The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, 802.11ah with restricted access window for collision attenuation has been proposed for Internet of Things (IoT) applications. Random grouping of nodes in different access window is utilized to reduce the hidden node collision probability. However, when the coverage area of the sink node is large, the occurrence probability of hidden node problem is still high and severely impacts the system...
Inter-turn short circuit (ITSC) fault is one of the critical electrical faults in induction motors that affects the reliability of many industrial applications. Although the use of data-driven fault detection techniques have gained much interest, the main deterrent in using these approaches in detecting ITSC faults is in the generalization and robustness of the diagnosis. In this paper, a data-driven...
In self-managing software teams, developers with complementary skills collaborate with each other to improve productivity and increase innovation. Due to nature of innovation, managers in these teams will acquire only summarized information from developers to avoid micromanagement. They will not plan fine-grained activities but leave responsibility and autonomy to self-managing developers. Developers...
The groundwater sampling and nitrate nitrogen testing were carried out for 13 times from 2005 to 2011 in order to investigate the nitrate nitrogen dynamic change of groundwater in the intensive agricultural area of Daxing district and explore its control countermeasures. The results indicated that the mean value of nitrate nitrogen in groundwater of this area was 1.58 mg/L, which met the criterion...
Valve base controller (VBC) is the core part of control system for Modular Multilevel Converter (MMC) of HVDC Flexible, comprising man-machine interface, current control unit, bridge-arm control unit, valve monitoring unit, etc. Multiple communication methods such as CAN bus, high speed fiber optic are introduced in the system to realize massive data transfer as well as high speed valve monitoring...
Based on improved Elman neural network, establish soft sensor model for the station boiler pollution monitoring, which provides a theoretical basis for boiler soot blowing optimization strategy. Intelligent soot-blowing programmable control system combines the traditional blowing control with the soft sensor model, which is constructed by a modular approach, set online fouling monitor, data analysis,...
By simplifying and limiting current circuit model of metro power supply, this paper firstly showed stray current production and its damage, then analyzed bilateral power supply system using resistor network theory, and constructed stray current analytical model of bilateral power supply, computer simulation in different conditions of stray current distribution was carried out, the results show that...
Sensor nodes are likely to be deployed in hostile locations which are accessible to an attacker. Thus these nodes are prone to be captured and compromised by adversities. An attacker can use these compromised nodes to launch various attacks, a serious one of which is false data injection. These compromised nodes inject large of bogus packets to flood the network, which can lead to exhaust the network...
In this paper, we propose an intrusion detection framework for smartphone systems. We formulate the intrusion detection problem into a two-player, non-cooperative, complete-information, constant-sum game. The attacker and the security server are the players of the game. The security server wants to maximize the value of the system but the attacker wants to minimize it. We present the Nash equilibrium...
Emergency response is a time critical work that needs rapid response time and system reliability. With the development of the location based services, it has been utilized in emergency response system and improved its every activity. We introduced the position of call incoming improved the process of call taking, the location of incident make the dispatch decision progress, and the location make it...
In this paper, a modern logistics vehicles and cargo tracking system is designed in view of the current demand. Making full use of embedded systems technology and mobile communications technology, this system is designed to monitor the situation of cargo and vehicles in real-time and to reply the query of the owner of cargo by SMS in active or passive mode. Practice shows that this system can efficiently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.