Signal analysis of multi-channel data form a specific area of general digital signal processing methods. The paper is devoted to application of these methods for electroencephalogram (EEG) signal processing including ...
详细信息
Dataflow architecture has native advantage in achieving high instruction parallelism and power efficiency for today's emerging applications such as high performance computing and machining learning. In dataflow co...
详细信息
The management of I/O resources is an important part of virtualization. Although the traditional management is complex, it becomes more challenging in virtualization. There has been many researches on how to improve I...
详细信息
The high parallelism feature of scientific applications makes SIMD very suitable for streaming dataflow architectures. However, the splitting of SIMD memory requests increases the messages in on-chip networks and decr...
详细信息
Runtime verification is a dynamic verification technique widely used in practice. In this paper we revisit the runtime verification technique with formula progression, which verifies the execution trace step by step b...
This paper describes the approach to collision avoidance problem for 3-DOF anthropomorphic robot manipulators. The novelty of the approach is the decomposition of 3D space to two 2D spaces. Resulting is the computatio...
详细信息
This paper describes the approach to collision avoidance problem for 3-DOF anthropomorphic robot manipulators. The novelty of the approach is the decomposition of 3D space to two 2D spaces. Resulting is the computationally efficient algorithm, suitable for implementation in the real-time systems. Simulation of the anthropomorphic manipulator operating in three dimensional space with obstacles is also presented.
Object-level saliency detection is an important branch of visual saliency. In this paper, we propose a novel method which can conduct object-level saliency detection in both images and videos in a unified way. We empl...
详细信息
The rapid development of digital technology has brought about the challenge of ensuring information security. Cryptography and steganography are among the various techniques available to address this challenge. These ...
详细信息
Device-free human presence (DFHP) detection is a novel technique, mainly applicable to wireless sensor networks in which a human does not need to carry a wireless transceiver to be detected. Irregularities in the radi...
详细信息
Fish morphology is an essential basis for fishery management, as it can reflect the growth status of fishes. Noncontact 3D reconstruction of underwater fish is a new way to obtain fish morphology. While it is difficul...
详细信息
暂无评论