The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to carry out China's emission reduction commitment, local governments must undertake a certain carbon emission reduction (CER) tasks and make a plan to realize them. However, the quality of CER tasks and its acceptability will have contradiction inevitably, which could lead to the commitment cannot be finished successful. In this paper, a decision-making framework with multi-executors is...
In this paper two kinds of “Robust Threshold Key Escrow Schemes” are analysed systematically and many practical attacks on them, such as Subliminal Channel Attack£-Cheating Attack, etc., are provided. In the meantime, we show whether they gain their end of robustness is worth deliberating. In addition, we also discuss the necessity of some groupware of protocol and establish the basis of analysis...
In this paper, the problem concerning how to coordinate concurrent behaviors, when controlling autonomous mobile robots (AMRs), is investigated. We adopt a FSM (finite state machine)-based behavior selection method to solve this problem. It is shown how a hybrid system for an AMR can be modeled as an automaton, where each node corresponds to a distinct robot state. Through transitions between states,...
Reference[9] proposed a threshold group-signature scheme in order to solve the problem so called “threshold group-signature scheme with privilege subsets” suggested by Feng Dengguo. We firstly show there exist some insufficiencies and potential hazard in the scheme mentioned above. Secondly, Using the idea of constructing group-signature schemes by individual signature schemes, we put forward a group...
In this paper two kinds of “Robust Threshold Key Escrow Schemes” are analysed systematically and many practical attacks on them, such as Subliminal Channel Attack£-Cheating Attack, etc., are provided. In the meantime, we show whether they gain their end of robustness is worth deliberating. In addition, we also discuss the necessity of some groupware of protocol and establish the basis of analysis...
Reference[9] proposed a threshold group-signature scheme in order to solve the problem so called “threshold group-signature scheme with privilege subsets” suggested by Feng Dengguo. We firstly show there exist some insufficiencies and potential hazard in the scheme mentioned above. Secondly, Using the idea of constructing group-signature schemes by individual signature schemes, we put forward a group...
Through the analysis of double circular-arc gear basic gear profile and the use of coordinate transformation method, this paper deduces the gear end-face equation of double circular-arc gear. With CATIA secondary development as a tool and double arc gear as the study object, accurately calculates the gear teeth curve profile and generate a double circular-arc gear one-time three-dimensional model...
Detection oriented UWB wireless sensor node places several stringent requirements on compatibility, power consumption and implementation cost. The compatibility requirements mandate the digital realization by using high speed analog-to-digital converter (ADC). However, the need of full resolution, extremely high speed ADC contradict to the application demand of low cost and power consumption. Finite-resolution...
The video applications based on internet are growing rapidly. The real-time video applications become more popular. Because of the complexity of the internet and the real-time demand on stream video, the real-time scheduling algorithm has great influenced on the quality of service. In this paper, a novel scheduling algorithm is presented, which associated with the theories of forward error correction...
This paper studies distributed passive radar imaging of two-dimensional (2-D) scene. The echoes and the reflectivity of target are confirmed to be a Fourier transform pair. However, due to the space configuration based on the illuminators of opportunity, the echoes are sampled non-uniformly, which lead to the non-equispaced property of space-spectrum distribution. In this case, direct 2-D FFT reconstruction...
A new radar imaging method is proposed for spinning targets in space. The rapid spin motion of the target induces multi-period sinusoidal modulation of the radar echoes in both range and doppler domain, which causes Range-Doppler (R-D) algorithm invalid in conventional radar imaging. The presented method analyzes the echo model of the target spinning around an arbitrary axis. An exponential radial...
Ultra-wideband (UWB) technology, using time-of-arrival (TOA)-based ranging techniques, is a viable candidate for future location-aware sensor networks. In this paper, we propose an optimized threshold selection technique for UWB TOA estimation. The proposed approach derives the threshold by applying the linear regression to the TOA estimation error probability surface and is applicable to the real-time...
From the view of inverse scattering imaging, the paper gives basic principle of MIMO radar imaging, then applies compressive sensing (CS) to two methods. The first method is sampling and receiving echoes randomly in both frequencies and channels. The second method is sampling echoes randomly only in frequencies, and controllable space intersection is done in channels to increase the practicability...
This paper studies the distributed passive radar three-dimensional (3-D) imaging under the 3-D configuration formed by the illuminators of opportunity and the distributed receivers. The echoes received by the distributed channels actually constitute the target wavenumber-domain coverage, whose characteristics such as range, uniformity and compactness greatly affect the inversion performance. Generally,...
The detection scheme for robust detection and target location in the presence of interference is presented. The problem of detecting the slow-moving target at noisy background is addressed in this paper. A novel kind of Odd-Symmetry Template Correlation (OSTC) process is developed as the first-step of the detector. The OSTC method has a better performance due to interference suppression than traditional...
The research on detection of range-extended targets has been a focus of UWB radars. The paper introduces weighted accumulation and adaptive searching to the IPCP detection, and theoretical value of detection threshold is derived in detail. Related experiment and simulation confirm that weighted accumulation increases SNR effectively and adaptive searching basically eliminates the negative effects...
The detection of range extended target in UWB radar has been the research focus in the field of signal detection. The paper gives a detection method based on twofold sliding windows, and the theoretical value of the detection threshold using adaptive searching algorithm is derived. The simulation confirms that the detection of range extended target based on adaptive searching and twofold sliding windows...
Inspired by compressed sensing theory, a novel radar system, called hybrid-frequency radar is proposed. It transmits multiple carrier-frequency modulated by random amplitude in each pulse, and can use much fewer pulses than that of stepped-frequency radar to achieve the same non-ambiguous range interval while the target is sparse spatially.
Equalizer consists of multiple peaking filters or cutting filters. A good sound quality will be produced through independently varying the bandwidth, center frequency and gain of each filter of equalizers. The design of parametric equalizer has its peculiarity because of its particular amplitude to frequency feature and its parameters adjustment way. In this paper, we firstly define three user parameters...
The simulation of Inverse Synthetic Aperture Radar (ISAR) imaging of the launch vehicle in boost phase is described in this paper. Different from traditional target, the motion of the one studied in this simulation is characterized by both high radial velocity and non-uniform rotating, which will defocus the image in both the range and cross-range dimension. Range and azimuth compression methods employing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.