The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wearable exoskeleton foot pressure detection system has great significance for human motion information detection and gait recognition. In this paper, the use of resistive pressure sensor to make up for the existing lower extremity exoskeleton pressure sensor input and output non-linear error, which can't accurately detect the lack of plantar pressure changes, through the theoretical calculation to...
The characteristics of aborigine's craft is an indispensable part of Taiwan's culture. It represents not only the uniqueness of Taiwan's traditional culture, but also illustrates the aesthetic meanings of each tribe with cultural traces. The traditional artistic and aesthetic connotations of the Taiwanese aborigines are distinctive. If we can understand the cultural characteristics of the aborigines...
Voronoi diagram is a very important and practical geometric construction in computation geometry. In this paper, r- limited Voronoi diagram was introduced into the spatial pattern of corporate staff' safety awareness in emergent situation to describe the dynamic changes in the scope of swarm safety perception. Then, the virtual individual potential function of safety awareness emergency was put forward...
Aggregate signcryption could verify the multiple messages via a single operation. Most of the identity-based aggregate signcryption are based on random oracle. To exploit the advantage of multilinear maps and erase the key escrow problem, a new Identity-based certificate less aggregate signcryption scheme is proposed. The new scheme is proved to be confidential and unforgeable under the assumption...
A coverage control problem for continuous-time multi-agent systems under an event-triggered control framework is considered in this paper. The discrete-time coverage control algorithms reported in [1] is first extended for the continuous-time systems. Unlike the proof technique used in [1], the convergence of the continuous algorithm is proved under a Lyapunov framework. A Lyapunov function has been...
In this paper, decentralized event-triggered controllers are designed for the rigid formation tracking problem, where the target formation is minimally and infinitesimally rigid and the desired velocity of the group is available only to a subset of the agents. Two cases are considered: the desired velocity is constant, and the desired velocity is time-varying. In the first case, an event-triggered...
In this paper, a coordinated tracking problem for coupled nonholonomic mobile robots is considered. An event-triggered control strategy is proposed to guarantee that the robots can form a prespecified geometric pattern while the centroid of the geometric pattern can track a reference signal. The stability of the system is proved with the aid of Lyapunov techniques. Finally, a simulation example is...
Thermal conductivity of rock is an important parameters controlling the transport and exchange of thermal energy. It affects the change of the temperature field within the rock. The thermal conductivity of rocks are necessary to research rock mechanics and engineering problems about the heat transfer. This paper mainly summarizes the measuring method of thermal conductivity and influence factors of...
This paper presents an intelligent ridesharing system for taxi to share cost and journey among the passengers. The objective of the system is to provide taxi-sharing service for passengers who want to save the payment cost. It is done by recommending taxis drivers for picking up passengers at a higher revenue. The passengers are able to find taxis easily and quickly as well. By exploiting the time-dependent...
In this paper, a cluster synchronization problem is considered for a complex network subject to discontinuous state updates. A centralized event-triggered control algorithm is first designed. It is shown that an upper bound on the state updates intervals exists under the proposed algorithm. The results are then extended to the decentralized case.
As the increasing downloads of applications via Android Platform, more and more malicious codes were injected in those applications. And some problems are caused by that malicious code such as economic loss and privacy issues. Android has the highest market share of smartphone operating system, the security of Android platform is extremely important. Therefore, the security testing and evaluation...
Due to the openness of Android, more and more malware has exploded, and constitutes a huge security threat to Android-based smartphones. This paper proposes a mechanism to study sensitive data leakage by analyzing sensitive APIs, decompiles Android APK to get smali files, and defines a sensitive API library related to user privacy. Then, analyzes the potential threats by detecting the sensitive API...
A novel microstrip ultra-wideband (UWB) band-pass filter (BPF) using stub-loaded multiple-mode resonator (MMR) is presented in this paper. The MMR is constructed by loading three open stubs in a uniform-impedance resonator, i.e., one uniform-impedance stub loaded at the center and two stepped-impedance stubs loaded at the symmetrical side locations. Four modes, including two odd modes (fodd1 and f...
This paper presents a novel ultra-wideband (UWB) band-pass filter which constituted by a quasi-lumped elements high-pass filter and a low-pass filter with dual-plane EBG structure. The HPF consists of quasi-lumped elements such as parallel-plate capacitor and inductor lines, and the LPF using dual-plane EBG structure. The HPF and LPF are discussed separately in this paper. Simulated results using...
VPN technology is the use of the knowledge of cryptography in the open and public network to establish a virtual private network. IPSec VPN and SSL VPN are two kinds of VPN technology and products used in most cases currently. IPSec VPN operates at the network layer, SSL VPN works in secure sockets layer. SSL VPN uses a series of cryptographic techniques, including symmetric encryption, asymmetric...
This paper propose a network-coding-based mutually cooperative transmission protocol (NMCTP). Because deep space network is sparse, a simple two-orbiter scenario is considered, where two “partners”— Orbiter A and Orbiter B in decode-forward mode — mutually cooperates in forwarding information to a common deep space station D. And one transmission round is divided into two phases. In the first phase,...
With the deep research to the packet filtering technology, this paper designs the double filtering technology program combining NDIS intermediate driver filter technology with SPI interface filter technology. It implements the system architecture and function module for the mixed firewall, proposes the mixed protection method based on the combination of user and kernel mode, and uses database to achieve...
Localization technology is a hot research point in the sensor network area. For low power consumption and long life characteristics of sensor nodes, sound location technology has its specificities using in wireless sensor network. In this paper we proposed a sensor network with sound position function, in which three sensor nodes with acoustic sensor have been used to detect trajectory of a small...
This article proposes a Widget-based UPnP framework (WUF) architecture for service discovery between multiple home social networks across the Web. Using a widget base for object-oriented API can be implemented as a user friendly interface for relevant processes, as its program design has high-level components applied in applications and the User-Controls of the API layer in the Visual Studio environment...
The seismic analysis of underground structures is relatively complex, and there is no unified point of view. In this paper, we analysis the dynamic response characteristics of the Dakai subway station by the horizontal seismic loads in ANSYS, and take into account the three artificial boundary conditions: fixed boundary, viscous boundary and visco-elastic boundary. The results show that the stress...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.