The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Considering that the Linz Donawitz converter gas (LDG) holders in one steel-making zone are correlated with each other, a multi-output fuzzy model with parameter estimation based on Kalman filtering is proposed in this paper. First, a multi-output T-S fuzzy model is established on the basis of a larger number of historical data. Then, the Fuzzy C-means clustering algorithm are used to extract the...
Digital images captured under poor environments are vulnerably degraded in their capacities to convey adequate amount of information to the viewer or computer-based processes. One of the common causes affecting the quality of outdoor images can be traced to that coming from atmospheric condensations such as fog or haze. Image processing algorithms, hence, had been developed to address the de-hazing...
This paper proposed an embedded system to acquire and storage images periodically based on STM32 and transmit images with GPRS to monitoring center. Monitoring center can also send command to acquisition terminals over GPRS. Acquisition terminals are based on STM32 characterized by low energy consumption and high performance. Experiments showed acquisition terminals were stable and reliable in acquisition...
Voice conversion (VC) is the task of modifying a source speaker's voice to match that of a specific target speaker. Traditional methods use Gaussian mixture models (GMM), but the converted speech quality is often badly degraded due to over-smoothing. More recent approaches such as Dynamic Frequency Warping (DFW) maintain more spectrum details during transformation, but require specific formant frequency...
In this paper, wireless statistic division multiplexing (WSDM) is proposed for wireless communication systems, which is a multiplexing scheme that transmits multiple signals simultaneously in the same frequency band over wireless channels. Therefore, the spectrum efficiency of WSDM is high compared to that of time division multiplexing (TDM), frequency division multiplexing (FDM), and code division...
Scripting attack is one of the most common vulnerabilities of Web application. Compared to server vulnerability, privilege escalation, etc. that have attracted more attention and have been widely studied, the study on the scripting attack of network devices such as router has just begun to be taken seriously in recent years, but it's potential impact should not be overlooked. This paper analyzes the...
With the continuous development and improvement of modern information technology and network technology, information security defense is increasingly complex, and the traditional information security is turning into non-traditional security gradually. Because the target of attackers and defenders is oppositional and their strategies are interdependent, the selection of optimal defense strategy is...
This paper discusses robust L2 – L∞ filter design for a class of stochastic systems with time-varying delay. The aim is to design a full order filter such that the error system is asymptotically mean-square stable and a prescribed level γ is satisfied. Both filter analysis and synthesis problems are considered. To reduce the conservatism of the results, the time delay varies in an interval [h1,h2]...
In order to maximum eliminate the pollution caused by vibration of the instrument and improve the accuracy of the turbulent kinetic energy dissipation rate, this paper puts forward an algorithm based on motion compensation. Firstly, spectrum analysis is used to analyze the relationship between shear signal and the acceleration signal. Then, according to the relationship, the acceleration signal takes...
In this paper, we investigate the optimal control problem of unknown nonaffine nonlinear discrete-time (DT) systems by kernel-based dual heuristic programming (KDHP). First, under the framework of Markov decision process (MDP), we build the optimal control model of unknown nonaffine nonlinear DT systems. Second, in order to improve the computational efficiency of the kernel machine, approximate linear...
The recent RNA-Seq technology brings computational challenges in transcriptome assembly and analysis. Lasso-type methods were designed to address the ambiguity and unidentifiability issues in isoform discovery and abundance estimation from RNA-Seq data. However, typical Lasso-type methods are confined to taking the l1 norm to approximate the desired l0 norm, but such approximation has been shown to...
This paper describes a solution for emergency evacuation of a non-symmetric metro station in the case of fire using Wireless Sensor Network (WSN). Comparative simulation research of monitoring and evacuation of a metro station fire both with and without WSN was carried out. A simulation model was constructed using WSN positioning technology. It was found that WSN positioning technology helped solve...
The presence of secondary codes on the top of primary codes to modulate Beidou nGEO satellite signals puts a constraint on the coherent integration duration for possible bit sign transition on the boundary of each primary code period. This paper address the problem of coherent integration over periods longer than one primary code length and the acquisition of NH code chip position. A scheme combining...
Link prediction plays an important role in data mining, which aims at estimating the probability of the connection between two unlinked nodes according to the information of network structure. Many link prediction methods have been proposed so far, while most of them only consider the node similarity based on individual information of common neighbors. In the perspective of interactions between common...
Objective To study the relationship between neonatal hypoxic-ischemic encephalopathy (HIE) lesions' images in DWI, the ADC value and serum NSE, in order to improve the basis for the early diagnosis and treatment of HIE. Methods To detect serum NSE of 27 cases of HIE patients and adept MRI examination in one week, and measure the ADC value of the lesion. 30 healthy newborns were collected randomly...
This paper employs the Chan-Vese (CV) model into aircraft objective extraction for binocular stereo vision to enable autonomous take-off and landing of unmanned aerial vehicles. Fundamental principles of the CV model and the level set method are summarized as minimizing energy function. Eventually, a flying UAV objective extraction algorithm is proposed and developed by using the CV model. Two sets...
In cognitive radio system, the efficiency of spectrum handoff is always a challenge. To conquer this difficulty, classification and matching scheme is adopted. The users are classified according to their type of services at first, and then a reliable channel evaluation is designed to match the classifications of the users', at last, a dynamic programming (DP) algorithm is adopted to decrease the latency...
Spectroscopic data often suffers from common problems of bands overlap and random Gaussian noise. Spectral resolution can be improved by mathematically removing the effect of the instrument response function (IRF). In this paper, a novelty model is proposed to deconvolute the measured spectrum with the sparsity regularization. The proposed model is solved by iteratively reweighted least square method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.