Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Process mining has been widely applied in lots of fields, which can discover workflow models from event logs, helps to design or re-design process models, and brings convenience to workflow management system. The main function of process mining algorithms is to provide us with valuable objective information hidden in event logs, which plays a crucial important role on the implementation of new operation...
Nowadays, people try to make more convenient assistive device for special needs persons. In this modern society, how to combine technology with assistive device has become a popular issue. However, assistive devices of hand impaired person for using computer are lack of demand. Therefore, to make the assistive device for whom are unable to use mouse is the object of this paper. In this paper, we implement...
As desktops and servers become more complicated, they employ an increasing amount of automatic, non-user initiated communication. Such communication can be good (OS updates, RSS feed readers, and mail polling), bad (keyloggers, spyware, and botnet command-and-control), or ugly (adware or unauthorized peer-to-peer applications). Communication in these applications is often regular, but with very long...
In this paper, a non-contact approach to roundness measurement using machine vision is proposed. A test-rig and computer algorithm are developed to realised the approach. The computer algorithm employs minimum zone circle MZC technique to measure the roundness deviation. High contrast and good quality image segmentation is produced with the developed image processing algorithm technique. Camshaft...
We propose a Deception Robust Control (DRC) for orchestrating the cyber sensors and cyber effectors present in typical enterprise information network systems operating in the ever changing situations that arise in servicing their missions. The theory and exemplar of deception control of focus here-though motivated by conventional warfare-applies to any partial information asymmetric stochastic game,...
Based on the analysis of uniform air supply system theory of duct with constant section combined with the characteristics of train environment, uniform air supply system adjusted by perforated plate is put forward, and theoretical calculation, CFD simulation and experimental tests are carried out. The result shows this air supply system can be completely designed by theoretical calculation, and has...
Accurate alignment of electron tomographic images without using embedded gold particles as fiducial markers is still a challenge. Here we propose a new markerless alignment method that employs Scale Invariant Feature Transform features (SIFT) as virtual markers. It differs from other types of feature in a way the sufficient and distinctive information it represents. This characteristic makes the following...
Energy detection is an attractive spectrum sensing method for cognitive radio. The design of energy detection relies on two critical assumptions: 1) noise power is perfectly and {\it a prior} known; and 2) the test statistics in energy detection can be accurately modeled as independent and identically distributed (i.i.d.) Gaussian random variables. In practice, noise power varies from time to time...
Recently, neural network has attracted a great deal of attention as a method and theory realizing the artificial intelligence. According to the mechanism of BP neural network, the disadvantages of it are analyzed and a new improved BP algorithm is proposed in this paper. The improved algorithm is applied to the learning of XOR question and character recognition question. The simulations show that...
Time synchronization is one of the key points in distributed real-time computer system. At first, a time synchronization method under 1PPS signal is put forth. Secondly, two kinds of relevant synthetic disturbance are analyzed, and time synchronization logic is studied to cope with the disturbance. Arena software is chosen to model and simulate the time synchronization procedure. At last, the whole...
This paper looks at painterly rending using filter blending to create a novel range of artistic effects. We look into several techniques in the field of painterly rendering and combine these different rendering styles together in a user defined way to create a new filter. This creates a user defined painting style based on aspects of different painting styles and processes. The final application uses...
In lots of rule-based computation models, such as ELAN, Prolog, OBJ, etc., a program is composed of a set of rules. The target of computer programs analysis, is to make them parallel. Therefore, rule-based programs which consist of components one by one are quite important for that target. Rule-based program is a chain of state transitions, and actually, it is a chain of rule applications. Thus, it...
It is a frequently encountered problem to calculate the area of target region in image processing. Based on an improved algorithm of contour extracting, a method for calculating the area of target region was advanced. First, the contour is extracted from the binary image, while note the location and type information of the contour points. Next, the area of target region is calculated by weighting...
Service reliability and quality of power have become a growing concern especially with the increasing sensitivity of electronic equipment which generates harmonic current and voltage in distribution system posing new problems for electrical engineers. This power quality problem is of prime concern due to non-linear loads showing distorted current and voltage waveforms. An unexpected side effect of...
To collect neuronal activity data from awake, behaving freely animals, we developed miniaturized telemetry recording system. The integrated system consists of four major components: (1) microelectrodes and micro-driver assembly; (2) analog front end (AFE); (3) Programable system on chip (PSoC); (4) Radio transceiver and the LabVIEW used as a platform for the graphic user interface. The result showed...
Big natural or manmade disasters damage infrastructure and cause severe effect on civilizations. Existing telecommunication infrastructure goes down as well as power, water etc. Quick and effective rescue operation requires a collaborative communication infrastructure for the rescue teams. Emergency spectrum usage of the rescue teams is one of the major issues in such scenario. Different teams interfere...
We have developed an 80 channel readout system for gamma cameras which sends PMT charges in list mode format via a USB bus to the acquisition computer. This is expected to allow for more accurate offline position and energy estimation with e.g. maximum likelihood methods. The goal is to apply this to cameras that can image gamma rays from 25 up to 511keV. The design of each channel includes amplification,...
Visual textual CAPTCHAs have been widely used on Internet banking in China to defend against malicious bot programs. In this paper, four categories of representative CAPTCHAs are chosen to break. We present an efficient method for solving visual textual CAPTCHAs using image processing techniques and instance learning, such as graying, thresholding, interference noises removing, segmentation, character...
Keyword based information retrieval has difficulties in retrieving relevant information because it is not able to include the semantics of queries. In this paper, we present a novel method for query expansion based on semantic relations. In our proposed algorithm, semantically related words to the query are extracted from WordNet. Valuable words among extracted words are selected as candidate expansion...
This paper reviews the development of digital watermarking, and proposes a FFT based blind watermarking scheme for 3D motion. The algorithm embeds a watermark into the 3D motion signals by perturbing the middle frequency coefficients of FFT domain. First, the detected signal is smoothed to get a approximation to original signal, using the theory of noise eliminating. Secondly the watermark noise is...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.