The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Network (WSN) having a small sensor suffers from limited computational and communication power. These sensors are deployed randomly and sparsely in the network. One of the major problems occurring in such environment at the time of deployment is the formation of holes in the network. The hole is a communication gap, which affects the general performance of the network. An improved...
Steganography is a branch of computer science where original information bits are to be transmitted on some carrier file[1][7]. This carrier file may be audio file, video file or image file etc. Here in this proposed work, instead of embedding a source image in a carrier image, only stego key is generated on sender side and transmitted on the channel, with some logic this source image is reconstructed...
This case study is about the introduction of computer science to girls in an all-girl environment. Due to the lack of women in technology, many efforts are being made to expose girls to computer programming at an early age. Code camp organizers are using the all-girl model to help put participants more at ease and boost their computing confidence. High computer self-efficacy leads to studying computer...
CCD / CMOS imaging technology is often used in satellite-based remote sensing. Although the image quality is affected by many factors, most published research work is focused on image blur caused by the satellite movement along its orbit and high frequency movement. In this paper we show that the image can also be distorted due to the swing of the satellite as it moves along its orbit. We simulate...
Deep learning is a hot research topic at home and abroad. In view of the massive 3D model data, a 3D model identification method based on topographic sparse coding is proposed. Firstly, the 3D model is projected to get its three views, and the feature vector is used as the training sample. A complete dictionary is constructed by using the greedy algorithm to train the dictionary, which makes the normal...
This work presents a novel method for human action recognition based on feature level fusion and random projection. The proposed method exploits both spatial-temporal gradient features and Gabor features of the action in video, which helps representing the action more accurately after feature level fusion. Meanwhile, the random projection is employed to reduce the dimensionality of features effectively...
Running on a size-reduction network simulated by a given large-scale topology can obviously enhance the time efficiency. In this paper, we realize the size-reduction using the input extracting of a network simulator and evaluate the similarity between the size-reduction and given topologies using multiple criterions. The evaluation result verifies that the network simulation with input extracting...
In recent years, power analysis attacks have caused increasingly serious security threats on cryptographicalgorithm, to solve this problem different researcher has put forward many solutions, and among them the fixed value masking technology is one of the mostly used due to its lower cost and faster speed. Both theoretical and practical results have shown that the masking method has a good resistance...
Clustering is the technique to partition data patterns into different clusters. In real datasets, there are often a large number of unlabeled data patterns and a small number of labeled data patterns. Clustering technology can group data by using the unlabeled data only, but the accuracy is often poor. Classification can learn a classification model through labeled data. Classification can group data...
In the paper, an adaptive fuzzy control strategy (AFCS) of PHEV based on trip characteristics is presented for coaxial parallel PHEV. Based on the accurate prediction of the trip mileage, AFCS can adjust the control threshold of PHEV in real time according to the SOCref by fuzzy control. The dynamic model of PHEV and the AFCS control model are established by AVL Cruise and Matlab/Simulink. The actual...
In order to demonstrate benefits that NDN brings to distributed storage system, we design and implement an ndnDHT-based distributed storage system called Ndynamo. The architecture of Ndynamo is similar to the Dynamo system of Amazon and it takes advantage of many features of NDN. We introduce the architecture and functional modules of this system in this paper, including the detailed descriptions...
Hand-drawn cartoon has the characteristics of flexibility, natural expression and so on. We present a multi-viewpoint hand-drawn character modeling method based on the human body structure, which is used to express the cartoon character model of hand-drawn style. Firstly, the two-dimensional skeleton is extracted, the skeleton depth is acquired and the three-dimensional skeleton is generated by the...
Realistic fluid simulation plays an important role in interactive applications. In this paper, the Lagrangian particle-based approach is used to simulate the motion state of water pouring based on smoothed particle hydrodynamics (SPH). In order to make the particle system more in line with the physical principles, the kernel functions and field quantity equations are reasonably chosen to approximate...
The production scheduling of steelmaking and continuous casting(SCC) is the key to eliminate waste for steel enterprise, and its accuracy and efficiency is determined by modeling and solving algorithm. In this paper, multi-object optimization model of SCC is established to realize the target of punctual casting, no conflict between equipment for one furnace and maximum operating start time of converter,...
The 5G wireless communication system is beyond 2020, which is still in the exploration stage. New waveforms are required to suite for short burst transmissions. Universal filtered multicarrier transmission system is candidate waveform for 5G mobile communication systems, which combines the advantages of OFDM and FBMC. In this study the impact of frequency offset on the UFMC system is analyzed. The...
One of the challenges in Long Term Evolution (LTE) and next generation cellular networks (5G) is the traffic overload and the network congestion caused by massive Machine Type Communication (MTC) devices accessing to an Evolved Node B (eNodeB) simultaneously. In this paper, a novel method is proposed, named Advanced Traffic Scattering for Group Paging (A-TSFGP), aiming to alleviate the system overload...
For the shortcoming of the traditional focused crawler, this paper proposed an improved focused crawl method which based on syntactic dependency analysis. This method generates a words collection of the text through TF-IDF algorithm and generates a phrases collection through syntactic dependency analysis firstly. Then evaluate the collection of words and phrases to select set of keywords of the text...
Integer overflow vulnerability is very difficult to locate and patch. From experience speaking the more complicate the integer operation the more error-prone the program. So in this paper, we come up with a new method to leverage static integer operation attributes to predict integer overflows based on machine learning technique. The static integer operation attributes consist of sink, integer operation...
Web pages can be implemented through two common forms, e.g., static and dynamic. Static page displays information directly without being compiled on the server, thus its access speed is fast. The information in a dynamic page must be loaded priorly from the database. The loading process of dynamic page is a waste of performance for the interpreter accessing useless code, as it increases the workload...
In this paper, we do experiments on the data analysis process of FCM algorithm for large data In the cloud environment. Firstly, we introduced the drawbacks of traditional data analysis. Secondly, we proposed an improved fast clustering algorithm. It shows that the method is feasible. At last, we conducted a simulation experiment, which has shown that the performance of MapReduce based Canopy-FCM...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.