The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an improved pilot-based blind (PBB) phase estimation method named mixed-polar-amplitude-modulation (MPAM-PBB) method for coherent optical orthogonal frequency-division multiplexing (CO-OFDM). In the previous PBB methods, all the selected so-called pilot subcarriers (PSs) are loaded with bipolar amplitude modulation (AM) format signal. In MPAM-PBB method, half of the selected...
The multiple knapsack problem is to pack some items into given knapsacks, such that the sum of the knapsack profits is maximized. This paper is concerned with a variant of the multiple knapsack problem, called the multiple knapsack problem with compatible bipartite graph (MKPCBG), where two items can be packed into the same knapsack only if their corresponding vertices are adjacent in the given compatible...
Dell Advanced Infrastructure Manager (AIM) is a software that separates the physical elements in the data center from how to control them. It is convenient to share a pool of backup servers that are ready to take over any other failed server's role. In this paper we integrate Matlab Distributed Computing Server (MDCS) with AIM to build a reliable, efficient platform for scientific computations. The...
In PCM/FM remote sensing receiving system, when the bit rate is above 1Mbps, the signal suffers frequency select fading, which causes the serious inter-symbol interference (ISI); power allowance can no longer guarantee the system quota. Besides signal reflection such as buildings, ground, mountains and atmospheric refraction eventually become the multipath interference signals. Thus an adaptive filter...
In order to solve the problem of trusted authentication between terminals, as well as terminals and the server, and to establish a safe and reliable network environment, a remote attestation scheme design based on the identity and attribute certificates is proposed. Through a third-party certification body, which authenticates the identity and attributes of the Trusted Platform, this design ensures...
In this paper, we introduce the general computing methods of multiple integration, and analysis the limitation and range in the application of solving the practice problems. Monte Carlo method of uniform random sampling number has explained the basic idea of Monte Carlo algorithm and its application in multiple integrals. Thus, from theory and example, we give a rapid calculation based on MATLAB tool,...
The orthogonal wavelet lowpassed filters coefficients with arbitrary length are constructed in this paper. When N=2k and N= 2k−1, the general analytic constructions of orthogonal wavelet filters are put forward, respectively. The famous Daubechies filter and many other wavelet filters are tested by the proposed novel method, which is very useful for wavelet theory research and many applications areas...
Recently, cloud computing is increasingly becoming the focus of attention at home and abroad. When the big data storage is become the core of cloud computing system, cloud computing system would evolve into a cloud storage system. With rapidly development of cloud computing, cloud storage has become one of most popular research field. HDFS (Hadoop Distributed File System) has a powerful data storage...
This article first briefly introduces the basic principles of the multipath effects and analyzes the causes of the multipath fading, and then gives the standards definition for some related concepts and rigorous mathematical expressions for those. Then, based on a theoretical model, using dynamic system modeling and simulation software package Simulink of the Matlab software, this article gives the...
Pulse-Coupled Neural Network is known as third generation artificial neural network. It is created by visual cortex neurons, a synchronous pulse release phenomenon of mammals. Compare to traditional artificial neural network, PCNN has the characteristics of dynamic neural network, integrated space-time, automatic propagation and synchronous pulse release. PCNN has tendency for image retention information...
In this paper, we utilize negacyclic codes to construct a family of optimal subsystem codes with parameters [[q2+1,(q-1)2, 4, q-1]]q> where q = 1(mod4), q = pτ, τ ≥ 1 and p is an odd prime. These constructed quantum subsystem codes are different from those codes available in the literature.
In this paper, a pilot-based blind (PBB) phase estimation method for coherent optical orthogonal frequency-division multiplexing (CO-OFDM) is proposed. Instead of inserting the pilot-subcarriers that are loaded with the already known information in the OFDM signal, the unknown and specially designed signal is used to replace the signal on the pilot subcarriers to decrease the waste of spectrum and...
The ability to analyze and assimilate Electronic Medical Records (EMR) has great value to physicians, clinical researchers, and medical policy makers. Current EMR systems do not provide adequate support for fully exploiting the data. The growing size, complexity, and accessibility of EMRs demand a new set of tools for extracting knowledge of interest from the data. This paper presents an interactive...
A novel approach based on few-mode tilted fiber Bragg grating (FM-TFBG) to realize mode conversion, mode multiplexing, mode de-multiplexing and space-division multiplexing (SDM)-wavelength division multiplexing (WDM) simultaneously is proposed and studied theoretically in this paper. In FM-TFBG, forward-propagating core guided modes can be converted to radiated modes when the phase matching condition...
Maximum entropy method (MEM) is the traditional approach to estimate interbank exposure matrix, which is the key to assess contagion effect in banking system. Recently, a new transfer entropy method (TEM) is proposed to estimate interbank exposure matrix. This paper employs the two approaches to estimate interbank exposure matrix of Chinese banking system, and then simulate the contagion process given...
In this paper, an improved video encryption method based on coupled logistic chaotic map is proposed. In it, the method adopts coupled chaotic logistic maps as the key-stream generator to encrypt the DCT (Discrete Cosine Transform) coefficients of the video frame. In the whole process, the new method can provide the pseudo-random sequence with good randomness. Therefore, these systems are suitable...
In the distributed environments, Anonymous Access and Delegation are not satisfied in the traditional Access Control. However, they can be guaranteed in the Key-based Trust Models, because a key represents the identification of one user, both authorization and key are associated with each other. In the Key-based Trust Models, the most representative ones are PolicyMaker, SPKI/SDSI and QCM. In this...
As a kind of wireless ad hoc network model, Sensor network has broad application prospects in environment, Military control, the Prediction of earthquake and climate and so on. Based on the functional of density control of Sensor Networks, a construction algorithm called Connected Cover Dominate Set has been proposed. In the new algorithm, the Sink node set up Cartesian code first, and then broadcast...
The performance and service quality of a Web system become more and more important along with the development of Web application technology and popularization of Web application rapidly. There are many particularities and difficulties in the testing of web applications as to traditional application, especially in performance testing, such as unpredictable load, reality of designing scenario and veracity...
Microphone array has been widely applied to the conference mode, while the application on the mobile phone is still in the initial stage. Because hardware processing speed of mobile phone is low and the environment where we use mobile phone are complex as the restriction condition, now the use of microphone array technology on the mobile phone still has many difficulties needs to overcome. In order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.