The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to achieve better network communication between embedded devices, we complete a network driver program based on embedded processor platform. In the definition of internal data type, We choose little-endian due to our processor and use LwIP build-in error code in arch.h file. Moreover, LwIP provides users with a convenient configuration at the beginning of its design. Additionally, in order...
With the fast development of embedded Web, the needs of communication between different embedded devices through Internet become increasingly intense. Taking application requirements into account, we utilized a customized embedded 32-bit processsor as the hardware platform which contains a MAC module. On this basis. We design the protocol layer network interface and a network driver based on descriptor-based...
This paper studies the case of the methane flare of the Okhotsk Sea slope, It is made a large scale acoustic sweep focusing on the east slope of Sakhalin Island based self-developed software SONIC. Detecting and judging the location of undersea methane gas leaks (GF), reisen and seabed, surveying morphological changes of methane release point with collecting the echo signal and visualization fuctions...
Rating aggregation is critical to the quality control of recommendation systems and its effectiveness is a deep concern of all users. However, there are some problems in existing recommendation systems. For example, some of the raters from certain source are much more stringent than others, leading the phenomena that some entities with better quality are rejected. In this paper, we propose a novel...
Multi-label classification in social network environments is becoming a key area of data mining research in recent years. Given some nodes' labels (i.e., the sources), the task is to infer some other nodes' labels (i.e., the targets) in the same network. Relational classification methods, which leverage the correlation of labels between linked instances, have been shown to outperform traditional classifiers...
Hardware security to ensure trust in IC has emerged as important research topic in recent years, several Trojan detection approaches have been developed to prevent the damages caused by Trojans, making Trojan insertion more and more difficult. This paper design Trojans use a novel technique, which can avoid activate Hardware Trojan in testing time. The simulation results on s38584 benchmark demonstrate...
Relay featured cognitive radio network scenario is considered in the absence of direct link between secondary user (SU) and secondary base station (S-BS). Being a realistic deployment use case scenario, relay node can be subjected to pollution attacks. Forward error correction (FEC) driven network coding (NC) method is employed as a defense mechanism in this paper. By using the proposed methods, pollution...
We investigate the coexistence issue between 802.22 and 802.11af networks over the TV White Space (TVWS). The coexistence scheme is vulnerable to selfish attacks. In this paper, the scenario of selfish attack wherein 802.22 subscribers intend to occupy the allocated spectrum selfishly is studied. Consequently, 802.11af users have less opportunity to access the spectrum, which leads to low overall...
With the development of Social Networking Services, users can publish and receive information expediently. With the scale of information to be processed is becoming bigger, the information acquisition rules adopted by traditional search engine met with many difficulties. To solve the problem, we must develop new UGC collection strategy. We think there are three main factors: user, UGC and the interactive...
A data aid carrier synchronization scheme for high rate burst mode communication systems is present in this paper. Computer simulation results show that the scheme just spends 10 symbols for initial phase acquisition when SNR≥8dB. In addition, by −π/4 phase rotator, the normal QPSK phase tracking loop is suitable for π/4-DQPSK. The proposed carrier synchronization scheme is suitable for digital implementation...
Three-level technology indeed can solve the problem of electric power transformation which is in the high voltage and heavy load situation. It can effectively reduce harmonic interference. So a new topology which is based on the forward converter and full bridge converter is proposed. The topology can achieve three levels or more. The new topology is called Forward-Mode Bridge-Form Three-Level AC/AC...
This paper proposes a new isolated Three-Level(TL) DC-DC converter. The isolated Sepic TL DC-DC converter is based on the conventional Sepic converter. In this new converter the voltage stress of the switch is reduced to a half and the filter inductor is also significantly reduced. Its operation principle and control strategies of the converter are investigated. By modeling and simulation, the performances...
This paper presents a modular AC-AC converter with high frequency AC link. It is constructed from connecting multiple current mode AC-AC converters with high frequency AC link in series at the input sides and parallel at the output sides (ISOP). This topology allows the use of low voltage power switch. Control strategy and operation principle of the converter are investigated. Four operation modes...
In this paper, a new algorithm for signal detection, namely partial grouping maximization likelihood algorithm, is proposed to achieve satisfactory performance with moderate computational complexity. The new algorithm is bawd on maximization likelihood principle and the idea of grouping, and the performance assessment shows that it is superior to the linear detector and ordinary grouping algorithm,...
Through the analysis of Chinapsilas modern enterprise information problems and taking one enterprise as the example, the article introduced a business information technology workshop management controller functions on the basis of the analysis. The author designed and developed the workshop management controller, realized some kinds of features, such as production plan, artwork, working hours, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.