The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting and locating the fault of IGBT rapidly and accurately are the keys to ensuring the security and reliability of the active power filters (APF) system. A fault diagnosis algorithm based on the mathematical model of ac side output voltages for three-phase four-wire three-leg two-level shunt APF is proposed in this paper. According to the different relationships between the APF's ac side output...
Distributed graph computing refers to extract knowledge by performing computations on large graphs. If the data source is continuously input like stream, the system is called streaming graph computing. When computing large graphs, a basic and significant step is to distribute the graph over a cluster of nodes, which is called ‘partition’. If the graph isn't partitioned properly, the communication...
In the process of Multi-UAV (Unmanned Aerial Vehicles) perform the task, with the increasing of detection range, how to decrease the communication range of the UAVs group to prevent the eavesdropping of information, which is an urgent need to solve the problem of Multi-UAV secure communications. In this paper, a distributed cooperative control algorithm improved by UAVs-transmission-power-setting-based...
Recently, cyber foraging has been proposed to reduce the application response time and to save energy for the mobile hosts by offloading the resource-demanding tasks to the surrogates via wireless networks. However, communication overheads are further aggravated in the cyber foraging network (CFN), where multi-hosts share the same spectrum to offload tasks. Therefore, it is important for the CFN to...
This paper introduces a dynamic bandwidth assignment algorithm designed for ring topology (R-DBA) in order to meet the needs of the construction of Metropolitan Area Network (MAN).This algorithm targets ring topology, based on fair iteration, supports various Qos services and has previous assignment mechanism.
A novel dynamic bandwidth allocation algorithm named GTH-DBA is proposed for metro networks. A testbed is constructed to test its performance. Numeric results show that this algorithm is effective to improve the bandwidth efficiency of the metro networks.
Infrared focal plane array IRFPA bad pixel correction in complex applications and rich details conditions is a common problem. Therefore, a scene-based bad pixel dynamic correction (SBBPDC) technique was investigated. Based on the adaptive median filtering bad pixel detection algorithm, using the key frame technique according to the scene change, the interframe statistics are applied to judging bad...
To make an immune-inspired network intrusion detection system (IDS) effective, this paper proposes a new framework, which includes our avidity-model based clonal selection (AMCS) algorithm as core element. The AMCS algorithm uses an improved representation for antigens (corresponding to network access patterns) and detectors (corresponding to detection rules). In particular, a bio-inspired technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.