The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an approach to detail aware contrast enhancement with linear image fusion. The proposed approach is abbreviated as DACE/LIF. Two main stages are involved in the DACE/LIF approach: the conventional histogram equalization (CHE) and linear image fusion (LIF). Though the CHE has the problem of over enhancement, it is noted that the details which is not obvious in the original image...
In this paper we investigate the search path when building a wireless mesh network under extended ad-hoc network, and we propose a search method that can reduce power consumption. The route search part and the node part - which can be a mobile PC or a mobile phone, etc. -are combined in the proposed method. Moreover, we aim at improving the efficiency of the communication between nodes under the extended...
This paper presents a methodology to design a PID Digital Compensator for digital controller power electronics systems. This method is base on direct digital design and use on digital controller buck dc-dc converter. Crossover frequency and phase margin of close-loop system can be set by this method, and the integration coefficient in digital compensator set by this method can be avoid one of the...
Radio frequency identification (RFID) uses wireless local area network technology, which limits its scope of application. And the data security isn't well protected because of the limited hardware resource of cheap electronic tag. In this paper, we realize the combination of TCP/IP and RFID technology by the Ethernet interface of SAMSysMP9320 reader/writer. This is accomplished by assigning IP address...
Digital video volume has been increasing exponentially for the past decade in both professional and amateur domains. In order to skim through video archives rapidly and efficiently, it is crucial to have a system to automatically generate video summary. In this paper, we propose to generate human-interest-aware video summary by reflecting human interest to the low-level video features. Human interest...
Well-written text must achieve not only the coherent and cohesive logical organization but also the textual consistency of writing style, which is specified not only by genre but also targeted audience and writer's communicative intention and purposes. Any authors, particularly learners, have much difficulty choosing the proper style for their particular writing and detecting style inconsistencies...
Virtualized servers are attracting considerable attention in the field of information technology because of the reduction of business costs and number of servers associated with their implementation. However, the types of business applications suitable for virtualization are still unclear. In addition, information systems issues should be considered to be essential for task performance and achieving...
This paper considers and suggests efficient patrol of nurses from analysis result of nurse calls log. As the method of analysis, we consider applying Bayesian network. This is one of probability model that is available for prospects of a phenomenon, rational mind decision and so on. In conventional studies, correlation coefficient was used to examine relation between phenomena. However, we could analyze...
Presentation skill is essential both for academic and business purposes, but its training, particularly in Asian countries, still heavily depends on experiences. This paper reconsiders presentation skill and discusses system requirements of a presentation learning support system, which is based on our prototypical multimedia learner corpus of basic presentation. Then we developed a prototype of comprehensive...
A robust semi-supervised method using the mode filter has been presented for learning with partially-labeled training data including label errors. The mode filter has been originally developed for smoothing images contaminated with impulsive noises. However it needs nonlinear optimization which is usually solved with iterative methods. In this paper, we propose a direct solution method with full search...
A sensor network consists of a large number of sensor nodes which have sensing functions and wireless communication functions, and a single sink node which is a base station node of the sensor network. Sensor nodes sense some environmental phenomena and send data packets about the phenomena to the sink node by multi-hop communications. Generally sensor nodes are battery-driven. Therefore shortening...
The objective of this paper is to carry out computational experiments to examine Japanese public pension system from the perspective of both macro-level and micro-level. In Japan, one of the most aging countries in the world, many studies have been conducted to evaluate the sustainability of the pension system under the condition of drastic demographic change through computational simulations. Most...
In this paper, we employ an agent-based simulation as a tool to estimate the influence of hospital closure to other hospitals in the neighborhood. In Japan, some hospitals managed by local governments face financial difficulties because of the change of medical fees, and the increase in the number of patients due to aged society. Although municipal hospitals greatly contributed to maintain Japanese...
There is a growing interest in teaching people to acquire a global perspective. For this purpose, educational institutions are encouraging intercultural exchanges, such as short-term overseas study programs and internships. However, such programs are so expensive that students cannot take them easily. In this paper, we have built a multilinguistic learning environment in cyber-space. We have designed...
Variety of Web Service discovery algorithms had been investigated for improvement of the retrieval quality. Combining the several algorithms according to their strong points, is proposed as enabling more refined discovery consequence. Now, many researches as OWL-Mx are sited as examples, had already shown the method that join together and conclude for the specific domain. However, there are no way...
Context awareness is one of the most important aspects in the current ubiquitous computing research field. Danger-aware system is a kind of context awareness system, which detects the dangerous situations and provides services responsive to the dangerous situation. However, there is a shortcoming in the current danger/context awareness systems that the reasoning mechanisms are not flexible. Without...
This paper proposes an interactive system based on the spiral learning model which students review their situation, get feedback and improve themselves. Basic idea is borrowed from CMMI for organization and adapted it to personal learning. This paper also describes a prototype which includes the function that shows teacher about summary of students' situation. On this prototype, students disclose...
The following topics are dealt with: user behavior; intention aware computing; Internet LAN based RFID; intrusion detection system; document analysis; Web service; search engine; machine learning; neural network; collaborative communication; virtualized server; collaborative learning; video summary; computer simulation; fingerprint image matching; data analysis; Bayesian network; text visualization;...
We previously proposed the time layer model as a control architecture for large scale, high-speed and complexity networks. In this model, each control mechanism is hierarchical in terms of not only function but also “operation time of the control”. This paper proposes the detour-type local routing mechanism. In this mechanism, each node in a network manages the route of a traffic flow by using local...
H.264, MPEG-4 Part 10, is the latest digital video coding standard that achieves very high data compression by using several new coding features. One of the new feature is variable block sizes for inter frame coding to increase compression efficiency. However, to achieve this, the H.264 encoder employs a complex mode decision technique based on rate-distortion optimization (RDO) that requires high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.