The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
AXIe is a new standard for test and measurement. It provides an open, high-performance platform for instrument module. In order to reduce the complexity of developing AXIe instrument module, the authors designed an interface component by taking a FPGA as core controller. The component implements an AXIe interface and two High Speed Mezzanine Card (HSMC) interfaces which are used to connect different...
A novel full reference image quality assessment method based on statistical local representation from two complementary sources: log-Gabor wavelet representation and local derivative pattern is presented. The dissimilarity of these extracted features between distorted and reference images is quantified and mapped into an objective quality score. Experimental results on large-scale database show that...
Recently, Deep belief networks(DBNs) have been applied in classification and regression, proved to be superior to general algorithms. But its powerful deep feature extraction ability has not yet been fully played so that a novel algorithm, multi-scale DBNs fusing wavelet transform(WT), is proposed in this paper. Based on the advantages of predicting high frequency components from WT by DBN confirmed,...
Tightly-coupled parallel applications in cloud systems may suffer from significant performance degradation because of the resource over-commitment issue. In this paper, we propose a dynamic approach based on the adaptive control over time-slice for virtual clusters, in order to mitigate the performance degradation for parallel applications in cloud and avoid the negative impact effectively on other...
Side-channel attacks pose a serious threat to implementations of cryptographic algorithms. Template attacks are probabilistic side channel attacks, which assume a Gaussian noise model. Selecting automatically the meaningful time samples in side-channel leakage traces is an important problem in the application of template attacks and it usually relies on heuristics. In this work, we propose a new dimension...
Mobile QQ is the smartphone version of the most popular IM software QQ in China. This paper studies the encipher system and communication protocol of mobile QQ and analyzes its security flaws. We found some security risks of mobile QQ and some of which are fatal especially in a weak wireless environment: Any attacker who could access the communication channel could easily recover the encrypted message...
Project scoping is a changeable problem in project management. In this paper, a graph-based constraints analysis approach was proposed to solve the project scoping prob elem. It firstly build a directed graph based on the dependencies among the requirements, secondly update the connected graph based on user defined inclusive and exclusive constraints, thirdly find the connected sub-graph set, fourthly...
Ultrasonic testing for these workpieces with complex shapes is still a challenge in NDT filed. In order to address this problem, this paper provide an effective solution for curved surface scanning using Staubli TX90XL manipulator with six freedom degrees. Here an arm-wrist separateness method is adopted to solve the inverse of manipulator and a shortest distance rule is used to optimize the inverse...
This paper is intended primarily for twin-robot ultrasonic transmission scanning system. For curved variable thickness specimen, the angle between the transducer and beam propagation direction can't be ignored through experimental analysis. The introduction of trajectory planning calculation method for curved variable thickness specimen is used to plan the transducer position and orientation. The...
In this paper, a control strategy is presented to coordinately control the switches of lamps and projectors in offices, especially for those offices with multiple meeting rooms. Firstly, it detects and collects the lamps and projects usage status through some devices, such as embedded sensors. Secondly, it analyzes the historical usage records of projectors and lamps and identifies several patterns...
Laser ultrasonic technology has been paid more and more attention in the NDT field due to its outstanding ability of non-contact measurements. As a good vibration measurement technology, CFPI (confocal Fabry-Perot interferometer) method is sensitive to the laser frequency shift caused by the ultrasonic wave propagation. In this paper, a laser ultrasonic receiver system based on the CFPI method is...
In order to get practical experience with heterogeneous LTE networks Deutsche Telekom and Huawei built up a field trial network consisting of one macro site and eight pico sites which are spatially spread in different environments to cover many pico site deployment scenarios. The main performance results obtained in the field trial are presented for both relevant deployment aspects: Either macro and...
In this paper, the detection of common defects such as inclusion, delamination for curved composite materials is studied. The principle of measuring porosity is focused on introducing. The technology of trajectory planning and motion control for twin-robot system of testing various curved composite parts using ultrasonic transmission method is also discussed. An ultrasonic NDT system is developed...
Task allocation problem plays a key role in software outsourcing services. In this paper, a self-adapting task allocation approach is presented to provide optimal task assignment strategy in the project management of software outsourcing services. The approach is constituted by preparation, task allocation, evaluation, and evolution part. In the core part, task allocation, several mathematical models...
In this paper the constrained project portfolio optimization problem is considered. It is modeled as a parameterized optimization problem, while considering risk, dependency, impact of delay and some other factors which will affect the result for the project portfolio optimization. A heuristic based on dynamic programming and graph theory is proposed to solve the model, and a tool is built to illustrated...
Ultrasonic non-destructive inspections focus on detecting, locating, and eventually sizing defects in components. For quantitative characteristics of complex materials, good ultrasonic measurement models are more efficient than general experimental studies. In this paper, An efficient ultrasonic measurement model for a vessel component with anisotropic cladding layer is established by combining the...
The centralized monitoring and command system of cable network which is based on the urban power distribution network achieves centralized display the comprehensive information of cables, combining with the cable distribution information, the data of production management, the scheduling data of SCADA (Supervisory Control and Data Acquisition) system, the monitored cable information, the monitored...
We report a compact all-solid-state mid-infrared optical parametric oscillator with wide tenability using periodically poled 5 mol % MgO-doped LiNbO3 with a multiple-channel structure design and pumped by a compact diode-pump solid-state laser operating at 1.064 µm. Wide tunability from 1.44 to 1.58 µm at the signal beam wavelength and from 3.28 to 4.11 µm at the idler beam wavelength was achieved...
This paper describes a global alarm system developed by the Standard Widget Toolkit (SWT) technology based on the national standard. The theory structure, functions and applications of the system are elaborated in details. The implementation of the system proves its significance in safe operation of transmission lines.
Most of the shared file system by P2P network is based on composite network frame, this frame integrate the intent and distributed P2P frame, it possess the advantage of both. How to download in a high speed is one direction of the research in shared file system. It researches and realizes the technology of acceleration based on transformed servers with cache under the frame of composite network frame...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.