The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the current information system which is highl dynamic, heterogeneous and distributed, it is necessary to realizing information-sharing and interoperation among multi-trust domains securely by a crossing single-domain restriction. This thesis analyses the basic idea of the IRBAC (Interoperability Role Based Access Control) 2000 model, then points out several existing problems in them, which are...
In the distributed data transmission, UDP protocol is commonly used by a large number of applications because of simple mechanism, small transmission delay and high transmission efficiency. For subsequent data-processing needs, UDP packet data transmitted between distributed applications are often stored and searched, especially in various simulation systems. Considering above requirements, this paper...
According to development requirements, a standardized management system is mainly used in basic information management files, file statistics and query management, file lending management. Development files for standardized management system that school personnel more efficient file management functions within the scope of work documents, files, archiving and management, promoting the school to improve...
For the complex problem of cascade hydropower system optimal scheduling, a novel grouping differential evolution algorithm (GDE) is proposed in this paper by hybridizing differential evolution (DE) and shuffled frog leaping (SFL). In the proposed algorithm, the population is periodically executes grouping and shuffling operations, and the individuals are updated according to differential evolution...
Bit-interleaved coded modulation with iterative decoding (BICM-ID) can achieve better performance than BICM in both AWGN and Rayleigh fading channels because of the feedback algorithm. However, some existing decoding schemes in BICM-ID cannot perform well in both computational complexity and decoding performance. The Max-Log-MAP algorithm has lower computational complexity with worse decoding performance...
In order to improve analog circuit recognition, combined KPCA and SVDD, put forward one scheme of analog circuit state recognition based on KPCA-SVDD. Firstly distill characteristic of the outputs voltage signal by KPCA, taking the energy as the eigenvector of state recognition, Then adopt the SVDD categorize method to establish SVDD model of different state, carry on circuit state recognition, Finally...
In this paper, an integrated loading model of ultrasonic transducer is established to explain the phenomenon that different tissue loads have different effect on resonance frequency of ultrasonic transducer. Mechanical loss of ultrasonic transducer is taken into consideration in the model and mass-spring-damping tissue model and contact impedance between ultrasonic transducer and tissues are given...
This paper analyzes the European Digital Video Broadcasting Standard. According to the complex program and terrestrial broadcasting channel spectrum allocation, it proposes a synchronization scheme for HDTV COFDM transmission system which is suitable for the condition of our country. The correspondent FPGA hardware circuit through testing process in the functional HDTV proves the excellent performance...
This paper presents a sufficient condition for the global asymptotic stability of the equilibrium point for bidirectional associative memory (BAM) neural networks with variable coefficients. The results impose constraint conditions on the network parameters of neural system independently of variable coefficients, and they are applicable to all bounded continuous non-monotonic neuron activation functions.
In this paper, we consider the generalized variational inequality, to obtain its convergence theorem, we introduce iterative algorithm with infinite nonexpansive mapping to find approximate solution of the GVI (F, g, C). Strong convergence theorems are established under some suitable conditions.
Ultrasonic transducers are widely used in many fields including manufacture and medical. In order to transmit maximal ultrasonic power to an acoustic load in ultrasonic surgery system, measurement of ultrasonic transducer is of great importance. In this paper, performance of ultrasonic surgery transducers with different loads of water and pork bone, pork soft tissues like liver, muscle were measured...
On the question how to control the transformation of dynamic PDM(Product Document Management, PDM) document, the following questions in the auto parts PDM system based on Browser/Server structure are detailed discussed, such as PDM document transformation mechanism, PDM document course modeling, the instance of the model, and realization of PDM document management. And then a set of PDM document management...
Combined with the Java language features, the paper proposed project-driven teaching model, and in-depth study of the mode of teaching the design principles and teaching of design and implementation. The evaluation of teaching in project-driven mode of teaching effectiveness achieved. Java language is very popular object-oriented programming languages. Because of its many features are widely used...
As image noise has an effect upon the consequent results of image, it is necessary to denoise image before the following pretreatment. In order to overcome the disadvantages of traditional median filtering algorithm, an adaptive layered median filtering algorithm was proposed in this paper. To begin with the algorithm adopted the concept of block division to discriminate and demarcate salt & pepper...
this article gives weight to the study of the environmental pollution degree caused by heavy metal and the finding of the pollution source position. First of all, we rank the pollution degree by the geo-accumulation index, regard it as the assessment set, establish fuzzy relation matrix, and get the comprehensive evaluation results in order to get the pollution degree in different functional areas...
This paper introduces a data collection system that uses wireless communication components PIC16F877 and GPRS to transfer and capture the data remotely. The key data collection terminal is insisted by a micro controller named PIC16F877 which is responsible for controlling several parts such as LED screen, MC39i working in GPRS as well as various data operating modules. MC39i is responsible for sending...
We present a system for free-form surface modeling and editing that allows a user to create a surface and modify a shape by shaded image using stroke-based drawing tools. After user input sketch contours, smooth distance fields are computed, then translated into height fields. A closed smooth surface is created by the contours and the inferred height fields. Further, user can editing surface by sketched...
In order to solve the reliability of multicast communication in Wireless Ad hoc networks, proposes a fault-tolerant multicast protocol, adds a multicast fault tolerance in the network layer and application layer, and has been verified by experiments in reliable packet delivery, port to port delay control, error control with good results.
There are many factors that lead to the failure of automotive engine crankshaft back oil seal, these factors include seal working condition, seal`s material quality and seal`s technical parameters that directly affect the seal`s seal ability and service life. Aiming at the leakage problem of automotive engine crankshaft oil seal and basing on analysis of drain pump seal mechanism, I hereon elaborate...
By using centralized network intrusion detection system based on Snort, this paper expounds the constructing ideas and realization methods of Snort-based distributed intrusion detection system framework in networks. The tentative idea is to unify distributed detection and centralized management by the hierarchical distributed structure, and thereby effectively solve security threats that the campus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.