The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The single-chip microcomputer course is a strong theoretical and practical course. By the analysis on the current problems existing in the single-chip microcomputer teaching process, the current teaching methods are unfavorable to the cultivation of learner's personality and innovative talents. Flipped classroom can transform the students' passive learning to active learning, so it is completely necessary...
The issues of carrier frequency offset (CFO) and channel estimation are very important for multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) wireless communication systems. In this paper, the problems of CFO and channel estimation are considered. An adaptive estimation algorithm is proposed. It can estimate CFO and channel parameters at the same time. Since the estimation...
With the maturing and wide application of cloud computing technology, there are more and more crimes in the environment of cloud computing. It is prospectively analyzed that the possible types of crime in the cloud computing environment. Because of the characteristics of cloud computing, the traditional digital forensics in the cloud computing application environment are falling in trouble not only...
Based on the two-tuple linguistic evaluation method, this paper proposes a consensus model to alleviate conflict problems in distributed Command and Control (C2) decision making. This model mainly involves three phases: computing consensus degrees, controlling the consensus state and feedback mechanism. In this proposed model, consensus degree among deciders is obtained. And the preference distances...
Aiming to the community demand for Creative talents, and on the basis of elaborating the TRIZ basic theoretical system, then to analysis the current Chinese College Students' creative abilities. Introducing the TRIZ theoretical into the model of the cultivation of undergraduates' innovation ability, and have structured the model of the cultivation of undergraduates' innovation ability. This model...
In Peer-to-Peer (P2P) e-commerce systems, peers' features such as heterogeneity, anonymity and autonomy lead to some security problems, such as forging, slandering and collective cheating, which affect the quality of service a lot. A trust model in P2P e-commerce systems based on the recommendation is proposed, each peer in the system has a unique credibility of recommendation, two trust parameters...
Trust issue is presently a research hotspot in military information grid. This paper first proposes a SOA-based unified identity authentication scheme, which can transplant the existing account systems into the new one by means of account association, to solve the problem of inter-network identity authentication. Then, this paper develops an asymmetric trust model based on fuzzy logic. This model...
According to the nature of high order cumulant, defines the four order cyclic cumulant to solve the signal separation problem. If the mixed signals are independent of each other, its four order cyclic cumulant matrix is diagonal matrix. Taking use of this performance to modify the iterative learning rate of the objective function can separate the cyclostationary signals from the mixed signals effectively,...
The fingerprint identification of image identification is an important research area, in this area, many models are all effective to the fingerprint identification, such as Markov model. In this article, the research object is the closed curves in the fingerprint image, when Markov chain in one closed curve which is made by transition probability converges to the edge of fingerprint region, this curve...
Workflow management is based on business process modeling. Choosing an efficient modeling technique for the formalization of complicated and variable business process is very important to the construction of flexible workflow management. Taking the advantages of Petri nets, to construct business process model which is flexible and analytical. Firstly, related workflow modeling techniques based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.