The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This chapter studies the passive fault-tolerant control problem for linear system. When the linear actuator system failure, using the Lyapunov stability theory, linear algebra theory, linear matrix inequality method and poset and so on. The following respects are undertaken: (1) First, get methods of control law K corresponding to the minimum value in order to ensure asymptotically stable for system;...
Computed Tomography(CT) generates a three-dimensional image of the internals of an object from a large series of two-dimensional X-ray images taken around a single axis of rotation. Speckle noise in 3D images, such as medical images and industrial CT images, inevitably affects the analysis results of the interested objects contained in the volume data. This paper defines a group of volume morphology...
In the paper, two SPIHT-Coded image transmission modes are proposed by taking advantage of the multiple-input multiple-output (MIMO) diversity to perform unequal error protection (UEP). Firstly, the SPIHT-Coded Image information stream is divided into different quality substreams according to their different importance. Then, for serial transmission mode, the most important substream is transmitted...
In order to adapt the change from centralized development pattern to multi-user collaborative development pattern in modern software development, the concept of software collaborative development was proposed by introducing CSCW (computer-supported cooperative work) into the field of software development, and the properties of it was analyzed, then a formalized model SCP-NET of software collaborative...
An in-line feed-line configuration for design microstrip dual-mode triangular patch resonator bandpass filters (BPFs) is presented in this paper. By properly arranging the feed-line positions, it generates two or four transmission zeros adjacent to cutoff frequencies of the passband, which improves the selectivity. The computed current distributions of a pair of degenerate modes show slight difference...
This paper discusses the problem of fault diagnosis for linear time invariant system. Using matrix theory, regional pole allocation and with the help of linear matrix inequalities theory, a structure used for fault diagnosis observer method is obtained. And using observer which is obtained gives a standard that can determine whether the system is in fault in the limited time.
When remote sensing data of earth observation reach the P level, distributed processing of global remote sensing data and improvement of digital image processing speed have become a research focus. In this article, a system of object-oriented metadata definition is developed for describing parameter inversion model and dependency of the remote sensing data. Based on the system, a space-time partitioning...
This work proposes a flatness-based trajectory planning for a quadrotor Unmanned Aerial Vehicle (UAV) system. The objective is to drive the system as fast as possible from an initial position to a final position without violating system constraints. These constraints can be the actuator limits or the maximal allowable pitch and roll angles. By deriving the extrema of the nominal control inputs to...
We propose an efficient Hermite spline-based SPICE simulation methodology for accurate statistical yield analysis. Unlike conventional methods, the spline-based transistor tables are built on-demand specific to the transient simulation requirements of the statistical experiments. Compared with traditional MOSFET table models, on-demand spline table models use ∼500X less memory. This makes Hermite...
At present, the CAN(Controller Area Network) bus test technology cannot real-time monitor the network's communication quality of the physical layer. If the bus malfunction happens, the current technology cannot position the malfunction node. Aiming at above shortcomings, this paper puts forward CAN bus Loop-test technology of the comprehensive electronic equipment, designs the experiment plan of the...
Cloud computing is a rising IT industry. How to charge for cloud computing is an important problem to be solved urgently at present. By analyzing and sorting, this article designs a charging model based on infrastructure layer in cloud computing called the infrastructure cloud. This article also proposes a Petri net which introduces costs and profits. A problem that attracts common concern in industrial...
It is important to design a better routing protocol in the Group agreement, due to the cluster heads' distribution is irregular and the data path is not the best. In this paper, a grid clustering routing protocol based on the method of "distance becoming zero" is proposed. Simulation about this protocol has been implemented, and the result of Group agreement or the improved grid clustering...
Recently, there has been an increase of reported security threats hitting organizations. Some of them are originated from the assignments to users of inappropriate permissions on organizational sensitive data. Thus it is crucial for organizations to recognize as early as possible the risks deriving by inappropriate access right management and to identify the solutions that they need to prevent such...
There is a limit when the Todaro Model is used to population flow in Chinese undeveloped city. This paper begins with the real fact of China, combine the advantages and disadvantages of classic model which of home and abroad. We research the population flow in Chinese undeveloped city with the combination of Todaro model and P-N junction model. At last, we text the new constructed model with the data...
Various governmental or academic institutes survey current security trends, and report vulnerabilities, security breaches, and their costs. However, it is unclear whether (and how) practitioners analyze these vulnerabilities and attacks to arrive at security requirements and decide on security solutions. What modeling methods are used for eliciting, analyzing, and documenting security requirements...
In this paper, we explicitly propose the topic of No-center self-organizing IP phone system. With according to Peer to Peer overlays, VoIP is a main research contents, inquired into related agreement, related standard and key technique. Data transfer protocol, language coding and telephone meeting control has been analyzed. We have designed an IP telephone system with no center of the words data exchange...
A galactose oxidase biosensor is prepared based on the Prussian Blue (PB) modified electrode combined with SiO2 sol-gel immobilization method in a “sandwich configuration”. Its electrochemical characterization and related experiment condition have been studied in detail. The optimin detection potential is −100mV at pH 7.0, 25°C. Under selected condition the sensor offered high sensitivity of 0.127µA...
AC electronic load (ACEL) based on current-controlled AC/DC/AC PWM converters is a simple kind of application for ac power source burn-in test with energy recycling capability. According to instantaneous power theory, the harmonics relationship in steady state between the ac side and the dc side of AC/DC converter and DC/AC converter in ACEL is investigated. When the frequency of the tested source...
Current technology of trusted computing can not comply with the requirement of trusted behavior. One method for trusted computing dynamic attestation was proposed in this paper. This method uses the behavior model based on static analysis of binary code. One same source code may have several different binary versions, this paper proposed one method of building almost the same core function model for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.