The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information explosion brings too much trouble to human lives. In order to improve the query efficiency of big data, we focus on the research ofa parallel algorithm, top-k query based on MapReduce. Firstly, we introduce the classic top-k algorithms and the basic theory of parallel programming MapReduce Model. Secondly, we put forward to the improved top-k algorithm and describe two core modules: word...
Quality of holographic images reconstructed from digital holographic information system with monochromatic CCD is higher than that from the colorful CCD. We want to use one singular monochromatic CCD to work in the information system of colorful phase-shifting digital holography. After the formulae are deducted and computer programs are designed, we extracted phase shifts, reconstructed the corresponding...
An improved RSA cryptosystem based on chaotic synchronization is newly presented in this paper. First, the design of a discrete sliding mode controller (DSMC) is proposed to make the master and slave chaotic systems synchronized, then a modified RSA encryption algorithm is proposed. In the traditional RSA cryptosystem, the public key needs to be open or transmitted in the public channel which provides...
Surveys indicate that privacy persists as an issue of public and individual concern. It is a highly relevant issue in systems engineering today, and the need for privacy studies will be escalating substantially in the coming years as agencies increasingly turn to Internet-based cloud computing, however, conceptual difficulty exists in defining privacy. According to researchers in the field, prominent...
In this paper the necessity to apply Internet of Things (Hereinafter referred to as IOT) in the coal industry is analyzed. The architecture of a new kind of IOT for coal mine and its main technical indicators are proposed based on sensor technology, combined with Industrial Ethernet, 3G/WIFI wireless networks, wireless sensor networks and other technologies.
Huge pages have been widely supported by architecture and operating system. Huge pages map large fixed virtual memory regions, on the orders of 2MB to 1GB on Intel x86-64 architecture. The page size is the key to striking the balance between trade-off pairs. For example, initially, the use of huge pages aims to mitigate address translation overhead for memory-intensive workloads with large memory...
With the analysis on hospital medical devices management operation, find the medical devices management style of many hospitals are still on the manual side, in lending, returning, warehousing and it bring many problems such as heavy workload, low efficiency, lack of intelligence. Combined with the technology of radio frequency identification (RFID) can rapid, high-volume, non-contact read the tag...
Combined with the Moon exploration, it builds the simulation scenario about the communication between Deep Station and Moon Detector. It analyzes the problems in the deep communication, such as: the big path loss, large delay and intermittent communication. Based on the analysis, it provides the methods to solve the problems and analyzes the effect for using the appropriate measures which can enhance...
By means of analysis to the autonomous control level and development direction of Unmanned Aerial Vehicle (UAV), the location in the autonomous control level and research priorities of Manned/Unmanned Aerial Vehicle (MAV/UAV) cooperative engagement capability (CEC) was determined. On that basis, this paper analyzed related concepts of MAV/UAV cooperative engagement. Then, it discussed the application...
Multiple-view stereo reconstruction is a key step in image-based 3D acquisition and patchmatch based method is suited for large scale scene reconstruction. In this paper we extend the two-view patchmatch stereo to multiple-view in the multiple-view stereo pipeline. The key of the proposed method is to select multiple suitable neighboring images for a reference image, compute the depth-maps and merge...
To solve the adverse effects brought by resource node transfering the using right to local task and the difficult problem of resource load balancing, a two-phase pricing strategy based on QoS constraints is proposed in this paper. On the premise of guaranteeing the benefits of the resource provider in the cost price, this strategy balances the load of the resource provider by the profit price. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.