The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Syndrome coding is a very classical coding scheme in Physical layer security. It is necessary to design a efficient and secure code for syndrome coding to guarantee the security of the instant communications. In this paper, we apply two ways to construct random codes. By analysing on the effect of the parity check matrix on the average equivocation, we propose a method to generate the best random...
In this paper, a robust model-based battery state-of-charge (SOC) estimating algorithm is proposed with a novel approach based on combination of multimodels data-fusion technique and particle filter (PF). The proposed method is particularly adapted for SOC estimation under real-time conditions and the presence of measurement noise. In this innovative approach, multiple battery models have been used...
In this paper, a robust model-based battery state of charge (SOC) estimating algorithm is proposed with a novel approach based on multi-models data fusion technique and particle filter (PF). The proposed method is particularly adapted for SOC estimation under conditions of sharp current variations and presence of measurement noise. In this innovative approach, multiple battery models have been used...
Computational thinking has recently been widely recognized as a fundamental skill that should be cultivated for everyone and in every field. Although there is an increasing interest in research in teaching and learning computational thinking in recent years, an engaging, effective online learning system is yet to be built for teaching, learning, and applying computational thinking online. To this...
The prediction of T-cell epitopes is of great help for facilitating vaccine design and understanding the immune system. In the bioinformatics, the MHC-binding peptides are defined as the T-cell epitopes, which will trigger the immune response to the antigens. However, binding peptides cannot necessarily activate the immune response, namely non-immunogenic. Until now, little attention has been paid...
This paper is focused on designing a spatial combat situation deducing system (SCSDS). HLA-based collaborative simulation is an effective way to integrate different models together to accomplish the combat situation deduction. First, standardized description mechanism of SCSDS is established, including a variety of description templates. Then, the mathematic models library of SCSDS is presented. Models...
Transfer hub platform gather much people in one small place. when emergency event happen, Transfer hub platform well become the very dangerous palace. So building a suited passenger evacuation model in Transfer hub platform to simulation crowd and group evacuation in the emergency situation is very importation. The goal of the paper is create a framework of passenger evacuation concept model to help...
The spatial relations representation modeling is a basic task of computer graphics comprehension, however, previous modeling is usually aimed at a certain kind of relations such as direction, topology and distance. The models are relatively independent and inconsistent with human's cognitive logic, thus building a unified spatial relations representation modeling based on different reference frames...
The distributed intrusions detection system based on remote procedure call (RPC) has revealed the disadvantages that the quantity of data transmission is large, the performance of real time is poor, the dynamic configuration and cross-platform are hard to realize and so on, which have not been able to satisfy the need of the security of network. This paper introduces the technology of mobile agent...
Passport is a new secure and adoptable source address validation technique, which has attracted fully attention. In this article, we research into the efficiency of Passport. First of all, we build a mathematical model to describe Passportpsilas function, then propose an evaluating indexes, at last we use Brite generate a Power-Law network topology and design correlative algorithm to quantitative...
The concept of Base Object Model (BOM) which enhances the interoperability and reusability of federates has resolved the problem of ineffective utilization of federates during the process of federation development. However, it does not refer to the control and organization on a simulation execution. It is laborious and time-consuming if we organize a BOM-based simulation execution manually. Since...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.