novel features, the Logarithm Intensity...
The system of max-product fuzzy relation inequalities(FRI) has been studied when it is consistent. In this paper, we study max-product FRI system when it is inconsistent. Based on some new concepts and theorems of approximate solutions, we provide an algorithm to solve its approximate solutions of the inconsistent FRI system. Also, we give an example to demonstrate the efficiency of the algorithm.
This paper presents a recurrent optimized heuristic Artificial Neural Network (ANN) uses Recurrent Elman Gradient Descent Adaptive Learning Rate and Momentum method with various parameter values. The values is approached by using El-Nino Southern Oscillation (ENSO) variable, which are Southern Oscillation Index (SOI), Wind, Outgoing Long Wave Radiation (OLR), and Sea Surface Temperature (SST) to forecast...
This study aims to generate empirical evidence on the validity and reliability of Perception of Online Collaborative Learning Questionnaire (POCLQ) using Rasch model. The questionnaire was distributed to 32 (N=32) Diploma Hotel Catering students from Politeknik Ibrahim Sultan, Johor (PIS). Data obtained was analysed using WINSTEP version 3.68 software. The finding showed that POCLQ had high reliability...
Fault diagnosis is an important procedure to ensure the equipment efficiency and stability. The diagnosis process is actually a pattern recognition process, and usually, the fault samples are lack of tags of fault types. In this case, the non-supervised learning method is more available, and kernel clustering is one of the most effective methods. In this paper, a novel electromagnetic particle swarm...
A satellite remote sensing experiment, designed to test the difference in ratio vegetation index between continuous monoculture of rice and rotation of bean and rice, was carried out at Rudong between 2009 and 2010. The methods of analysis developed for this experiment are described in the present paper and demonstrated using ratio vegetation indexes of rice s. We conclude that the mean bean ratio...
In this paper a new vulnerability detecting method is proposed to detect buffer boundary violations. The main idea is to use the metric of array index manipulation rather than using any heuristic method. We employ a SVM-based classifier to classify the vulnerable functions and innocent functions. Then the vulnerable functions are fed to function call graph guided symbolic execution to precisely determine...
This work presents a new controller design technique for asymptotic stabilization of nonlinear systems using passivity indices. The aforementioned indices measure the level of passivity of a system and we address the question of how to use this information to design a dynamic output feedback controller that stabilizes the closed-loop at a given equilibrium. As full state information is not always...
In recent years, the shield tunneling method has been widely used in the construction of urban underground space. Through using ground penetrating radar (GPR) for nondestructive testing of the distribution of grouting behind segments of shield tunnel, secondary compensatory grouting can be carried out, which is aimed at controlling the final longitudinal settlement of the tunnel. In this paper, the...
AngularJS, the new Javascript framework, with wide usage across web browsers and great expression power, comes with a shortcoming — lack of compiler optimization. Consequently it is strongly recommended that every application written in JavaScript, regardless of the used framework, should include tests that validate both its behavior and performance. This paper presents and evaluates two popular web...
Advantage of online item bank can be used to develop effective and efficient systems of examination and tests for assessing the achievement students. In this paper, we introduce a computer system designed to evaluate the quality of online multiple choice items and present our online item exam framework, i.e., building online multiple choice item, testing online item examination, analyzing the performance...
Currently, the most prevalent approaches to authenticate smartphones involve either PINs, swipe patterns, or passwords. Few users enable these approaches. In order to encourage adoption, new authentication methods are needed. Emerging methods rely on the distinctness of a user's touch-based gesture for continuous authentication, providing an unobtrusive approach that simply monitors swipes and other...
At present infrared light emitting diodes are used in diverse scanning and optical security systems of nuclear and power plants. The purpose of work is research reducing radiant power during step-by-step accelerated test at higher ambient temperature. The objects of research are infrared light emitting diodes based on dual AlGaAs heterostructures. Two-stage reduction of radiant power has been revealed:...
In order to improve the fidelity and controllable of electromagnetic environment(EME) building, and build realistic EME for testing and researching the complex EME effect on the electronic information systems, this paper puts forward Equivalent building methods of complex EME based on the meta-elements. First, the paper analysis the domestic and foreign research which presents the current situation...
With the development of tidal energy generation technology, the method of assessing tidal energy converters captured energy has gained more and more attention to the researchers at home and abroad. Tidal flow direction is known to affect the power performance of tidal energy converters, yet correction method to the projected capture area of tidal energy converters remains limited. Therefore, this...
Spread-spectrum is a technique which is widely used in telecommunication and radio communication. For clock signal, this technique makes the clock signal energy distributed on the relevant frequency range rather than on the single frequency point. Thus the Electro-Magnetic-Interference (EMI) of clock is reduced. Since the clock signal is modulated by another signal, resulting in its frequency is changing,...
An envelope modulator with hybrid topology for a high linearity and efficiency polar transmitter is described in this paper. The hybrid configuration exhibits a high speed and high efficiency combination by a linear amplifier and a switching amplifier, respectively, thereby improving the power added efficiency (PAE) of the polar transmitter. Moreover, to achieve wideband requirement, an operational...
MongoDB is one of the most popular NoSQL database nowadays. It is an open-source document-oriented database with flexible schema. To increase performances, it can easily scale both vertically and horizontally. For horizontal scaling, MongoDB uses auto-sharding technique to divide data and distribute it over multiple machines. However, in this technique, a DB administrator must choose a shard key for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.