The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Alzheimer's disease (AD), also known as geriatric dementia, is the most serious dementia occurred among the elders whose age is over 65. Cognitive functions or memory will decay with age and are irreversible. The cause of dementia remains a mystery and the dementia population normally increases within aged societies. It is not only hard to diagnose whether an elderly will suffer from dementia but...
The safety and security of kernel is the key to the security of the embedded system and we even have to formal verification the kernel in the field of safety-critical embedded applications. In this paper we introduce a design and implementation of the modeling of micro kernel based on spatial-temporal isolation in Haskell which is a functional language. This not only could significantly improve the...
This paper chose Samsung's S3C2440A as the core processing chip, achieved the purpose of multi-channel analog quantity acquisition, conversion, transmission and monitoring based on embedded technology and Global System for Mobile Communication (GSM) technology. The design adopts S3C2440A to control all the modules of the system and process the information under the embedded Linux operating system...
Multitask Learning has been proven to be more effective than the traditional single task learning on many real-world problems by simultaneously transferring knowledge among different tasks which may suffer from limited labeled data. However, in order to build a reliable multitask learning model, nontrivial effort to construct the relatedness between different tasks is critical. When the number of...
We apply a range of data mining techniques to analyze voting patterns in the United Nations. We begin with non-linear dimensionality reduction, showing that diffusion geometry reveals an historically relevant organization of countries based on their UN voting patterns. Key historical events can be ``read out'' from these embeddings, such as de Gaulle's influence on France and the breakup of the Soviet...
Atmospheric turbulence affects the imaging system at a long distance, which causes time-varying blur. Although the blur kernel is unknown, we propose an algorithm to estimate Optical Transfer Function (OTF) for long-exposure atmospheric turbulence blurred images. In this paper we present a novel image prior-isolate edges prior to predict a sharp ‘vision’ of degraded image edges, and utilize the two...
The intend of this paper is to introduce a new method for protein complex identification. Proteins share an important role by signaling cells. Proteins are three dimensional objects and any types of deformed proteins can cause severe disease, because their function is related to their shape and also the amino-acid sequence they have coded with. Technically speaking similar types of proteins tend to...
Host-based intrusion detection systems (HIDSs), especially anomaly-based, have received much attention over the past few decades. Over time, however, the existing data sets used for evaluation of a HIDS have lost most of their relevance due to the substantial development of computer systems. To fill this gap, ADFA Linux data set (ADFA-LD) is recently released, which is composed of thousands of system...
In viewpoint of noncausal and non-integeral dimensional signal processing, a novel and computationally efficient, fractional zero-phase FIR filter is proposed by a definition of Liouville-Weyl fractional integrator. Based on two commonly used Liouville and Weyl fractional integral definitions, we present Liouville fractional linear phase delay filter and Weyl fractional linear phase lead filter. Thanks...
Multi-instance learning concerns about building learning models from a number of labeled instance bags, where each bag consists of instances with unknown labels. A bag is labeled positive if one or more multiple instances inside the bag is positive, and negative otherwise. For all existing multi-instance learning algorithms, they are only applicable to the setting where instances in each bag are represented...
System-call is the interaction interface between operation system and uses program. Program runs without system calls. in this paper, Analysis of linux system-calls on the ARM processor implementation principle, Describes the structure of the system-call, Involving the four main contents of Kernel files made some references, Combined with a simple example to illustrate the linux system-calls based...
Complex disorders exhibit great heterogeneity in both clinical manifestation and genetic etiology. This heterogeneity substantially limits the identification of geneotype-phenotype associations. Differentiating homogeneous subtypes of a complex phenotype will enable the detection of genetic variants contributing to the effect of subtypes that cannot be detected by the non-differentiated phenotype...
Learning algorithms of the support vector machine is to map the input vector to a high dimensional space through certain kernel function and separate the image of the original linear input vector with the maximum of interval under consideration. This paper is about the limb motion recognition problem of stroke patients, mapping the input vector to the reproducing kernel RKHS (reproducing Kernel Hilbert...
In recent years, information leakage cases happen frequently and are one of big problems. 70% of such a cases are caused by human factors such as mismanagements and/or careless operations. Such a factors can be removed by the control of information flow and/or the check of computer operations. Therefore, some studies to control information flows have been proposed. However, almost studies focus on...
Navigation-assistance systems using feature-based geographic Electronic Navigation Chart (ENC) data are widely employed to help ensure the safety of vessels and their crews. ENC data consist of descriptions of the characteristics of features along with geographic information on them. Because they are created and delivered according to the IHO standards, they are encoded in data transfer formats such...
Crowd density estimation is the fundamental content and central issue in most public video monitoring systems, and it is also a hot spot in computer vision area. Recent state-of-the-art method is based on image processing. Traditional methods can be divided into two main directions, one is based on pixel statistics, and the other is based on texture analysis. In our paper, we combine these two methods...
The blurring in image comes either from the acquisition noise, or from image editing operation. The produced adverse noise during acquisition need to be eliminated, and the blurring generated by editing should be known in digital forensics, so the blur kernel recovery is significant in community of image processing and computer graphics. In the log-fourier domain, the images before and after blurring...
Multi-task concurrent execution and resource sharing based on preemptive scheduling strategy may cause priority inversion phenomenon in real-time systems. Priority inversion phenomenon is the significant reason of unpredictable errors in real-time system, serious continuous priority inversion phenomenon will lead to real-time system collapse. The paper analyzes the phenomenon and the cause of the...
Detecting the banknote serial number is an important task in business transaction. In this paper, we propose a new banknote number recognition method. The preprocessing of each banknote image is used to locate position of the banknote number image. Each number image is divided into non-overlapping partitions and the average gray value of each partition is used as feature vector for recognition. The...
In this paper an improved algorithm of computational verb PID controller is proposed. In the original design of verb PID controller, the modification of integral gain is coupled with that of the derivative gain. In this paper, the integral gain is modified independently by using a separated set of computational verb rules. The comparisons of tracking performance and robustness among conventional PID...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.