The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Significant progress has been made in recent years using computer programs recognizing objects in images. Meanwhile, many cameras are embedded in battery-powered systems (such as mobile phones, wearable devices, and drones) and energy efficiency is essential. Even though many research papers have been published on the topics related to low power and image recognition, there does not exist a common...
Dynamic checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. In this paper we present a lightweight approach, Control-flow checking using branch sequence signatures (CFCBS), to checking violation of control flow integrity at run-time. Our solution assigns a unique branch sequence signature, which enhances the capability of fault coverage, to each...
Nowadays, more and more online examinations are holden in the distributed examination centers, which calls for the deployment of examination surveillance systems. Various related techniques have been proposed for this purpose, for example, video surveillance, face recognition based identification, and etc. However, there is still a lack of flexible and scalable solution to detect the misbehavior of...
By analyzing the binary executable files comparing technique, this paper presents a method to detect vulnerabilities in Windows system based on security patch comparison. The technology is mostly used for detecting vulnerabilities which are patched by Microsoft but there is no clear location and detailed information of the vulnerabilities. Finally, the result of detecting MS15-034 vulnerability experiment...
An improved hybrid method of backward shooting and bouncing ray (SBR) physical optics (PO)/physical theory of diffraction (PTD) is proposed to investigate the backward scattering from a three-dimensional electrically large target. The basic idea is to combine the forward-ray-tracing technique to accelerate the original backward-ray-tracing one. The proposed method significantly reduces the computational...
Recent years have seen explosive growth in information security problem. Trusted computing is increasingly used in the fields of information security. The basic idea of trusted computing is different from traditional security method. In other words, system abstracts normal behavior and compare with real-time behavior. Most of the current research focuses on static integrity metrics. However, it is...
We detail the design of autonomous golf cars which were used in public trials in Singapore's Chinese and Japanese Gardens, for the purpose of raising public awareness and gaining user acceptance of autonomous vehicles. The golf cars were designed to be robust, reliable, and safe, while operating under prolonged durations. Considerations that went in to the overall system design included the fact that...
Precise results of eigenvalues can be obtained in order reduction approach for special modes. To improve calculation efficiency, the order reduction approach is analyzed in this paper. In the process of order reduction, every set made up of retained state variables is shared by different modes, which reduces calculation amount. Based on real number expression of complex matrix, the expression of outer...
One dimensional SIMD array which is PIM-based data parallel computer architectural has been proposed for multimedia processing application. This paper describes the implementation of a controller for one dimensional SIMD array. The main components of the controller and the instruction format are presented. PE array control is introduced in detail. Finally, the results of simulation are given to show...
This paper introduces a kind of multi-channel parallel testing system. This system could provide five kinds of different interface and produce 145 channels parallel driving source. Concurrently the system could acquire a channel of PCM code and monitor the code in real time. AD5628 DAC and OPA4234 operational amplifier is used to realize output voltage in the range of 0∼31V.And the Export accuracy...
We have reviewed the research of context awareness of recent years in this paper. First of all, we describe the definitions of context and context awareness which are made by different scholars in different fields, and propose our own definition. In addition, different classifications of context and context awareness are analyzed. We focus on context acquisition and sensing, context modeling and representation,...
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E-commerce web using. Firstly, being accordance with usability testing theory and the analysis of the user experience elements on E-commerce web using process, a evaluation index architecture is structured with views including human-computer...
The proliferation of deep Web offers users a great opportunity to search high-quality information from Web. As a necessary step in deep Web data integration, the goal of duplicate entity identification is to discover the duplicate records from the integrated Web databases for further applications(e.g. price-comparison services). However, most of existing works address this issue only between two data...
Support vector machine is a machine learning method which is based on structural risk minimization principle. The traditional parameter optimization methods of support vector regression mainly employ grid search method and so on. These methods have shortcomings of being guided by human experience and time-consuming. In recent years, many intelligent search algorithms are used for SVR parameter optimization...
The steelmaking continuous casting and mould casting is a procedure which is in high temperature, high commanding for real time, with significant time effect and complexity for schedule. For mould casting cannot be replaced by continuous casting in some area, the study in mould casting schedule has significant engineering value. To the actual situation, this paper aims at cracking the hard nut to...
There will be a variety of unusual circumstances at any time when the steelmaking scheduling plan is in the implementation, so it is the important thing for steelmaking scheduling study the that how to deal with such emergencies and disturbances, coordinated changes in a variety of uncertainties, lower the production costs, reduce losses, balance the logistics and improve the production efficiency...
According to the principle of electrostatic precipitation, the paper analyzes the appearance reason of anti-corona when higher resistivity powder is removed. Electrostatic precipitation can work with high efficiency and energy-saving by using new technique of power supply to avoid anti-corona. As well as it can reduce the thickness of powder by technique rebuilding for the electric control power supply,...
IIM CAS is now working on simulation platform for driverless vehicle to test some functions of driverless vehicle. The overall architecture of this system is presented and the key components are illustrated briefly. In virtual scene, its intelligent behavior is emphasized and the intelligent virtual traffic environment framework is given out. In the light of the difference of creditability analysis...
The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion problem. In this study, we decompose a parallel program's Petri net model into multiple process subnets to study liveness preservation instead of taking it as a whole, which thus mitigates...
This paper introduces techniques of OPC and multibus and gives an application of them which is based on Wincc(windows control centre) platform. The application has been using to integrate different kind of control systems together. The paper gives an example system, which is based on two layers, the Ethernet layer and Modbus layer. Based on the platform of Ethernet consisting of PC and PLC and C/S...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.