data processing technology is a key technology in ZIGBEE wireless sensor network system. Based on the current fact that ZIGBEE wireless sensor network is suffering from data excess and information shortage, this paper...
详细信息
ISBN:
(纸本)9781424455379
data processing technology is a key technology in ZIGBEE wireless sensor network system. Based on the current fact that ZIGBEE wireless sensor network is suffering from data excess and information shortage, this paper introduces the complex event processing technology, takes the angle from the nature of information and event processing, and researches on the data analysis method of ZIGBEE wireless sensor network system. It analyzes the hierarchical characteristic inherited in ZIGBEE wireless sensor network, proposes an event hierarchical processing model for information therein, then analyzes a large amount of data on different layers by complex event processing technology such as hierarchical viewing, event filter, event mapping, event relativity, and gets optimized analysis result. The application test of goods information management system in supermarket ZIGBEE wireless sensor network demonstrates that the proposed hierarchical information processing model is reasonable and data analysis method is effective, hence the future application can be well expected.
Image scrambling is one important method in image encryption field. By using some characteristics of chaos system, e.g. the sensitivity to initial conditions, the sensitivity to parameter and the pseudo-randomicity, t...
详细信息
ISBN:
(纸本)9781424455379
Image scrambling is one important method in image encryption field. By using some characteristics of chaos system, e.g. the sensitivity to initial conditions, the sensitivity to parameter and the pseudo-randomicity, this paper presents one image scrambling algorithm based on chaotic mapping. In order to achieve an effect of image scrambling, each pair of pixel points is exchanged for all the possible pair combinations. Compared to other image encryption algorithms which are based on chaotic mapping, this algorithm has some advantages, e.g. simplicity in design and high efficiency. In this paper, the methodology for evaluating image scrambling degree which is based on the position correlation is adopted to evaluate the encryption effect, which is consistent with the results of subjective evaluation.
based on the research of the existing Web information extraction techniques, this paper proposes a XML-based Web information extraction system design. This design can extract the interested information points from HTM...
详细信息
Distributed Video Coding (DVC) is a new compression paradigm in video coding, which is receiving lots of interests nowadays. Side information creation is a key function in the DVC decoder, and plays a key-role in dete...
详细信息
ISBN:
(纸本)9781424455379
Distributed Video Coding (DVC) is a new compression paradigm in video coding, which is receiving lots of interests nowadays. Side information creation is a key function in the DVC decoder, and plays a key-role in determining the performance of the codec. This paper proposes a novel framework to create side information at the block level with two modes: Wyner-Ziv mode and Intra/ WZ mode, corresponding to Motion Compensated Frame Interpolation and motion compensated quality enhancement technique, respectively. While in the second mode, a low quality Intra block sent by the encoder is used to generate side information by doing motion estimation with the help of the reference frames. Experimental results demonstrate that the proposed scheme can achieve up to 2.1dB improvement in rate-distortion performance when compared to state-of-the-art DVC codec, especially for high motion video sequences and long group of pictures sizes.
Expression variation is one of the most important factors that considerably influence the performance of face recognition. In order to enhance robustness to expression variations, a procedure of 3D face recognition ba...
详细信息
ISBN:
(纸本)9781424455379
Expression variation is one of the most important factors that considerably influence the performance of face recognition. In order to enhance robustness to expression variations, a procedure of 3D face recognition based on depth image and SURF Operator is proposed. We use Fisher Linear Discriminant (FLD) method on the depth image to perform coarse recognition first to catch the highly ranked 3D faces. This stage can distinguish those faces that differ significantly and it is robust to expression variations to some extent. On the basis of this step, we extract the SURF features of the 2D gray images, that are corresponding only to those highly ranked 3D faces, to carry out the refined recognition. The experiments indicated a high recognition rate by our procedure even when the face expressions of training samples differ greatly from testing samples.
A 3D graphical representation of DNA sequence has been derived from chaos game representation of DNA sequence. The 3D graphical representation also avoids loss of information. According to classifications of four base...
详细信息
ISBN:
(纸本)9781424455379
A 3D graphical representation of DNA sequence has been derived from chaos game representation of DNA sequence. The 3D graphical representation also avoids loss of information. According to classifications of four bases of DNA sequence we obtain three characteristic curves. The geometrical centers and fluctuation of three curves have been grouped into a twelve-component vector to represent the DNA sequence. The Euclidean distances among introduced vectors are applied to characterize and compare the coding sequences of the first exon of beta-globin gene of 11 different species.
An efficient and stable cluster system would be proposed in this paper for the load balancing of servers. It bases on the improved load balancing algorithm. The cluster system uses load parameter information including...
详细信息
ISBN:
(纸本)9781424455379
An efficient and stable cluster system would be proposed in this paper for the load balancing of servers. It bases on the improved load balancing algorithm. The cluster system uses load parameter information including CPU utilization, memory utilization, I/O utilization and network traffic to decide the load of each child node. And it adds a redundant node to collect the load balancing parameters of every child node. The central node can obtain the child node load by exchanging the load balancing information with the redundant node, and then decide which node would respond to a new user request. The improved load balancing algorithm can satisfactorily improve the stability and efficiency of the cluster system.
Blasting occupy an important position in exploitation of mineral resources. With the development of mining and Geographical information System (GIS) in mining industry, Digital Mining (DM) and Digital Blasting are bec...
详细信息
ISBN:
(纸本)9781424455379
Blasting occupy an important position in exploitation of mineral resources. With the development of mining and Geographical information System (GIS) in mining industry, Digital Mining (DM) and Digital Blasting are becoming the research focus and they will be an inevitable trend in the future. In order to evaluate the incidental influence caused by blasting and accomplish the simulation, a blasting predicting and evaluating model supported by digital elevation model and remote sensing image is proposed. This model using three-dimensional display and spatial analysis ability of GIS accomplishes several functions, such as the simulation of blast hole, analysis and evaluation of blasting vibration, air-overpressure and optimal transportation route calculation. The system named 3D-Blasting information and Judgment System (3D-BIJS) can be used to predict mine after blast and help the decision-maker to guide the practical production.
This paper proposes a method which combines Sobel edge detection operator and soft-threshold wavelet de-noising to do edge detection on images which include White Gaussian noises. In recent years, a lot of edge detect...
详细信息
ISBN:
(纸本)9781424455379
This paper proposes a method which combines Sobel edge detection operator and soft-threshold wavelet de-noising to do edge detection on images which include White Gaussian noises. In recent years, a lot of edge detection methods are proposed. The commonly used methods which combine mean de-noising and Sobel operator or median filtering and Sobel operator can not remove salt and pepper noise very well. In this paper, we firstly use soft-threshold wavelet to remove noise, then use Sobel edge detection operator to do edge detection on the image. This method is mainly used on the images which includes White Gaussian noises. Through the pictures obtained by the experiment, we can see very clearly that, compared to the traditional edge detection methods, the method proposed in this paper has a more obvious effect on edge detection.
作者:
Ma, Yue
School of Information and Electronics Beijing China
A low-power CMOS bandgap voltage reference is designed. This bandgap voltage reference adopted advanced startup circuit and sub-threshold technology. The circuit is simulated under SMIC 0.18μm CMOS process and 1.8V s...
详细信息
暂无评论