One of the most difficult problems in Augmented Reality is how to ensure that the luminance of virtual objects embedded in a real scene is consistent with the real luminance. This paper shows an approach to identifyin...
详细信息
Cathodic protection is one of the commonly used techniques to control the corrosion of a metal surface by making the protected metal as a cathode of an electromechanical cell. The main issue of this paper is studying ...
详细信息
Cathodic protection is one of the commonly used techniques to control the corrosion of a metal surface by making the protected metal as a cathode of an electromechanical cell. The main issue of this paper is studying the cathodic protection system of storage tanks to develop a software program, which can be used in designing such a system. This developed software program won’t depend only on the criterion of the total required weight of the anodes, but it will also make a check on the required current for the cathodic protection system to cover the current demand for the system. This software is a general one which can be used for any cylindrical storage tank.
Policy-based management technology is getting more and more attention. Policy specification is a difficulty in this field recently. Ponder2 system developed by Imperial College implements the policy management archite...
详细信息
Policy-based management technology is getting more and more attention. Policy specification is a difficulty in this field recently. Ponder2 system developed by Imperial College implements the policy management architecture. This paper analyzes the representation of policies in Ponder2, we propose some improvements of Ponder2 policy-specific language, and correlative examples are shown to explain the usage of the improved representation. Based on these improvements, the ability of Ponder2 Policy Language is enhanced.
With the rapid growth of wireless and mobile communication technology, P2P live streaming application is extending to mobile peer. In order to prevent Message Dropping Attacks (MDAs) in mobile P2P live streaming syste...
详细信息
One of the most famous and simplest matching methods based on photometric data is Winner Takes All. However,this approach presents the disadvantage of being non symmetrical,the solution to this problem consists on usi...
详细信息
One of the most famous and simplest matching methods based on photometric data is Winner Takes All. However,this approach presents the disadvantage of being non symmetrical,the solution to this problem consists on using a crossed matching,but all the key points don’t find necessary their corresponding key *** order to improve the matching results,a proposed solution consists on employing geometric *** this paper,we propose two alternatives of matching *** first one is based on photometric data,while the second one,uses both photometric and geometric *** results demonstrate that our proposed methods are efficient and give promising results in terms of repeatability and processing time.
In this paper, a novel control architecture and strategies, involving noninvasive brain-computer interface (BCI), are presented, and a virtual prototype of quadruped walking robot, named QWR-I, is developed for simula...
详细信息
In view of the imperfection of the Android operating system multimedia function and the complexity of streaming media system. At the same time, the development cycle is long, and efficiency is low. In order to solve t...
详细信息
Petri nets can be used to build an executable model of software system, to support the simulation of model, to ensure the accuracy and reliability of software system. This paper brings forward the transformation rules...
详细信息
Petri nets can be used to build an executable model of software system, to support the simulation of model, to ensure the accuracy and reliability of software system. This paper brings forward the transformation rules from Unified Modeling Language (UML) statechart to colored Petri nets, presents mapping of the statechart and colored Petri nets according to transformation rules, builds an automatic transform platform, implements the automatic conversion from statechart to colored Petri nets and uses Point to Point Protocol (PPP) to verify the feasibility of the transformation method.
To get salient and reliable features is of great importance to robot navigation and other computer vision applications. This paper concentrates on feature detection, saliency description and matching for visual naviga...
To get salient and reliable features is of great importance to robot navigation and other computer vision applications. This paper concentrates on feature detection, saliency description and matching for visual navigation. A corner detector based on chord-to-point distance accumulation is introduced to extract corners which represent the main structure of objects. Saliency descriptor of corner is defined according to its scale, angle, gradient, and rarity. Control points are selected according to the corners' saliency and tracked in sequential images with the method based on Fourier-Melline transform. Experiments show that the efficiency and robustness of vision navigation system are improved with the proposed method.
作者:
Luo, HongliDepartment of Electrical
Computer and Information Technology Indiana University Purdue University Fort Wayne Fort Wayne IN 46805 United States
This paper proposed a packet scheduling algorithm to improve the quality of service (QoS) of video streaming over wireless network. We apply the active queue management (AQM) techniques at the Access Category (AC) que...
详细信息
暂无评论