Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Laser shooting will gradually replace the traditional live fire shooting as the main shooting training method, this paper discusses the Linux environment based on laser shooting system server-side software design ideas and implementation of the program. The software uses a multithreaded architecture, the use of message queues as a tool for communication between threads. Based on the V4L2 standard-driven...
Nowadays, Android devices become more and more popular, which attracts the attention of the forensics workers. As Android devices have a perfect security mechanism, the root privileges of Android devices are required to obtain electronic evidence effectively. The existing methods of obtaining the root privileges in Android devices mainly based on the third-party tool. Although the methods are widely...
With the widely use of smart phones, Android devices have become an important data source in forensic investigation, and many tools which collecting data from Android devices have also been introduced. However, most current studies consider only flashing the NAND card, nearly paying attention to eMMC card. Therefore, based on Android Recovery Mode, our paper designed a general forensic tool giving...
Aiming at the agile turn of over-the-shoulder launched air-to-air missile based on aerodynamic/direct force, this paper establishes the mathematical model of attitude control, designs the agile turn attitude control law based on second-order sliding mode control in the pitching plane and uses Matlab software for simulation. Compared with the conventional sliding mode control law, results show that...
Laser simulated shooting system based on machine vision, need to identify laser spot of digital target figure for completing follow-up results display and automatic voice report. However, images captured by camera has distortion, which may cause identification difficulty. In this paper, image recognition algorithm conduct digital target figure correction analysis to get transformation matrix, which...
Different clustering based strategies have been proposed to increase the performance of image segmentation. However, due to complexity of chip preparing process, the real microarray image will contain artifacts, noises, and spots with different shapes, which result in these segmentation algorithms can't meet the satisfactory results. To overcome those drawbacks, this paper proposed an improved k-means...
The digital target image, in a machine vision based automatic scoring system, should be recognized for the subsequent automatic scoring and records analysis. However, target images collected from a camera are bound to be distorted, which would pose some difficulties to recognition. In this paper, according to the automatic closed loop controlling idea, a loop algorithm is proposed after the verification...
Unmanned Aerial Vehicle (UAV) has many advantages, such as miniature, light weight, low cost, excellent and maneuverability and so on, which make it get more and more attention from the military of many countries. A critical limitation for the current use of UAV is their limited range. This paper describes the results of an effort on the modeling of the UAV aerial refueling problem and on how to realize...
Obstacle avoidance (OA) and formation regrouping (FR) are very important issues for implementation of automatic UAVs formation flight. In this paper, the OA strategy and control for UAV leader is investigated first. Then, it is followed by investigation of the OA strategy and control for UAV follower. In the process of OA, in order to conduct OA reasonably and efficiently, the formation is split first...
The paper is to design a system to protect private data in the smart phones and control the smart phone when it lost. And the question of phones' private data security and protection is proposed. In this paper, we put forward a smart phones' data protection and synchronization system based on Android OS [1]. The system tries to solve technical problems such as smart phone lock, smart phone data monitoring,...
Guidance law is so important that determines whether the autonomous aerial refueling (AAR) of UAV will success. Based on the analysis of the Strategy of Rendezvous for AAR of UAV, different guidance laws for the tanker aircraft and the receiver air craft has put forward. A nonlinear lateral trajectory tracking guidance law is well apply to solve the problem of the guidance to tanker receiver and a...
During the formation flight time, the Unmanned Aerial vehicles (UAVs) have to transform their flight formation in many cases, such as environmental change , the modification of the task and some UAV s leaving of the formation. During the time to change the formation, the most important thing is to avoid UAVs crash into each other, then, they should finish the transformation process in certain time...
The Traveling Salesman Problem is one of the most intensively studied problems in computational mathematics. Due to the basic genetic algorithm convergence speed is slow, easy to stagnation. We present in this paper a new improved mutation strategy to solve this problem. Roulette wheel selection strategy is used to avoid running into trap of the part best value. And simulated niche method is introduced...
Using 2,116 observations from 2007 to 2008, we investigate the relation of accounting conservatism and cost of equity capital, and the influence of property rights on it. We find accounting conservatism is negatively related to equity cost and state ownership lower the influence of conservatism on cost of equity capital.
In Internet era, instant messaging software are closely linked with Net users. However, with enormous growth of instant messaging software users, a lot of lawbreakers carry out criminal activities using them as a medium. Then, mining and analyzing the useful clues from raw data left on the computer has become a significant means and research area for investigation and forensics. In this paper, taking...
Nowadays, E-mail communication has been abused for numerous illegitimate purposes such as E-mail spamming, terrorist attack, business fraud, etc. As a result, to analysis the rich personal information hidden in E-mail is significant for investigation and evidence collection. In this paper, an investigation and analysis system aiming to Email was presented, which supports a variety of data sources...
This paper has made a thorough analysis of brushless DC motor simulation system, in which we use a single neuron PID control algorithm based on RBF neural network for on-line identification (RBF-PID Algorithm). A special human-computer interaction (HCI) interface was designed in this paper, which provides interface for users to set the correlative parameters and select related control algorithm. Two...
The data file of downloading records in the P2P downloading software contain the rich personal information. So mining and analyzing the useful clues inside has become a significant means and research area for the computer investigation and forensics. The Thunder which is the typical representative of P2P downloading software and the most popular in China has been emphatically analyzed in this paper,...
At present, keypad electronic lock with alarming function is to gradually replace the traditional mechanical locks, overcoming the shortcoming of the traditional mechanical locks which contain few password and lack of reliability, but keypad electronic lock makes a great progress in terms of technology and performance.This paper represents a type of remote-controlled electronic lock developed with...
This paper addresses the graph drawing problem for email networks. First, the graph drawing problem is formulated as a minimization problem. Then, a genetic algorithm based graph drawing method is proposed by solving the minimization problem. By taking into account the smallworld property of the email-networks, the proposed method improved the force-directed graph drawing algorithm to draw the graph...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.