The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Integration of renewable energy into energy system, which is a reasonable approach for sustainable development, posed a challenge to design, operation and optimization of distributed energy system (DES). The emerging control concept related to DES integrated with renewable energy, namely dynamic match optimization (DMO), is reviewed in this paper. A scoping review, which includes literature research...
Some willful or unaware electromagnetic lesk and interference will influence farawary device though long distance propagation. In order to solve this EMC problem, near-field to far-field transformation method is studied by means of PWE method. With Lorentz reciprocity principle, near-field to far-field transformation, integrable couplings and compensation method are deduced. Second, sampling error...
Automatic detection of P-wave in an electrocardiogram(ECG) is a crucial task in diagnosis of the presence of arrhythmias. In this paper, we proposed an improved method based on distance transform. Distance transform is an efficient method for locating P-wave critical points, corresponding to subjective judgment of cardiologists. Auxiliary algorithms have also been introduced to improve the precision...
Diagnosis of sleep disorders in an expensive procedure that requires performing a sleep study, known as polysomnography(PSG), in a controlled environment. However, PSG still requires patients to use a cumbersome system with multiple recording channels that need to be precisely placed, which gives burden to testers greatly. This paper proposes a low-power sleep monitoring algorithm based on the wrist...
Botnets have been one of the most threatening risks against cybersecurity since 2003. Their aggressiveness and destructiveness affect the proper functioning of network directly. It is quick-witted for them to make use of changing communication mode and recruiting new members to evade detection and even reduce losses once detected. However, there still exist some hints to find and locate zombies even...
Targeting the security vulnerabilities of unauthorized access caused by the failed link restriction and session authentication in Web application, a new method of generating Web link safety testing scenario based on UML diagram was proposed. Firstly, this method constructs the UML extended state diagram with the combination of the jump relationship of Web pages and user operation permission, Then...
In this paper, control of liquid level for a four-tank system with respect to disturbances is studied, where constrained output feedback H∞ control of linear systems based on linear matrix inequality is adopted. In contrast, both an unconstrained H∞ controller and decentralized PID controllers are applied to the four-tank system. The simulation results illustrate the effectiveness of constrained output...
In this paper, we can find the defects of the security mechanism through the analysis of the security mechanism of iOS system. And in accordance with known vulnerabilities, we achieve to exploit the loopholes, and then complete the breaking out of sandbox, Obtaining arbitrary code executio, root privilege, patching kernel. Finally we achieve to jailbreak the iOS system.
Correlation Electromagnetic analysis (CEMA) has been effective in revealing the cryptographic key on cryptosystems. Random delay insertion (RDI) causes misalignments to prevent the action of these attacks in the time domain to avoid information leakage. In this paper, we first use the newly proposed time-frequency transformation Hirschman Optimal Transform (HOT) to transform the signal from the time...
Suitable controller is a significant part in speed governing system of gasoline engine. In this paper, an integral-separation fuzzy PID algorithm used in controller is proposed to enhance the static and dynamic characteristics of speed governing system. The designed controller in this paper, based on the mathematical model of speed governing system, was established by using MATLAB/Simulink as the...
IBIS-L ground based SAR is able to provide accurate and long-term measurements over relative large areas by combining of stepped frequency continuous wave, synthetic aperture radar and interferometric technique. To measure displacements of an open pit slope in Beizhan iron mine, a novel environmental correction method is presented to perform the atmospheric distortion correction of GB-InSAR. GB-InSAR...
Tremendous underground exploitation as subway tunneling, functional facilities excavation in inner-city environments caused potential damages to buildings and bridges over the construction zone. PSInSAR technique and high resolution SAR data provides a powerful tool for slightly surface deformation in recent years. Till now, it is time to use PSInSAR as an operational and mature technique for geodesy...
Using RADARSAT-2 satellite images from January 2012 to October 2015, this paper employ the PSInSAR(Permanent Scatterer InSAR) technique to acquire coastal lowland subsidence in Zhejiang province. In the Hangzhou Bay Region, the widely distributed silt deposition leads to the entire ground sinking slowly, with 10∼20mm/a in rate. Conversely, the ground subsidence distribution of the Eastern Coastal...
Nowadays there are more than 10 billion sensors in the Internet of Things. These sensors will produce a mass of historical data as time goes on. And these data are useful in data mining and may create great value for human. However, historical sensor data are hard to archive because they have the characteristics of mass, complexity, isomerism and dynamic nature. Therefore, how to archive historical...
In the isolated word speech recognition system, the extraction and matching of the characteristic parameters is the key link. This paper introduces a new feature parameter extracting methods on basis of Pulse Coupled Neural Network (PCNN) for the recognition system. By means of the visibility of speech spectrogram, the PCNN is used to extract the time series and entropy series from the spectrogram...
An intermittent control scheme is presented for consensus of the multi-agent system, in term of the pulse function, which is introduce to describe the constraints of the actuator. The proposed scheme is a general framework covering the impulsive control, and (zero-order hold) sampled control by choosing special functions as the pulse function. By using graph theory and the property of stochastic matrices,...
In this paper, a hybrid evolutionary algorithm (HEA) for flexible job shop scheduling (FJSP) to minimize makespan is developed, in which, a new crowed operator based on average hamming distance is proposed to maintain the population diversity. Different strategies for crossover and mutation operators are adopted. Moreover, a local search procedure based on critical path theory combined with preference...
the surface potential decay measurement of the blend polyethylene nanocomposites film containing the untreated and treated (trimethoxy (propyl)silane) nanosilica is conducted in this research for further studying how nanoparticles and moisture absorption affect the charge transport and electrical properties. The surface potential decay measurements were investigated over the negative corona charged...
Identifying reliable information from the information ocean is a natural talent of human being, which can be hardly formalized by machines. In this paper, we show how to measure the uncertainty of each sample in terms of their similarity. For applications under complex uncertainty, it is desirable that we provide a systematic way for users to identify what are reliable information. In our approach,...
In current datacenters, centers deliver resources for tenants to run various jobs with diverse requirements. Today's resource management can provide higher levels of scheduling options and supports certain QoS (Quality of Service) requirements. However in many references, exiting cloud resource management scheduling focus on the objective function to minimize the deadline time fall short in utility...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.