The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the popularization and rapid development of mobile intelligent terminals (MITs), the number of mobile applications, or apps, has increased exponentially. It is increasingly common for malicious code to be inserted into counterfeit apps, which can cause significant economic damage and threaten the security of users. Code obfuscation techniques are a highly efficient group of methods for code security...
This paper presents an intelligent operation and maintenance training system for power grid operation staff of substation based on augmented reality (AR), whose functions, characteristics, software configuration and implementation are introduced in details. As the training and examination system for operation and maintenance personnel, the system was composed of intelligent training system and intelligent...
Based on the biological mechanism of immune algorithm, an improved immune genetic algorithm is proposed, in which particle swarm optimization is taken as global searching strategy to improve the global search ability of the immune genetic algorithm, and progressive optimization algorithm is used for evolving operation of control strategy to improve its local search ability. At the same time, because...
Electroencephalography (EEG) and brain-computer interfaces (BCI) are receiving increasing attention and expanding application in stroke study. To identify stroke patients and normal controls during mental rotation task, common spatial pattern (CSP) algorithm is employed to extract features from binary-class EEG which will be further to form the dictionary for sparse representation. In the classification...
This paper presents a functional design of a ‘information flow analysis’ service that provides information/data owner with a explicit and end-to-end provenance recording of information/data usage and redissemnation among entities in a collaborative context of Mobile Cloud. The core idea is to identify data exchanged among nodes in the business process. BPEL-defined business process is used as a study...
This paper considers the problem of transmission scheduling of delay-sensitive data over a point-to-point correlated Rayleigh fading channel with channel estimation errors. According to the imperfect channel state information (CSI) and the buffer state, the transmit power and the modulation and coding scheme are determined to jointly maximize the energy efficiency, and minimize transmission delay...
With the rapid development of high-speed and heavy-haul railways, the security of railway is increasingly important. Under the combined actions of tension, compression, distortion, and shear stress, the railway axle material is prone to fatigue damage. Defects in the axle press-fit area can only be detected by using ultrasonic testing methods, with ultrasonic probes coupled to the axle journal, the...
In this paper, a novel structure named as quasidouble silicon-on-insulator metal-oxide-semiconductor transistor (SOI MOSFET) is proposed. Compared with the structure of normal SOI MOSFET, ultrathin oxide layers and p+ wells are added under the source and drain regions, which successfully isolate the source and drain from the buried oxide (BOX). The ultrathin oxide layers prevent the leakage current...
From the varying threshold voltage of MOSFET caused by the external factor, this paper analyzes the variation tendency of amplifier's gain. It makes clear how the gain of three different amplifiers changes in theoretical. After that, EDA tools are utilized to verify the theoretical calculation. The theoretical and simulation result show that threshold voltage(Vth) is a sensitive parameter of amplifier's...
A systematic design methodology, composed of a BW/gain model and an offset modeling mechanism, is proposed for high-speed interpolation/averaging ADCs. The methodology is able to conduct a systematic analysis and reaches an optimized ADC design with given specs (i.e., resolution, speed, input range, power, input CM, etc.). It shows significant advantage over the traditional trial-and-error ADC design...
This paper investigates the reliability of junctionless MOSFETs based inverter by 3D TCAD simulation. The results show the I–V behavior of junctionless SOI-MOSFETs is highly resistant to accumulated fixed charge in oxide. Then the performance of junctionless device-based inverter is discussed. VM of juncitonless device-based inverter maintains within 0.05V and the transient response time shows very...
As a basic logic unit of integrated circuit, the stability of parameters of inverter have a direct effect on the performance of system. This paper starts from parametric drift of traditional inverter caused by the variation of threshold voltage of MOSFET. Then a new parametric drift-resistant inverter is proposed. This structure utilizes compensation circuit to solve parametric drift such as the decrease...
The reliability of UHV transmission system is important to the power grid and live working technology is a key method to cope with line components defects or fault without outage plan. In order to satisfy the design requirement of the UHV compact transmission lines, and to provide parameters for live line maintenance on those transmission lines, the air gaps switching impulse voltage discharge tests...
The emerging security analysis challenge in big data environment is getting more attention of security industry and research institute. The current problems are mainly about the volume of security data and the understanding of the data. To solve the problems, we should employ the big data technology, and meantime, consider the semantic processing methods. In this paper, we combine the big data processing...
The safety operation of UHV transmission lines is important to the power grid and live working technology is a key method to cope with line components defects or fault without outage plan. In order to ensure the safety of live line workers and electrical equipment, the workers entering into equal-potential must select proper accessing path and satisfy the requirement of minimum complex gaps. Live...
110kV Composite Material Pole has many advantages over traditional steel towers and concrete poles to enhance the operation reliability of power system. The grounding methods has obvious effect on the phase-ground insulation performance of composite materials pole of 110 kV transmission line. Four grounding methods of 110 kV composite materials pole were investigated in this paper, which including...
Wind farm connected to local power system through VSC-HVDC is better than AC transmission, but harmonics current from converter station will have effect on electromagnetic environment around both AC and DC transmission line. This paper presents a method to evaluate overhead transmission lines magnetic field harmonics produced by harmonics currents which are from PWM based converter stations of VSC-HVDC...
With the rapid development of mobile Internet, the number of mobile applications has increased rapidly. How to protect the copyright of mobile applications is one of the most critical issues in nowadays. Software control flow obfuscation is a wildly used technique to protect the copyright of the software. In this paper, we proposed a control flow obfuscation method for Android applications. The proposed...
Industrial control system(ICS) is floorboard of control system in industrial production. With the transformation and upgrading of ICS, more IT technologies are used in it. The security problem has been paid more and more attention in recent years. In this paper, we proposed a fuzz test based method to detect the malware in the industrial control systems. In the proposed method, we use the configuration...
Automatic deviation control and straight drilling is one of key technologies to ensure the drilling quality during vertical wells drilling, which requires systemic design and analytical theory for the automatic vertical drilling tool. The suspension structure design of rotation control shaft with fully seal has been adopted in the automatic vertical drilling tool based on force pushing principle....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.