Events provide a fundamental abstraction for representing time-evolving information. Complex event recognition focuses on tracking and analysing streams of events, in order to detect patterns of special significance. ...
详细信息
Events provide a fundamental abstraction for representing time-evolving information. Complex event recognition focuses on tracking and analysing streams of events, in order to detect patterns of special significance. The event streams may originate from various types of sensor, such as cameras and GPS sensors. Furthermore, the stream velocity and volume pose significant challenges to event processing systems. We propose dRTEC, an event recognition system that employs the Event Calculus formalism and operates in multiple processing threads. We evaluate dRTEC using two real-world applications and show that it is capable of real-time and scalable event recognition.
In this paper,we propose a doping approach to lower the error floor of Low-Density Parity-Check(LDPC)*** doping component is a short block code in which the information bits are selected from the coded bits of the dom...
详细信息
In this paper,we propose a doping approach to lower the error floor of Low-Density Parity-Check(LDPC)*** doping component is a short block code in which the information bits are selected from the coded bits of the dominant trapping sets of the LDPC ***,an algorithm for selecting the information bits of the short code is proposed,and a specific two-stage decoding algorithm is *** results demonstrate that the proposed doped LDPC code achieves up to 2.0 dB gain compared with the original LDPC code at a frame error rate of 10^(-6)Furthermore,the proposed design can lower the error floor of original LDPC Codes.
Fuzzy Mean Linear Aliasing Window Kernel (FMLAWK) filter method proposed to reducing the high-density impulse noise interference and generating the smooth image performance. FMLAWK filter is a spatial filter, which co...
详细信息
The diversity of applications that current and emerging Wireless Sensor Networks (WSNs) are called to support imposes different requirements on the underlying network with respect to delay and loss, while at the same ...
详细信息
Mobile Id approach provides a contactless and secure identification process. Standardization towards a common scheme is important to ensure wide-spread adoption through cross-country and cross-region interoperability....
详细信息
Security datasets often exhibit significant imbalances that can introduce bias during model training, diminish sensitivity to actual attacks, and lead to a substantial number of false negatives, potentially overlookin...
详细信息
Preparation of oil palm cultivation land is the initial physical activity of the planting area. Prior to oil palm cultivation it is advisable to study potential land suitability, to assess the land as appropriate or n...
详细信息
This study scrutinizes five years of Sarajevo's Air Quality Index (AQI) data using diverse machine learning models - Fourier autoregressive integrated moving average (Fourier ARIMA), Prophet, and Long short-term m...
详细信息
Inductive power transfer (IPT) systems are capable to transfer an electrical power from a power source (transmitter) into electronic devices (receiver) via an air gap. Since the power transmission is based on the indu...
详细信息
For modern computer systems, both performance and power consumption must be considered to reduce the maintenance cost for quality of service guarantees. This paper proposes efficient and effective power management sch...
详细信息
暂无评论