The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A 25–28Gb/s full-rate reference-less CDR is presented and designed in a standard 0.13μm SiGe BiCMOS process, which can be applicable to nearly all classical 100G communication protocols by multi-channel configuration. It consists mainly of a full-rate phase frequency detector, a quadrature voltage control oscillator and two voltage to current convertors with loop filters. A dual-loop topology is adopted...
Multimode terahertz (THz) laser emission around 3.2 THz in one-dimensional (1-D) disordered systems with 20% disorder. Simulation and experimental work provide evidence for spatial localization of light of defect modes within the bandgap frequency window.
The recently emerging SiC devices provide a promising solution to improve power converter efficiency and power density. However the expensive cost limited the widely use of SiC device. The parallel connection of SiC MOSFET and Si IGBT is introduced in this paper to utilize the advantage of this two different kinds of devices and proposed corresponding switching strategies. The switching loss and current...
Considering efficiency, labor costs and the risk of injury existing in maintenance methods for power substation equipment, this paper designs a live maintenance mobile robot system for power substation equipment, whose mechanical structure mainly includes mobile platform system based on Mecanum wheels and maintenance arm system. In addition, a kinematic model of the live maintenance mobile robot is...
In this paper, we consider the problem of attitude control for flexible satellites based on the quaternion model with unknown bounded external disturbance. A sliding mode control law is designed to attenuate the effects of the disturbance for the closed-loop system. In addition, an observer-based sliding mode control law is proposed when the flexible modal variables of the flexible satellites are...
Conventional radar generally uses fixed transmit waveform, which is difficult to obtain optimal target detection performance in the presence of interference. To solve this problem, a joint optimization algorithm of waveform and receiving filter for MIMO radar is proposed. Firstly, the maximization of output signal to interference plus noise ratio is used as objective function. The joint optimization...
In order to realize maximum power output of photovoltaics (PV), reduce line losses, and decrease abandoned solar energy during weak irradiance, a new medium voltage grid-connected PV system structure based on cascaded converters was proposed in this paper. A transformerless cascade step-up structure, instead of applying line-frequency step-up transformer, is proposed to connect PV directly to the...
Online testing is critical to ensure reliable operation of manycore systems based on a network-on-chip (NoC) interconnection fabric. We present a software-based online NoC self-testing solution based on bounded model checking (BMC). The proposed method first implements BMC on a sliced extended finite-state machine, and extracts the leading sequences necessary to excite NoC functions. Next, it targets...
NoSQL is one of the technical trends that rises in this context in the Web 2.0 Era. With the aim to explore the research status and development trends related to NoSQL technology, articles between 1998 and 2016 were collected from Thomson ISI's SCI. After the analysis by using CiteSpace V, the pivotal documents related to NoSQL, as well as institutions, co-citation patterns, research hotspots and...
Most existing multiprocessor schedulability analysis assumes zero cost for preemptions and migrations. In order for those analysis to be correct, execution time estimations are often inflated by a certain (pessimistic) factor, leading to severe waste of computing resource. In this paper, a novel Global Earliest Deadline First (GEDF) schedulability test is proposed, where Cache-Related Preemption Delay...
The amorphous alloy transformer has less no-load current and loss, but the structure characteristics of the runway shape winding make it show greater vibration intensity and noise at the load condition. Based on the structure characteristics of the amorphous alloy transformer with runway shape winding, a leakage-stress-acoustic coupled calculation model is proposed to calculate the electromagnetic...
This paper presents a survey on physics-based modeling strategies for differential via in high-speed multilayer printed circuits (PCBs). Driven by the goals of accurate and efficient design, researchers have explored several approaches for differential via modeling, include π-type RLC circuit, differential transmission line with via-plate capacitance/effective dielectric constant and parallel plate...
Shared-antipad via structure is commonly used for high-speed printed circuit board (PCB) design. Therefore, an accurate via-plane capacitance evaluation for this kind of geometry is critical to facilitate engineering design. In this paper, the analytical equation of via-plane capacitance for separated-antipad via structure is extended to the shared-antipad via structure case, by using the equivalent...
Face has been used as one of the mainstream manners for user identification. However, with the popularity of face-swapping apps, it takes only a few seconds to change the faces between two facial images. Such swapped results, when using improperly or carelessly, might create some security issues in certain applications. This paper is the first work to address the importance of this issue and discusses...
Video forgery acts have been increasing in recent years due to the easy accessibility of sophisticated video editing software. Criminals may be using video tampering as a way to get acquitted on the basis that the video evidences presented in court could not prove that they have performed the crime at a particular time or place. For high profile criminal court cases, it is likely that a video that...
Now there are trillions of web applications and the number is still increasing quickly. These web applications contain large amounts of data and functions which are useful. However, the data and functions cannot be shared and reused because these web applications do not provide proper APIs. We can encapsulate the data and function API through recording Web browser events and replaying these operations...
This work introduces an approach to localize the tampered region among the images from social media platforms. We propose a joint model to integrate the predictions from a set of features, each of which represents the inherent relation among the pixels within a certain distance to detect the forgery. Within a fixed distance, the feature is adapted from a few basic statistics through a stacked Autoencoder...
In this paper, a bilateral aerial teleoperation system based on force feedback is proposed for monitoring and detecting the forest fires. First of all, an aerial teleoperation system is proposed to enforce the velocity synchronization of the master and the slave. Velocity synchronization is required to achieve motion tracking of the master and slave vehicles. A force reflection is provided to the...
With limited battery power of nodes, communication energy consumption is the main factor to affect the lifetime of wireless sensor networks. It is of great significance to design a communication protocol to prolong the lifetime of the networks. In this paper, an energy-efficient LEACH algorithm for wireless sensor networks is proposed, which takes the energy and position factors of each node into...
Two explicit iterative algorithms are developed in this paper for solving continuous coupled Lyapunov matrix equations. By introducing a tunable parameter, the considered matrix equations are transformed into the Kalman-Yakubovich matrix equations. Further, based on the obtained equations, an explicit iterative algorithm is constructed to solve the coupled Lyapunov matrix equations. In addition, by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.