Search all articles

+ Advanced search
Search articles within:
119727 articles

Using GPS data to monitor road traffic flows in a metropolitan area: methodology and case study

Alfio Costanzo
Currently, few traffic management departments offer traffic monitoring services in real time due to the high cost of such car traffic monitoring system. Aim of the paper is the one of proposing a low cost system based on the GPS signals coming from the smart phones of the drivers to build a colored traffic...

Research on the effectiveness evaluation method of VLF Communication Jamming

Guangming Li, Guangyou Cai, Cuihua Liu
This paper introduces the communication jamming suppressing zone to evaluate the vlf communication jamming effectiveness, and proposes to make use of the jamming equation to set up the mathematical model of calculating the jamming suppressing zone .The calculation of jamming suppressing zone will provide...

A performance-optimized firewall rules matching algorithm

Zhong Li, Xiao Li
The algorithm of firewall rules matching designed in this paper is based on the idea of divide-and-conquer the rules set. The rules set are divided into multiple sub-sets in accordance with the protocol type. Then, accordance with the relationship between two rules, each sub-set is divided into two groups:...

A Class of Nonconvex Nonsmooth Approximate Potential Functions for Nonconvex Nonsmooth Image Restoration

Xiao-Guang Liu, Xing-Bao Gao
Nonconvex nonsmooth potential functions have superior restoration performance for the images with neat boundaries. However, several difficulties emerge from the numerical computation. Thus the graduated nonconvex (GNC) method is suggested to deal with these problems. To improve the performance of the...

A Traffic Sign Detection Method with High Accuracy and Efficiency

Gangyi Wang, Guanghui Ren, Taifan Quan
Traffic sign recognition is a challenging computer vision problem for its high requirement of reliability and efficiency. In this paper, we propose a prohibitory traffic sign detection method. The method first extracts a red bitmap from the input image and then detects circles in the red bitmap. To detect...

A Source-Filter Model-Based Unvoiced Speech Detector for Speech Coding

Qian Wang, Xin Du, Weikang Gu
A novel and easy to realize approach for Voice Activity Detection (VAD) is proposed based on the source-filter speech model in the application of Linear-Prediction-structure speech coding. Generalized Likelihood Ratio Test (GLRT) is adopted to formulate the voice activity detector which contains an unvoiced...

A New Way to Describe Spatiotemporal Data

Mingli Song
Data analysis especially dealing with spatiotemporal data in a human-centric way becomes essential in modern engineering and science fields. In this study, we present a granular way of data analysis where the data are described by information granules defined in spatial and temporal domain. We show that...

Backing up your DNS Cache

Xuebiao YUCHI, Likun ZHANG, Liming WANG, Anlei HU, Xiaodong LEE
Traditional ways to implement Domain Name System (DNS) cache backup are to dump the full DNS cache to some document/database periodically, which can bring great negative impact on DNS cache’s performance. In this paper, based on a newly redesigned DNS cache architecture, we suggest an optimized DNS cache...

Design of A Power Quality Monitoring System Based on MSP430

Qiang Wang, Zhaolong Pang, Jianlin Ma, Yingjie Liu
A power quality monitoring system based on MSP430 is proposed in this paper. The monitoring system uses the high accuracy electronic energy measurement integrated circuit ATT7022E and low power consumption microcontroller. The monitoring system can monitor voltage, current, active power, reactive power,...

A Survey of Face Recognition Methods

Xianwei Li, Haiyang Zhang
Face recognition has received much attention because of its theoretical challenges as well as applications in user identification, surveillance and human–computer interaction. As a result, numerous methods have been developed for face recognition in the last few decades. Some universally used methods...

Investigating Semantic Formalization from the Computational Perspective

Huangfu Wei
Senses are the extensions of language and interrelations between word meanings within language and the basis of flexible language use. Computers are basically made to process symbols. Computational linguistics is to simulate part of, if not all of, the natural language competence. From the perspective...

Fuzzy Control for Two-degree of Freedom Point Light Source Tracking System Based on Digital Signal Processor

Hongke Xu, Peichao Dong, Hao Chen, Hang Yan, Shan Lin
In order to improve the efficiency of solar panels this paper designs a DSP-based two-degree of freedom point light source fuzzy tracking system which is based on the fuzzy reasoning technology and digital signal processor technology. It designs a photodiode based light source detection unit and uses...

Light sheet flow control technology research

Yueming Yang, Jinbo Yao, Qingyu Yang, Xuewei Liu
This article by the understanding of the basic principles of flow visualization 0.75m × 0.75m backflow wind tunnel since the inquiry light sheet flow display device Observe the liquidity situation of the aircraft model in the low-speed state achieved good results.

An Automatic Testing Framework Used in Agile Software Development

Fei Wang, Xiao-yong Wu, Yu-wei Wang, Jian-kun Li, Wei Sun
automatic testing is very important for agile software development. There are some testing tasks can be finished by automatic tools, but most of them can not meet the actual needs of enterprises which is the direct reason of building an agile automatic testing framework named as Agilework. The structure,...

Research and Implementation of smooth transition strategies --- IPv6 tunnel technology

YaFang Lou, YongBing Xu, ZhiJun Yuan
IPv6 has a massive address ,multicast ,neighbor discovery, auto-configuration, service quality, removable and many other new features, as the core technology of the next generation IP( Internet Protocol). IPv4 to IPv6 transition is imperative. This paper discusses how to achieve a smooth transition from...

The computer virtual reality technology in the application of sports training

Yanjun Chang
Virtual reality technology with the help of computer hardware and software resources to create and experience the virtual world integration technology can realize the dynamic simulation of the real world,and the dynamic environment to the user’s attitude and language command could make a real-time response,...

The Anti-Jamming Design Based on DSP System

Yun-feng Peng, Chang SHU, Wei ZHANG, Quan-zhi ZHOU
This paper describes the sources of interference in the DSP system and its harm. The designs of both the hardware and the software anti-jamming technology are given respectively, and the purpose of the DSP system anti-jamming is realized.

The Application of Queuing Theory—Reasonable Arrangements of Ophthalmic Beds

Dongbing Liu, Wenbin Liu
The utilization of hospital bed is critical to hospitals. A reasonable evaluation of hospital bed utilization helps hospital administrators to strengthen hospital management in allocating sickbeds to improve efficiency in the use of hospital beds. Therefore, through establishing model to analyze bed...

Multi-path Decision Tree

Huaping Guo, Ming Fan
Decision trees are well-known and established models for classification and regression. In this paper, we propose multi-path decision tree algorithm (MPDT). Different from traditional decision tree where the path of each record is deterministic and exclusive, a record can trace several paths simultaneously...

Research on Initial Filter Criteria of IP Multimedia Subsystem

Yafang WANG, Xiaozhe ZHENG, Leilei KANG, Bingyang CHENG
IMS offers a unified service trigger mechanism, whose core is triggering the service to the corresponding SIP application server which based on initial filter criteria. Then the exclusive SIP application servers provide various value-added multimedia services for the users. This paper researches how...

The routing of wireless sensor path query optimization research

Lei Li, Runhua Wang, Jianping Zhou, Yi Tang
the wireless sensor network and its characteristics of the study concluded, that the wireless sensor network (WSN) and sensor network and ad hoc network. And the key problems need to be solved. On several of today's popular WSN hierarchical routing protocols are analyzed and summarized. On whether the...

Based Fractional Lower-Order Statistics Detection of Envelop Modulation for Underwater Acoustic

An-qing Zhang, Qing-hua WU
Traditional underwater target noise signal modulation spectrum analysis methods is based on the second-order statistics characteristics in the Gaussian noise environment, but in most cases underwater acoustic signals, such as ship-radiated noise and marine environment noise, have pulse characteristic...

Semi-Supervised Possibilistic Fuzzy c-Means Clustering Algorithm on Maximized Central Distance

Li Liu, Xiao-Jun Wu
Abandoning the constraint conditions of memberships in traditional fuzzy clustering algorithms, such as Fuzzy C-Means (FCM), Possibilistic Fuzzy c-Means (PCM) is more robust in dealing with noise and outliers. A small amount of labeled patterns guiding the clustering process are easy to be obtained in...

Low-speed wind tunnel testing control systems research

Jinbo Yao, Qingyu Yang, Yueming Yang, Xiujuan Liu
The wind tunnel test control is the key to the wind tunnel tests. This article Studied 0.75m × 0.75m With backflow wind tunnel measurement and control technology, through the transformation of the wind tunnel motor to improve the stability and uniformity of the airflow and reduce turbulence degree; through...

Research of Parallel Artificial Bee Colony Algorithm Based on MPI

Yingsen Hong, Zhenzhou Ji, Chunlei Liu
Artificial bee colony algorithm is a smart optimization algorithm based on the bees acquisition model. A long time for the search of the artificial bee colony algorithm, in this paper we propose a parallel algorithm of artificial bee colony algorithm (MPI-ABC), with an application of a parallel programming...

Colored helium bubble flow visualization control technology

Qingyu Yang, Yueming Yang, Jinbo Yao, Dun Jin
In this paper, the basic understanding of the principles of flow visualization 0.75m × 0.75m backflow wind tunnel in the self-study colored helium bubble flow control device, observe the liquidity situation of the aircraft model in the low-speed state, and achieved good effect.

Interaction Between Object Detection and Multi-Target Tracking

Zhiming Wang, Hong Bao
Object detection and target tracking are two basic tasks in video analysis and understanding. Though both of them were studied widely and deeply, interaction between them worth more efforts. We give an interaction framework between PNN based object detection and meanshift target tracking. Detection results...

Research of Cloud Security Communication Firewall Based on Android Platform

Miao Cai, Qinsheng Hou, Fangfang Jing, Qiao Ding
To solve communications security problems of smartphones, this paper analyzes today's firewall models’ lopsided and mechanized characteristic and points out their defects and limitations. Then this paper proposes a new communications firewall model based on the Android platform innovatively with combination...

Design and Implementation of the CNC Monitoring System Based on Internet of Things

Yilin Zheng, Hu Lin, Qingxu Deng, Xianli Su
Aiming at the shortcomings of the traditional CNC sensor network such as the difficult cable laying and long-distance communication signal attenuation, this paper designs the CNC monitoring system based on Internet of Things technology. The design reduces the power consumption of wireless sensor nodes...

A Two Factor User Authentication Scheme for Medical Registration Platform

Di Liu, Zhi-Jiang Zhang, Ni Zhang
This paper proposes a two factors user authentication scheme for Beijing medical registration platform, in order to protect user personal information on the platform. This scheme overcomes the shortcoming that there is no authentication process during user log on the platform. The reason that builds...

Mobile Robots Path Planning Based on Evolutionary Artificial Potential Fields Approach

Feilong Li, Yujun Wang, Yan Tan, Gengyu Ge
This paper presents a new way for mobile robots’ path planning which is based on the Evolutionary Artificial Potential Fields(EAPF) approach. The APF theory is a traditional method to plan path for a robot. The Evolutionary APF aims at helping a robot jump out of the local minimum point. Using a virtual...

Optimum Structure of multi-layer silver superlenses for optical lithography

Junxian Ma, Kuangying Yuan
Multilayer silver superlenses had been shown to having sub-wavelength performance. In this paper, we investigate the effects on imaging performance of different multilayer imaging structures comprising alternately layered metal and dielectric films. We first compare and analyze transmission coefficients...

A Theoretical Study of the HO2 + HN2 Reaction

Tiancheng Xiang, Hongyan Si, Yanru Zhao
The mechanism of the HO2 + HN2 reaction has been investigated at the B3LYP/6-311++G (3df, 3pd) level. The single-point energy calculations are performed at the high-level CCSD (T) / 6-311++G (3df, 3pd) for more accurate energy values. For the HO2 + HN2 reaction, DFT calculations show the dissociation...

The parameter’s MCMC estimation of HMMs with transition density function

Chengwen Zhu, Yu Ge, Lina Lu, Zhang Tian, Chuizhen Zeng
The parameter estimation of HMM is critical to all its applications. The classic B-W algorithm is not flexible with the initial parameters and is easy to fall into the local optimal solution. Bayes estimation of it makes posterior risk minimization, and make full use of the experience, history information...

Construction of Collaborative Learning Environment Supported by Cloud-computing

Linna Huang, Chunli Liu
In the field of education, cloud computing, as a basic environment and platform for the future network learning, will bring positive effect on construction of the learners' personal learning environment, on construction of school resources, on development of the educational information system. Based...

The Research and Implementation of a Personalized Intelligent Tutoring System

Saidong Lv, Guohua Tang, Yaowen Xia, Yu Sun
Personalized intelligent tutoring system is an effective approach to achieve the personalized teaching. In this paper, it discusses the connotation and learning styles of personalized intelligent tutoring system. After research the knowledge model and the student model. Finally, it achieves a personalized...

A proactive system reliability analysis framework of electric vehicles

Xiaopin Zhong, Wenwen Zeng, Li Qiu
System reliability analysis (SRA) is a core support technique of many applications in the entire product lifecycle of electric vehicle (EV). However, the large-scale industrialization needs an accurate SRA due to the features of complexity, coupling and unknown noise of an EV. Besides component failure,...

Just-in-time Kernel Classifier for Online Process Diagnosis

Yi Liu, Wenlu Chen
A novel just-in-time kernel modeling method is proposed to online fault detection and diagnosis for chemical processes. The model parameters can be suitably selected using a fast cross-validation strategy. For a query sample, an online kernel classifier is constructed adaptively in a just-in-time manner...

The network data storage model based on the HTML

Lei Li, Jianping Zhou, Runhua Wang, Yi Tang
in this paper, the mass oriented HTML data refers to those large enough for HTML data, that can no longer use traditional methods of treatment. In the past, has been the Web search engine creators have to face this problem be the first to bear the brunt. Today, various social networks, mobile applications...

Research and Design of the DSRC device Measuring Instrument

Xinyou Li, Zebin Xu, Jinxu Guo
Along with an increasingly wide utilization in the fields of ETC application, it becomes more and more important to measuring quickly and accurately on the key equipment of ETC system, such as OBU and RSU . This article is based on the measuring requirement of ETC system and propose a new design proposal...

Feasibility Study of Application of PRT at a Tourism Island

Mingming Dong, Pengjun Zheng
This paper deals with public transportation in tourism areas. A survey was carried out in Putuoshan, a famous scenic area in Zhejiang Province. By carefully analyzing the current transportation situations using the data collected, a new public transport---PRT, was proposed and feasibility of application...

Design and Application of Large Torque Electrical Load Simulator for Positive and Reverse Operation

Zhiqiang Wei, Guanghua Zong, Guochen Niu, Xiaolei Zhang
In order to meet the testing requirement of positive and reverse operation large torque load for new rudder, an electrical load simulator is designed. The realization principle of system is given according to the system index, and the stability and so on. The system mathematical model is established...

A Parallel Shuffled Frog Leaping Algorithm Based on Stem Regions Combinatorial Optimization for RNA Secondary Structure Prediction

Chunlei Liu, Zhenzhou Ji, Yingsen Hong
RNA Secondary Structure Prediction is an important part of the biological computing. RNA secondary structure prediction algorithms tend to have higher time and space complexity. Some swarm intelligence algorithms can also be applied to RNA secondary structure prediction on the basis of stem regions combinatorial...

A Parallel AC Algorithm Based on SPMD for Intrusion Detection System

Xiong Su, Zhenzhou Ji, Xiaoyang Lian
AC algorithm, as a multi-pattern matching algorithm, plays an important role in the intrusion detection system. The efficiency of the pattern matching algorithm directly affects the overall efficiency of the intrusion detection system. But the number of the growing intrusion features and demanding for...

MIMO-OFDM NLOS Identification Algorithm Based on Hypothesis Test

Weibo Zhao, You Zhou, Hanying Hu
A NLOS identification algorithm based on rician K-factor hypothesis test was proposed to mitigate position location bias caused by NLOS propagation in MIMO-OFDM system. A multi-antenna rician K-factor estimation method was derived from the correlation difference of deterministic and diffuse component...

Sensor Fusion in Analogue Circuit Fault Diagnosis Using Transferable Belief Model

Youhui Chen, Dong Cheng, Yimin Yang, Zan Xiao
In fault diagnosis of circuit fault diagnosis system using multi-sensor data fusion may not give reliable fault diagnosis result in cases when processing on inconsistent data carry inconsistent. In order to deal with such problems, This paper has developed an analog-circuit fault diagnostic system based...

Quaternion model of video quality assessment based on structural similarity and inter-frame-different

Gang LI, Ye-Ming He, Xiao-Bo XU, Jun-Li LI
Recently, video quality evaluation method based on structure similarity (SSIM) has been widespread concerned. Compares with other traditional methods, it has a better performance and is simple to calculate. In this paper, we follow a new simple calculate metrics method in quaternion model, by introducing...

An Energy Balancing Approach for MANETs Based on Non-cooperative Game

Xin LI, Huyin Zhang, Di Wu, Jing Wang
In a mobile Ad Hoc network, the energy imbalance of mobile nodes may lead to energy depletion of some nodes, network partitioning and degradation of network lifespan. Therefore, we propose an energy balancing approach called Energy Balancing Approach Based on Non-cooperative Game (EBNG) which can be...

A New ABS Control Strategy Designed for Electric Vehicle Independently Driven by Four Wheel Motors

Yu Yang, Shiyou Yang, Lijie Yang, Yang Liu
In this paper, first, a hypothesis that ABS(Anti-Brake System) regulation of EV(Electric Vehicle) could be realized only by wheel motor was put up, then based on the logic threshold method, an ABS control strategy was designed to test this hypothesis. Furthermore, the four wheel motors directly drive...

L1-norm-based (2D)2PCA

Fujin Zhong
Traditional bidirectional two-dimension (2D) principal component analysis ((2D)2PCA-L2) is sensitive to outliers because its objective function is the least squares criterion based on L2-norm. This paper proposes a simple but effective L1-norm-based bidirectional 2D principal component analysis ((2D)2PCA-L1),...