The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated as a promising technique to strengthen hardware...
At present, the high-voltage back-up protection system is facing the problems of setting difficulty and the complexity of protection coordination causing too long delay. As for the primary system device-dependent configuration principle, it aggravates the complicacy of the secondary circuit which does not have the interchangeability and interoperability, reducing the reliability of the relay protection...
Coded Aperture Imaging (CAI) plays a high performance in remote radiation measurement, an imaging method using high-energy radiation with a spectrum raging from × ray to γ ray has found many applications, including high-energy astronomy and environment monitoring. The kernel of CAI is the coded mask (encoding array) with the relevant decoding array which are usually designed jointly to reconstruct...
In this paper, an optimal selection method of the test points in the field of test-ability design is provided. Based on bacterial foraging algorithm and improved particle swarm optimization algorithm. This proposed method, which is named SC_BFO (Swarm Cooperation Bacteria Foraging Optimization), is applied in optimization selection of test points. Firstly, in order to ensure the availability of the...
There is an increasing trend in using exoskeleton to walk or carry payload. In the process of human-exoskeleton interaction, since the user's intention is required accurately, an important problem is human-robot collaborative control. A precise position control strategy will significantly enhance collaboration between the exoskeleton and the user. This paper proposes a novel method combining sliding...
The paper investigates exponential stabilization problem of systems with time-varying delay via periodically intermittent memory state-feedback control. By constructing a new Lyapunov-Krasovskii functional and employing the free-matrix-based integral inequality, less conservative delay-derivation-dependent conditions are derived in terms of linear matrix inequalities than the existing ones. Particularly,...
This paper investigates the problem of the delay-dependent stability of neutral systems with mixed-delay and time-varying structured uncertainties. Different from the existing techniques, some less conservative criteria are presented by combining the free-weighting matrix technique and Wirtinger-based integral inequality technique. Numerical examples illustrate the improvement of this approach over...
The PEM (Proton Exchange Membrane) fuel cell is a multi-layers structure which is constructed by different components in contact. In this work, we propose a 3D parametric numerical modeling which permits to investigate the mechanical effect of contact behavior concerned with the performance of a PEM fuel cell. Numerical results can help to increase the knowledge of fuel cell's performance and to determine...
This paper presents a new scheme for distance local backup protection. In this scheme, two main points are included: The first is the distance component that could reliably detect all the faults occurring in protection area; the second is the pilot comparison strategy which is based on the results of distance components. The former employs the setting principle that could meet the requirement of sensitivity...
This paper presents a parameters-setting method for the synchronization of pumped-storage units under the pumping condition. The synchronizing process of the units is analyzed and the synchronizing parameters-setting principle of generating units is referred. Finally, the method is educed through mathematical formula derivation. Under the pumping condition, the setting value of the closing pulse leading...
This paper describes the instrumentation of an integrated remote radiation imager used in environmental measurement. The system consists of gamma ray detector, coded aperture mask, video camera, FPGA based digital electronics, embedded control system and screen. The detector is based on a 5×5 SiPM array coupled with 11×11 YSO scintillator array with the pitch size of 1.8mm. The modified uniformly...
This paper presents a multimodal framework that considers the spatio-temporal-spectral characteristics of biophysics provided by electrocorticographic (ECoG) and magnetoencephalography (MEG)/electroencephalography (EEG). In this framework, three strategies are proposed to integrate biological characteristics into MEG/EEG source imaging, the coefficient constraint (CoCo) gives a conservative estimate;...
With the continuing growth of cloud computing services, power consumption has become one of the most challenging issues in data center environments. With the support of today's virtualization technology, the efficiency and flexibility of data center management can be greatly enhanced, creating great energy saving opportunities. However, effective energy aware design is a non-trivial task, considering...
For the status that researches on customers' utility merely take up a small proportion in the studies on the cloud resource allocation, this paper proposes a cloud allocation model borrowing the idea of Network Utility Maximization(NUM)model, which maximizes the customers' utility. The model can be simplified to the Lagrangian dual function by the Lagrange function. Finally, a fuzzy subgradient algorithm...
A new polygon Positron Emission Mammography imaging system called PEMi with the ability to detect millimeter-sized lesions has been developed in 2009 by Institute of High Energy Physics (IHEP), Chinese Academy of Sciences. The system is constructed in a polygon structure with a design of LYSO crystal arrays mounted on position sensitive photomultiplier (PSPMT). The diameter of the detector ring is...
In this paper, a new suboptimal tone reservation (TR) algorithm with fixed phase rotation method based on Constant Amplitude Zero Auto-Correlation (CAZAC) sequence is proposed to reduce peak-to-average power ratio (PAPR) in multicarrier code division multiple access (MC-CDMA) systems. To decrease tone searching complexity of TR method, CAZAC sequences is utilized as initial tone candidates. To reduce...
To take better advantage of cloud storage, it is necessary to migrate traditional application to the cloud. In existing cloud storage platforms, files are divided into chunks and redundantly stored, but in such circumstances, random file write may lead to much delay. It is quite common to access file randomly in traditional applications, therefore the performance of traditional application will be...
Numerical modeling of high temperature pressure pipes including delaminations were constructed using ANSYS, then heat flux and convection are loaded on the outside surface. The influence of pulse excitation parameters, depth of defects, thickness of defects, length of defects on maximum thermal contrast and time for maximum thermal contrast are analysised. Length of defects are measured by using the...
Traditional city planning and management information systems are for specific internal users, it is difficult to realize data information sharing because of the lack of mutual contact and communication among the departments and trade, which result in the data repeat construction and serious waste of the resources. In order to solve the above problems and realize the information sharing and mutual...
Internet of things (IOT), as a third high tide of information industry, the safety of it has arose wide attention. To improve research and application of safe internet of things, this paper deeply researched the process of IOT's development, key technique, and frame. Based on all these above this paper analyzed safety threatens and primary prevent measure. At last, the impact of IOT to safety grade...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.