This paper designs a power-aware control action scheduler capable of reducing peak power consumption and measures its performance based on the actual implementation,aiming at improving operation reliability in the wir...
详细信息
This paper designs a power-aware control action scheduler capable of reducing peak power consumption and measures its performance based on the actual implementation,aiming at improving operation reliability in the wireless sensor and actuator network. Following the task model consisting of actuation time, operation length, deadline, and a consumption profile, the proposed scheme allocates fixed-size slots to each control action in two phases. Phase 1 obtains a tight bound by which more unnecessary branches will be removed in the search space traversal in phase 2. A heuristic, which allocates slots for preemptive task according to the intermediary consumption estimation, can reduce space complexity from O(M M2) to O(1), where M is the number of slots. Phase2 carries out the ordinary search space expansion, but with much tighter bound, that is, closer to the optimal *** performance measurement result shows that the proposed scheme can reduce the execution time by up to 30 % as well as the search space size by up to 28 % for the given parameter set without loss of accuracy.
In advance of RFID technology, various types of services based on mobile RFID technology have been developedHowever, there still exists limitation on RFID-based services such as transferring the simple information of ...
详细信息
In advance of RFID technology, various types of services based on mobile RFID technology have been developedHowever, there still exists limitation on RFID-based services such as transferring the simple information of exhibits at exhibition halls or managing the exhibits stored in warehousesIn order to improve the service qualities at exhibition centers, showrooms, or museums, we have developed a system, which can provide the disruptive services using mobile RFID technologyOur system accumulates the information such as how many people visit a specific exhibit, what the demographic information the visitors have, and what kinds of items the visitors see, and so on whenever visitors read a tag on an exhibit with an RFID reader connected to a mobile deviceThe accumulated information is stored in a database to provide an efficient search service and to bring a better service to the visitorsWe have developed an application program for analyzing the visitors' data retrieval pattern from the databaseUsing this program, our system can get the information about the movement paths of the visitorsAlso, by adopting data mining technology, we also propose a novel approach to enhance RFID-based services so that visitors can have a customized real-time question-answering service from assistants in a certain exhibition hall or museum whenever they are intrigued to know about exhibits.
Among existing indoor localization systems, considering the costs and accuracy, RFID has been one of the best choices for indoor positioning. However, years of research experiences found that the signal strength of RF...
详细信息
Among existing indoor localization systems, considering the costs and accuracy, RFID has been one of the best choices for indoor positioning. However, years of research experiences found that the signal strength of RFID is not sufficiently stable and sensitive to the indoor environment and furniture, which reduce positioning accuracy. Therefore, this paper proposed an indoor localization and identification system, bases on active RFID and vision tracking technologies. This system has a more flexible RFID triangular layout method and a more efficient sensing overlap analysis mechanism. By integrating the precise positioning information of video images, the proposed system not only reduces the costs, but also improves the computing efficiency and positioning accuracy.
This paper first presents the sensor data processing framework integrating a power consumption scheduler for control actions, and then analyzes the available power for background tasks which are continuously performed...
详细信息
This paper first presents the sensor data processing framework integrating a power consumption scheduler for control actions, and then analyzes the available power for background tasks which are continuously performed using the remaining power. As the scheduler is designed to reduce the peak load for the given task set, it can make flatter the consumption level of dynamic tasks activated by the event detection. The experiment result obtained from the prototype implementation reveals that the proposed scheme can improve the minimum available power by up to 17.9 %, compared with the Earliest scheduling scheme, having a smaller standard deviation over the slots included in a scheduling window. Hence, our framework can achieve cost savings as the sensor network can purchase a smaller amount of energy from a utility company and can be built with lower power transmission capability.
Retinex method mainly consists of two steps: estimation and normalization of illumination. How to extract the background illumination accurately is a key problem. The backgrounds of picture sequence in video's adj...
详细信息
Retinex method mainly consists of two steps: estimation and normalization of illumination. How to extract the background illumination accurately is a key problem. The backgrounds of picture sequence in video's adjacent frames are usually similar and closely related. More accurate illumination information can be extracted when this characteristics of video's picture sequence is considered. In the paper, we propose an improved Retinex algorithm. Filter the images using the Gauss masks of different scale and parameter for each frame image, and all these filtering results are fused together by minimum method. In the paper, the scale of Gauss filters are set as 5, 9, 13, 25, and their variance set as 0.3, 0.5, 0.7 and 1.0 respectively. 6 adjacent frame images are selected, and the uniform and optical background image for these 6 images can be extracted by maximum method. This method makes use of the similarity and relationship among the adjacent frame images in videos. Enhance the images using Retinex method with this optical background image as their uniform illumination information. Experiment shows that more accurate back grounds are acquired and more excellent enhancement performance are achieved.
Discretization of continuous attributes is one of the important steps in preprocessing of data analysis. In this paper, a new method of supervised discretization of continuous attributes based on entropy and hierarchi...
详细信息
Discretization of continuous attributes is one of the important steps in preprocessing of data analysis. In this paper, a new method of supervised discretization of continuous attributes based on entropy and hierarchical clustering guiding by level of consistency of decision table is introduced. This method makes use of the concept of the level of consistency of decision table in Rough Sets. According to the level of consistency of the produced decision table, the number of hierarchical cluster is adjusted dynamically in the first step. And then in the second step, we merge adjacent region based on entropy without damaging the level of consistency. Experiments show that this method is feasible.
This paper presents a novel classification tech- nique based on targets bistatic backscattering coefficients acquired at low frequencies. Each target class is characterized by a subspace. Air targets are then classifi...
详细信息
This paper presents a novel classification tech- nique based on targets bistatic backscattering coefficients acquired at low frequencies. Each target class is characterized by a subspace. Air targets are then classified based on geometrical classification criteria. An average recognition rate of 90% is achieved.
The performance of smart antennas relies heavily on the accurate estimation of the direction of arrival(DOA).This paper analyzed various techniques for DOA estimation and investigated their *** results showed that MUS...
详细信息
ISBN:
(纸本)9781612848334
The performance of smart antennas relies heavily on the accurate estimation of the direction of arrival(DOA).This paper analyzed various techniques for DOA estimation and investigated their *** results showed that MUSIC algorithm outperforms in terms of root mean square error(RMSE),angular resolution and the number of elements in an antenna *** analysis of these algorithms can be used to determine the direction of arrival of the signals at uniform linear array(ULA).
Lin et al. proposed a non-expansion method to improve the image quality of the recovered image in visual cryptography by taking into account the distribution of black pixels. This paper proposes a new non-expansion me...
详细信息
Lin et al. proposed a non-expansion method to improve the image quality of the recovered image in visual cryptography by taking into account the distribution of black pixels. This paper proposes a new non-expansion method, which uses low computational cost to decrypt the shadow images and achieves reversibility.
It has become increasingly clear that signalling pathways are extensively interconnected and are embedded in networks with common protein *** components do not exist in isolation but may gather together to form crosst...
详细信息
ISBN:
(纸本)9789810887186
It has become increasingly clear that signalling pathways are extensively interconnected and are embedded in networks with common protein *** components do not exist in isolation but may gather together to form crosstalk *** these crosstalk modules has emerged as a good method to understand the mechanisms underlying the propagation of transduction signals in *** this paper,we have presented an advancement of the method,which is chiefly used to integrate multiple topological and functional data to detect crosstalk modules between NF-?B and p53 signalling *** the Expectation Maximization(EM) clustering algorithm,we obtained the competitive results compared to the k-means *** EM algorithm as a soft clustering method is able to distinguish overlapping parts among clusters,and here we that it is potentially more sensible than the k-means algorithm in detecting the cross talking modules involved in the network interactions between the two systems NF-?B and *** addition,the biological analyses support our findings,and propose testable hypotheses to which the functional networks are involved in along with their associated human diseases.
暂无评论