The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we proposed a dual flit transmission rate (DFTR) router architecture according to the property of short distance for the inter-wafer links for 3D Network on Chip (NoC). The equivalent bandwidth of the inter-wafer links can be N times wider than that of the intra-wafer links, since flit transmission rate in vertical direction can be N times fast than that in the horizon direction. Thus,...
Based on experiments, the influence of different characteristic of the aperture on shielding effectiveness of enclosure with the frequency was analyzed by the multi-point average measure method and the effecting factors which influence the shielding effectiveness (SE) of enclosure were discussed in this paper. The results of experiment were analyzed separately by the equivalent dipole method (EDM)...
Cloud computing, a new thing which is only three years old, becomes the most fashionable technology and developing trend in IT industry now. People say “X as a service” in the cloud computing, which means that everything including software and hardware can be taken as a service for consumers in the cloud. Meanwhile, a high quality multimedia conferencing has been an urgent requirement these years...
at the present time, the increase of e-mail spam are heavy to cumber and the spam are vastly spread. These spams cause various problems to the Internet users, such as full incoming mailbox, and wasting time. Therefore, tremendous methods have been proposed but most of them have limitation in the mapping feature and processing time. This paper proposed a method that can detect a set of image e-mail...
This paper analyzed the problems of the level of service in a large-sized passenger terminals, pointed out the factors and the relationships among the level of the passenger services of the organization classification, and used the software Legion to conduct a simulation study on free traveling interval, considering the coefficient of self-organization, determined the standards for classification...
High-fidelity video coding tends to adopt the RGB coding, which directly reduces RGB inter-color redundancy without external color space conversion. This paper presents a region based inter-color prediction scheme for RGB signals, which treats G component as primary component and predicts B/R component from G component with different translation offsets based on different texture regions. Experimental...
Market competition of the domestic mobile communications industry is increasingly fierce, with more emphasis on customer-centered perfect customer relationship management and on that the explosive growth of customer data needs the support of data mining technology. This article introduces the connotation of customer relationship management and data mining, analyzes the necessity of the application...
In this paper, we proposed a self-renewal hash chain scheme based on fair exchange idea for the first time. Our authentication scheme is mainly concerned about the shortcomings of the traditional hash chain schemes. It combines with OTS(One-Time Signature) so as to realize mutual-authentication, anonymous-authentication and self-renewal of hash chain simultaneously. From the results of analysis, we...
Since asynchronous logic adopts a distributed control scheme, the traditional methods for handling hazards in synchronous processors cannot be directly applied to asynchronous processors. Recently, the data hazard detection table (DHDT) scheme has been regarded as an effective method for handling data hazards in asynchronous processors. In this paper, two asynchronous data hazard handling schemes,...
In this paper, we presents a new nonlinear iterative learning control law for a class of nonlinear systems, denoted NP-D-INP-D, which is composed by limiting the action of error in PID learning law, that is, use a bounded nonlinear function of error instead of error, and adding a differential feedback in the integrator of PID learning law to inject the suited damping. By using Bellman-Gronwall lemma,...
Ethyl acetate (EtAc) is mainly used as solvent in paints and coatings industry, inks production and as industrial solvent in many other branches of industry. Esterification of acetic acid with ethanol may be performed to synthesize ethyl acetate. In this paper, a reactive distillation (RD) column with packing cation exchange resins as a catalyst is applied. Mathematical models of reactive distillation...
In order to overcome the heterogeneity of models and support concurrent work, a flexible, multidimensional and integrated model, which stores design information of different engineering domains, is proposed in the paper. The integrated model (DMP) describes design information from three dimensions including the definition of product/component (D), the process of the development (P) and the methodology...
In recent years, wireless sensor networks (WSN) have a wide application prospects. So it has attracted great interests in several related research fields and industries. Based on the characteristics of DV-Distance and centroid location algorithm, a novel hybrid localization algorithm based on DV-Distance and the twice-weighted centroid in wireless sensor network is proposed. The main principle of...
Battlefield damaged equipment repair ordering is a key problem in equipment maintenance support decision-making during wartime. The model of battlefield damaged equipment repair ordering was established by analyzing the factors affecting repair ordering and classifying those factors in detail according to the theory and method of MADM. Thus the objective information of battlefield damaged equipment...
A tension adaptive variable-structure control system was designed for constant tension of electric cable plastic wrapping automatic production process. This system contains two inner loops for current and velocity control using PI regulators; its outer loop is for tension control using model reference adaptive controller. Simulation results indicate that the adaptive variable-structure controller...
Deniable ring authentication allows a member of an adhoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot convince any third party that message m was indeed authenticated. Most of the proposed deniable ring authentication schemes's signature size is dependent linearly on the number of ring members which causes inefficiency...
Adaptive allocation brings adaptive approaches in pursuit of sustainable social resource use and social-ecological information resilience. However, a lack of evidence from consistent evaluation of adaptive allocation exacerbates the doubt of this allocation. This paper revisits the issue of evaluation in information resource allocation and recasts it in light of complex adaptive systems thinking....
Prediction of regional logistics requirement provides a basis for the plan of regional logistics. In the study, support vector regression is presented to predict regional logistics requirement. The regional logistics data from 1996 to 2006 in Shanghai municipality are used as the application data of support vector regression. The comparison of prediction error between BP neural network and support...
The morbidity and mortality of human is associated to the concentration of inhalation air particles, the smaller particles diameter, the more harmful to human body. In this paper, the exhaust particles number emissions and size distributions of diesel engine with urea Selective catalyst reduction (SCR) after-treatment system were studied. The results of the engine bench test indicated that the number...
This paper presents an FPGA implementation of Advance Encryption Standard (AES), using Minimal Instruction Set Computer (MISC) with Harvard Architecture. With simple logic components and a minimum set of fundamental instructions, the MISC using Harvard Architecture enables the AES encryption in severely constraint hardware environment, with lesser execution clock cycles. The MISC architecture was...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.