Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Future avionics is no longer mere close electronic systems with the requirement changed, while it is pervasively controlled by dozens of frequent information exchange, open architecture and highly automatic systems. And this transformation has driven major advancements of security in avionics which contains computing security and communication security. Our team is focused on the security of next...
Artificial neural network (ANN) is an important branch of artificial intelligence field. This paper reviews the classic models and implementation methods of ANN, and analyzes the key issues of implementation based on FPGA. Considering the demand of intelligent information processing in aviation field, this paper proposes an application assumption that combines traditional airborne computer systems...
With the emergence of a variety of data cloud services, especially composite data cloud services, service trustworthiness problem is particularly prominent. Data cloud service credibility becomes focus of cloud service consumers. Data cloud service is essentially a Web service and its quality is associated with the Web service evolution process. In this paper, considering how provenance information,...
Sub-Nyquist sampling based on Modulated Wideband Converter (MWC) as an innovative low rate sampling theory for sparse wideband signals draws much attention from researchers. However, the research in terms of implementation for this theory is far from satisfactory. In this paper, we present an implementation scheme for complete MWC sub-Nyquist sampling system. The proposed sampling system consists...
Information-Centric Networking (ICN) proposals rethink the communication model around named data, in contrast with the host-centric transport view of TCP/IP. The content retrieval in ICN is natively receiver-driven, chunk-level based, multi-path forwarding and intrinsically coupled with in-network caching. To make the best use of in-network caching resources, NDN router should acquire the view of...
Content-Centric Networking (CCN) proposals rethink the communication model around named data. In-network caching and multipath routing are regarded as two fundamental features to distinguish the CCN from the current host-centric IP network. In this paper, we tackle the problem of joint collaborative caching and multipath routing in CCN. We achieve this with an online and offline combination caching...
This paper aims at the actual demand for experimental teaching for sensors and detecting technologies. It adopts LabView as virtual instrument platform, taking embedded processing system as hardware platform and designs the experimental teaching platform for detecting voltage and frequency signals of sensor output. We pay attention to the teaching demand and discuss the design idea and overall structure...
This paper presents a trust management model based on multi-agent and trust evaluation. It adopts the centralized distribution management mode and sets up multiple third-party agents in the cloud, furthermore, it can manage the users and cloud services by the collaboration of the agents effectively. By using multiple third-party agents, it can reduce the single-agent's pressure of computation, storage...
Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based...
Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for a MCS application, incentive mechanisms are necessary to attract more user participation. Most of existing mechanisms apply only for the offline scenario where all users' information are known a priori...
As the network infrastructure has been consuming more and more power, various schemes have been proposed to improve power efficiency of network devices. Many schemes put links to sleep when idle and wake them up when needed. A presumption in these schemes, though, is that router's line cards can be waken up quickly. However, through systematic measurement of a major vender's high-end router, we find...
Crowd counting, which count or accurately estimate the number of human beings within a region, is critical in many applications, such as guided tour, crowd control and marketing research and analysis. A crowd counting solution should be scalable and be minimally intrusive (i.e., device-free) to users. Image-based solutions are device-free, but cannot work well in a dim or dark environment. Non-image...
The memory architecture design and effective management is the key factor to the widely use of the FC-AE-1553 chip. On the basis of analyzing the FC-AE-1553 chip features, a kind of memory architecture with the characteristics of shared storage, circular storage, and global double buffering mechanism has been presented. This paper describes the implementation of the memory architecture in detail from...
To solve the cumbersome authorization, heavy workload and such problems which exposed in practical applications of the web application access control, the paper introduces a new access control model based on web application(WRBAC). The model classifies the object directly of web application, which can reduce the difficulty of assigning permission between roles and objects. The model improves the efficiency...
In today's Internet, many peer-to-peer (P2P) applications deploy their distributed networks based on Kademlia, a robust distributed hash table (DHT) protocol. Since Kademlia has no mechanism to defend ID fraud, Sybil attack becomes a great threat on these P2P networks. However, to our best knowledge, Sybil attacks in real Kademlia-based networks has never been measured. In this paper, based on our...
An attempt was made to convert Taixi anthracite into microporous activated carbons for use as SO2 adsorbents from flue gas. In this work the activated carbons (ACs) were produced by physical activation with CO2 and steam, respectively. Specifically, the effects of activation temperature and burn-off degree on the physico-chemical properties of two series were comparatively studied. The surface area...
Due to rapid industrialization especially information industrialization, China is faced with serious shortage of electronic materials, while management system on e-waste has been put on the agenda. Guiyu town in Guangdong province, China has been known by international community by its improper e-waste importing and recycling, this research reviewed the past, current status of e-waste dismantling...
The paper introduces ontology into knowledge construction of petroleum exploitation domain in order to solve problems on information sharing and application integrating which are caused by the inconsistence of information terms between disciplines. Through the formal description of ontology, this paper puts forward an improved method of ontology mapping, designs an ontology integration platform of...
To identify and eliminate the product's early failures with the lowest cost and the best effect, this paper proposes a HASS profile research method based on computer simulation technology. Firstly, the flow and implement steps are introduced, then take the solder joint as an example, to show the application of the computer simulation method in a specific way, finally, summarizes the application prospect...
In order to study on the structure system and the coordinated control of the underwater vehicle controlled by rudders and thrusters, the autonomous underwater vehicle (AUV) named??HaiYi-1??is developed. This paper introduces the system structure, control method, software and hardware of ??HaiYi-1??in details. And on the basis of hydrodynamic analysis of the thrusters, the dynamical model of the AUV...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.