Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Strain induced band structure change of the monolayer MoS2 has great potential in applying this material in many reconfigurable nanoelectromechanical systems. Here in this work we report the investigation of the band structure subjecting to strains in different directions. It is found from the first principle simulation that the effect is almost independent on the direction of the applied strain....
Brushless DC motor has been becoming more popular in industry, electric and aerospace applications, making the control for four-quadrant operation of Brushless DC motor greatly significant. This paper presents pulse width modulation (PWM) control mode for four-quadrant operation of Brushless DC motor, which can realize both motoring and braking operation at the same rotation direction. Based on the...
The artificial visual detection and recognition of bridges' cracks bear great dangers, therefore, we put forward a method of digital and intelligent detection of bridges fractures, combined with machine vision and the Deep Belief Network technologies. This method adopts Raspberry Pi to collect and pre-process images, to transmit images data by the GPRS / 3G or wired networks. And it uses high-level...
In this paper, cyber physical system is analyzed from security perspective. A double closed-loop security control structure and algorithm with defense functions is proposed. From this structure, the features of several cyber attacks are considered respectively. By this structure, the models of information disclosure, denial-of-service (DoS) and Man-in-the-Middle Attack (MITM) are proposed. According...
The observability analysis is presented and a combining method applying extended Kalman filter (EKF) and high frequency injection (HFI) method is proposed to realize the estimation of rotor speed and position at standstill and in normal situation for permanent magnet synchronous machine (PMSM). Considering the observability of start-up situation, a surface-mounted permanent magnet synchronous machine...
Attack graph technique is a common tool for the evaluation of network security. However, attack graphs are generally too large and complex to be understood and interpreted by security administrators. This paper proposes an analysis framework for security attack graphs for a given IT infrastructure system. First, in order to facilitate the discovery of interconnectivities among vulnerabilities in a...
Orbital angular momentum (OAM) provides extra degrees of freedom to improve spectrum efficiency. However, the harsh requirement that transmit antenna(s) and receive antenna(s) need aligning throws out a great challenge to its application. To investigate the reason of performance degradation caused by misalignment, we first consider uniform circular array (UCA) based OAM system and set up two free...
The honeypot is a kind of proactive defense technology against malicious attacks in the field of information security. Successful and timely detection of network attacks highly depends on efficient honeypot deployment. This paper proposes an adaptive honeypot deployment algorithm based on learning automata (LA) called LA-AHD for improving the network security. The whole network suffers from external...
Rumors spread on Online Social Networks sometimes can lead to serious social issues. To accurately identify them from normal posts is proved to be of great value. Users' behaviors are different when they post rumors and normal posts. Since rumors only account for a small percentage of all posts, they can be regarded as anomalies. Therefore, we propose an anomaly detection method based on autoencoder...
This paper presents a wakeup receiver for latency-critical IoT applications in 90nm CMOS, which is fully compliant to many popular IoT wireless standards with constant envelope modulations, such as Bluetooth Low Energy and IEEE802.15.4. Paired with a standard-compliant transmitter, the proposed wakeup receiver method minimizes the overhead in system power, area and complexity. The proposed 2-dimensional...
In this paper we present a flexible decoding kernel using K-best and iterative K-best algorithms. Using this decoding kernel, system designers can choose the alternative algorithms for their different applications. With one kernel, it supports multiple configurable antennas (2×2,4×4) and variable modulation schemes (QPSK,16-QAM). Using number of kernels supports 8×8 and 64-QAM. Using a 90-nm CMOS...
simultaneously multiple objects matching under 2D affine transformations (six parameters or degree of freedom) is key, yet not resolved problem in computer vision. This paper proposes an optimized and efficient pattern matching method by maximizing the Normalized Cross Correlation (NCC) coefficient measure based on Multi-swarms Particle Swarm Optimization (MPSO). PSO is a kind of stochastic optimized...
Owing to the great demand in more functions and miniaturization in microelectronic packaging, the dimensions of interconnects has decreased extremely, which has resulted in electrical, thermal, and mechanical reliability issues. To address these issues, carbon nanotube (CNT) has been selected as a promising alternative material for the interconnects in packaging due to its large current density, high...
Graphene protection barrier was introduced to the interface between the ECAs and Cu-plated wire to enhance the reliability of the ECAs joints on Cu-Plated PCB substrate due to its excellent properties of impermeability to all gases/salts as well as its thermal/chemical stability. The results of shear test indicated graphene protection barrier can improve the shear strength of the ECAs joints on Cu-plated...
The photovoltaic (PV) grid-connected power system in the residential applications is becoming a fast growing segment due to the shortage of the fossil fuel energy and the great environmental pollution. A new research trend in the residential generation system is to employ the PV parallel connected configuration rather than the series-connected configuration to satisfy the safety requirements and to...
In high voltage gain application scenarios, diode-capacitor network can be used to achieve a relatively high voltage gain and at the same time reduce the demand of magnetic component, which considerably improves the efficiency and power density. In this article, the topology of a high step-up DC-DC converter based on multi-cell diode-capacitor network and coupling inductor is proposed to attain a...
The increasing number of smart vehicles and their resource hungry applications pose new challenges in terms of computation and processing for providing reliable and efficient vehicular services. Mobile Edge Computing (MEC) is a new paradigm with potential to improve vehicular services through computation offloading in close proximity to mobile vehicles. However, in the road with dense traffic flow,...
For the large number of the image data produced by the sensor nodes in wireless multimedia sensor networks (WMSNs), the reduction of the sensor data and energy efficient transmission of this data are the most challenging problem. Compressed sensing based image compression provides the dramatic reduction of image sampling rates, energy consumption for WMSNs data collection and transmission. For better...
This paper study a new paradigm of heterogeneous charging stations (CSs) for the excellent charging services of Electric Vehicles (EVs) in a dense urban environment. When a large number of EVs are driving on the roads, their travel demands and charging activities have significant impact on the charging management of multiple CSs including large-CSs (LCSs) and small-CSs (SCSs). The problem of charging...
High precision localization is essential to autonomous control of unmanned vehicles (mobile robots). Most existing methods for localization are either complex and costly, or bear low accuracy and poor robustness. In this work, a structurally simple and functionally effective localization system is designed and developed for snowplow robots with successful on-site application. The major hardware involved...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.