Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In an effort to simplify the process of integrating magnetic components to power electronics circuits, an additive manufacturing (AM) process, or commonly known as 3D-printing, for fabricating magnetic components is studied in this work. A commercial multi-extruder paste-extrusion 3D printer was evaluated for making magnetic components. We developed two material systems for printing magnetic cores:...
The node replica attack is known to be dangerous to wireless sensor networks (WSNs) because it enables the adversary to extend the damage throughout the network with very low cost. To stop such attack, we propose a similarity estimation based scheme with group deployment knowledge. Compared with prior works, our proposal provides extra functionality that prevent replica from generating false location...
In an effort to simplify power electronics integration, we explored an additive manufacturing (AM) process, or commonly known as three-dimensional (3D) printing for fabricating magnetic components. A commercial multi-extruder paste-extrusion 3D printer was used to process both metal and magnetic pastes into 3D structures. We formulated a low-temperature curable Poly-Mag paste, which is a mixture of...
To minimize the damage of false data injection attack, detecting the false injected data for the in-network aggregation in sensor networks at an early stage becomes a necessary and challenging task. In this paper, we adopt Hierarchical Bayesian Space-Time (HBST) methodology to characterize the data model of in-network aggregation, and propose a divided difference filter (DDF) based scheme LFDD to...
In component based enterprise systems, anomaly detectors are commonly deployed on application-level components, but not on lower-level functional components. When anomaly alarms are triggered, system managers are expected to handle them in a timely manner to avoid cascading failures. Excessive large volume of anomaly alarms makes them impractical to handle manually. Most existing root cause analysis...
Traditional process of microwave components optimization takes advantages of simulation results. By exploiting various methods such as parameter swap, the response gradually meet the final specifications. Nowadays, we fully enjoy the convenience of computer-aided-design (CAD) tools. There are two kinds of simulations. One is circuit-based simulation which is fast but not so accurate. The other one...
Multi-source remote sensing image registration is a challenging task in remote sensing. Considering the fact that multi-source remote sensing image have characteristics of various image properties, low correlations and matching distributed nonuniformity spatially. This paper proposes an improved algorithm based on SIFT[1][2] and Wavelet Transform to ameliorate these problems. By using Wavelet Transform,...
Detecting communities in complex networks is of considerable importance for understanding both the structure and function of the networks. In this paper, we propose an algorithm for community detection. The fuzzy relational model of the networks is established by using global topology information, and then based on the proposed model, the number of communities is determined by adopting spectral analysis...
Color-based recognition method is very simple for programming and has been deeply studied, but most of the previous works are based on computers. This paper studies the issue of target recognition based on monocular vision using the TI's (Texas Instruments) ICETEK-DM642-BR (an evaluation board). The algorithms for target recognition are based on three different color spaces. Images and videos to be...
In this paper, we propose a novel authenticated key agreement scheme using Pairing-based Cryptography, named IBAKA, to address the problems of high memory occupation, low key connectivity and poor resiliency against node capture attacks existed in the traditional key management protocols of large scale sensor networks. Our proposal, which works based on the elliptic curve Diffie-Hellman (ECDH) exchange...
According to the TOP model theory, taking one tunnel as an example, the environmental effect of pollutant diffusion from tunnel portal is analyzed. The research findings show that the concentration of pollutants is beyond the ambient air quality standards in a certain region near the tunnel portal, when all of the waste gas discharges from portal without from shaft. The concentration of pollutants...
In Ad Hoc network, all the network functions count on node cooperation. Forwarding packets of other nodes is a basic example of such cooperation. However, nodes may not be interested in forwarding the requesting packets due to selfish or malicious reasons, which significantly degrades the network performance. Therefore, in respect of node forwarding process, we propose a global punishment-based repeated-game...
This paper presents an accurate compensated algorithm to evaluate the derivative of a polynomial with floating point coefficients. The algorithm is based on Horner method, utilizes error-free transformation technique to note rounding errors and compensates the straightforward evaluation in the end. Theoretical analysis and numerical experiments illustrate that our algorithm can provide last-bit accuracy.
This paper applied the Methods which based on GEP in compress multi-streams. The contributions of this paper include: 1) giving an introduction to data function finding based on GEP(DFF-GEP), defining the main conception of Multi-Streams, and revealing the map relation in it; 2) putting forward the Compression Algorithm for Multi-Streams according to map relation lied in data between data streams;...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.