The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a new information display system that can prevent the on-screen contents from being taken by cameras or camcorders without sacrificing visual qualities. The system is designed based on the idea of temporal psychovisual modulation (TPVM) with guidance from the concept of ‘window of visibility (WoV)’. TPVM utilizes the redundancy (in terms of spatiotemporal resolutions and etc...
A two-dimensional (2D) physics-based compact subthreshold swing model is proposed for the ultra-thin body ultra-thin box SOI MOSFETs with a vertical Gaussian doping profile. Based on the channel potential which is influenced by the non-uniform doping profile, the subthreshold swing model is derived by using the concept of effective conduction path effect (ECPE). The outputs of the model show good...
The impact of gate voltage differences on the performance of the novel n-type silicon homojunction SOI-Tunnel FET is studied. Based on numerical simulation results using Synopsys Technology Computer-Aided Design (TCAD), the higher on-current and the ultra-low off-current are observed as compared to that of a conventional SOI-Tunnel FET. The analysis of energy band corroborates that gate voltage differences...
Wireless mesh networks begin to be used as an infrastructure of cyber-physical systems. A critical issue in developing wireless cyber physical systems (WCPSs) is the limited amount of energy available in the nodes. Energy consumption analysis can help designer to conduct a power-aware design process. In this paper, we propose a model based energy consumption analysis framework at architecture level...
The paper concerns improvement of the acoustic emission (AE) methods applied in diagnosing of insulations systems of electric power transformer. During detection of AE signals emitted by partial discharges (PD) occurring in insulation systems of power transformer, there exist different forms of interference sources, which may have a direct impact on the correct evaluation of the measured signals obtained...
In this paper we proposed the concept of optimistic rough multi-granularity soft set and pessimistic rough multi-granularity soft set. Basic properties of rough multi-granularity soft sets are presented. Furthermore, we compared the difference between rough multi-granularity soft sets and rough soft sets showed by some illustrative examples. Finally, an algorithm for decision making problem is proposed...
In this paper, a novel adaptive leakage suppression method (LSM) for ultra-high frequency radio frequency identification reader is proposed. The leaking power is reflected instead of absorbed to avoid saturating baseband circuits. The principle and application of this LSM based on selected power reflection actively controlled by digital baseband are discussed. The RF front-end is fabricated in a 0...
Group key is used to encrypt group data in group communication. Multicast key distribution scheme updates and distributes group keys safely when a member joins or leaves the group. However it has problems when arbitrary group members want to build a dynamic conference, because traditional distribution scheme uses group controller to manage the work. In fact, a n-member group will have 2n − n − 1 possible...
The MapReduce framework and its open source implementation Hadoop have established themselves as one of the most polular large data sets analyzers. They are widely used by many cloud service providers such as Amazon EC2 Cloud. However, while latency-sensitive applications becoming more and more important, Hadoop system shows its shortcoming in ensuring jobs completed on time. And currently, user has...
The safety prediction of rail transit system is a fundamental problem in rail transit modeling and management. In this paper, we propose a safety prediction model based on deep learning for rail transit safety, which has been implemented as a deep belief network (DBN). It can learn effective features for rail transit prediction in an unsupervised fashion, which has been examined and found to be effective...
We study the problem of low-rank and sparse decomposition from possibly noisy observations. We propose a novel objective function with nuclear norm on the low-rank term and ℓ0-‘norm’ on the sparse term, as well as ℓ1-norm on the additive noise term. When there is no dense inlier noise, the proposed method shares the same theoretical guarantee as the Principal Component Pursuit (PCP), i.e., it can...
Field-oriented control (FOC) is a preferred control method for induction motors. The purpose of FOC is to guarantee perfect dynamic and steady performance of induction motors, but there is cross-coupling between dq current components, which impairs the characteristics of response. Therefore, a decoupled current control strategy using internal model based on active disturbance rejection control (ADRC)...
With the augmented penetration of renewable energy, such as solar power and wind power, the electricity grids could be destabilizing due to the intermittent nature of renewable sources. In order to ensure power system reliability, robust optimization method is introduced to the energy schedule of micro grid system. This work presented a two-stage robust optimization method to calculate a numerical...
Based on 3D Fourier ptychography imaging technique, adaptive selection of illumination utilizing the relationship between Fourier spectrum and illumination angle is proposed. The method reduces almost 50% computational work and accelerates the imaging reconstruction without loss of image quality.
"Internet +" era for college students to a broader entrepreneurial market, in the context of the O2O model has a strong adaptability, can effectively help for college students. Analysis of operation status indicators of this university campus business platform based on O2O mode, from platform construction, operation management, profit model, marketing strategy, payment and logistics has...
Alloy is a simple and effective language which has been widely used to model the essential structures and constraints of software systems. In this paper, we present a Spatial Alloy for modelling the properties of spatial relationships between different entities of software systems. This is achieved through Alloy and the methodology of spatial logic. The Spatial Alloy is proposed by three steps. First,...
RSA is one of the most widely used public key cryptographic algorithms in embedded cryptographic devices. However, the side-channel attacks especially simple side-channel analysis (SPA) can obtain information about the cryptosystem by measuring power consumption and processing time. To resist this attack there appear a number of countermeasures such as classical exponent randomization and messages...
Blanking nonlinearity has been commonly employed at the receiver in the OFDM-based power-line communications (PLC) to reduce the impact of the impulsive noise. However, as OFDM suffers from high peak-to-average power ratio (PAPR), the blanker may falsely treat the high amplitude signal as impulsive noise. Therefore, PAPR reduction methods have been employed to improve the performance of the blanker...
In order to improve the searching speed and the quality of global optimal solution, we propose an improved algorithm based on Artificial Bee Colony(ABC) algorithm, which can search the space by stochastic optimization and dynamic regulation (named SRABC). Firstly, the improved algorithm can update the next location of ABC algorithm, which can perfect the correlation for the bee colony. Secondly, we...
Security of embedded devices is a constant challenge due to the development of new and powerful side-channel attack techniques. This paper proposed a new profiling method to attack ECC implementation with combing method, which utilizes the leakage of modular multiplication during adding operations on points. We analyze the decryption of SM2 in a smart IC card with Riscure's platform, and present how...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.