The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User demand for content has become more evident and content service (text messages, video on demand) has become the main network service. Thus, the Content-Centric Networking (CCN) has become the research focus of next-generation Internet architecture. However, the requirements of supporting content provider mobility are not considered. To solve this problem, we propose proactive caching of vital...
For the widely existing document and relation mixed-type data, this paper proposes a system of storage and query for associated mixed-type data based on the distributed middleware. It adopts distributed middleware as technological tools to integrate databases of different types, which achieves adaptive and efficient data storage performance for document and relation type data. Furthermore, the hybrid...
Free space is the world region where navigation without collision is guaranteed. So the computation of free space in an environment is an essential task for many intelligent automobiles. This paper presents a novel approach for free space computation in complex traffic scenarios based on stereo vision. Since existing methods may have drawbacks in smoothness or continuity, especially in noisy background...
This paper proposes a new mobile phone user authentic scheme. It discerns a particular user by the smartphone sensor data which is collected when he picks his phone up from table. The data from phone sensors which collected by preprocessing method, it includes denoising, interception and normalization. Precondition the sensor data with denoising and signal truncating technology, then normalize it,...
IoT Service clustering is the basis for service discovery, service composition and service recommendation in Internet of Things. However, most existing IoT service clustering approaches solely focus on utilizing service description text. This paper proposes a Tag Aided Service Clustering approach (TASC) which integrates both service description text and user-contributed tag information through Tag...
Ship damage control is an important measure to maintain ship vitality when suffering damages. Through the study of a single node command ship damage control disposal process, this article established a model of ship damage control command based on T-Petri; On the basis of analyzing of typical damage by the crew compartment fire scene processing based on T-Petri damage control model, and optimizing...
Along with the wide popularization of smartphone, nearly everyone has a smartphone in modern society. Thus, the relative position of people can be inferred by that of their smartphones. There is huge application prospect for such information about relative position. For instance, a geographical location area can be divided according to the current location. When someone steps into the divided location...
Current network architecture suffers overloading due to extensive resource utility. This paper proposes a resource mapping algorithm upon service layer of service-based network: the unit of service component requests resource as well as limits; an agent is embedded in the component to surveil the utility of network resource. If network resource violates the limits, agent will punish the component...
Accelerator control system is the core of the accelerator. Laboratory physics and industrial control system (Epics) is jointly developed by the United States Los Alamos National Laboratory (LANL) and Argonne Laboratory (ANL) control system integration tool, which is widely used in the accelerator control system. EPICS control system has the advantages of openness, practicality, and reliability. In...
In order to improve anti-jamming performance of GNSS receivers, the Automatic Gain Control (AGC) system is commonly utilized. AGC is able to scale the analog input voltage to an optimal level of the ADC. Few studies have investigated how AGC impacts the signal processing of GNSS receivers in pulsed interference conditions. This paper studies the performance of GNSS receivers with AGC in the presence...
Single image super-resolution technique has been used in wide applications to enlarge the resolution of a image. In this paper, a new single image super-resolution algorithm is proposed. In the proposed algorithm, the edge pixels are firstly detected by using the Sobel operator. Then, the set of the pixels which participate in the filtering and estimation of each high-resolution pixel is determined...
Based on Khatri-Rao subspace, a novel direction of arrival (DOA) estimation method for wideband uncorrelated signals is proposed in the presence of unknown mutual coupling. The effect of mutual coupling at each frequency bin can be compensated by setting several auxiliary array elements on each side of the original array and the DOAs can be accurately estimated by applying the technique of Khatri-Rao...
Vector tracking loop (VTL) can be regarded as a kind of integration of navigation filter and signal tracking. It has a better performance for weak signal and can recapture signal quickly, but its robustness and computation complexity is worse. This paper mainly studies a tight integration model of navigation filter and tracking filter, which remains the signal tracking filter in local channels and...
Recognizing offline handwritten Telugu characters from digitized document images is very challenging. In this paper, we propose a novel approach of hybrid feature extraction and hierarchical classification to recognize the glyphs of offline handwritten Telugu characters. In the proposed method, hybrid features are extracted from the glyphs and the glyphs are recognized using a hierarchical classification...
Identification of experts is an important task in Community Question Answering (CQA) because many operations in CQA depend on the experts. In most of the CQA the expert identification techniques are very poor. The problem we identified is questions suggested by the cQa to the users who are identified as experts are not interested to answer by the identified experts. Also with current expert identification...
In this research paper, a rule based chunker is developed and evaluated. For the development of the chunker, handcrafted linguistic rules for mainly noun, adverb, verb, adjective phrases and conjuncts were generated. Indian Languages Chunk Tagset is used for annotations. In order to evaluate, 500 sentences of Hindi language tagged by HMM tagger were considered and given as an input to our chunker...
Mentoring has been increasingly used in educational enhancements and development to facilitate transfer of knowledge in higher education from one lecturer to another. However, the process is unclear and lecturers are not aware of the process itself. Therefore, studies about the awareness of mentoring in universities such as in University Tenaga Nasional (UNITEN) is deemed important. This paper looks...
Graphs are widely used to represent many differentkinds of real world data such as social networks, protein-proteininteractions, and road networks. In many cases, each node in agraph is associated with a set of its attributes and it is criticalto not only consider the link structure of a graph but also usethe attribute information to achieve more meaningful results invarious graph mining tasks. Most...
File transfers over dedicated connections, supported by large parallel file systems, have become increasingly important in high-performance computing and big data workflows. It remains a challenge to achieve peak rates for such transfers due to the complexities of file I/O, host, and network transport subsystems, and equally importantly, their interactions. We present extensive measurements of disk-to-disk...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.