The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Unmanned aerial vehicle(UAV) often flies in close proximity to terrain. The expansion in the number of low-altitude flight operations, along with increased operator workload, have made controlled flight into terrain the number one cause of loss of UAV. This paper is to give an overview of the Automatic Ground Collision Avoidance System (Auto-GCAS) program attempt to provide a system to eliminate that...
In order to obtain the higher roll off of energy spectrum of base-band symbol signal, through the application of the minimum frequency out-band energy exposure guidelines, establish an optimized base-band symbol signal mathematical Pan function model, at the same time, add the restrictions on boundary conditions of symbol, base-band symbol signals energy and signals PAPR on the mathematical pan function,...
This paper studies the effect of moisture stress on insulation resistance (IR) failures of printed circuit board (PCB) for numerical control (NC) purpose under the temperature-humidity-bias conditions. A characteristic of the IR failures is a series of intermittent IR drops, which can severely affect the reliability of NC assemblies. In this paper, all the test multilayer PCBs for NC purpose are subjected...
Based on the HART protocol, the intelligent temperature transmitter takes microprocessor (MSP430F1611) as the core. In this paper, the development, the definition and the function of HART protocol are introduced. In according to the design and requirements of the HART protocol communication module of the intelligent temperature transmitter, based on the chips of the HART modem (HT1200) and loop-powered...
This paper proposes a protection mechanism utilizing Hamiltonian cycle based on slots. Numerical simulation shows the proposed scheme achieve higher level of survivability for the traffic in the Elastic Optical Networks.
A three-dimensional mathematical model is developed for a kind of micro heat pipe with fiber wick. The effects of phase changing, the contact angle, gravity, and heat conducting between the fibers are accounted in the model. The governing equations are formulated in the control volume and calculated by iteration. The calculated results of the model present the velocity of the working material and...
The performance of embedded systems is determined by many factors. The method of memory management is an important one of them. In this paper, three software optimization methods of memory management are discussed based on ARM embedded system and embedded Linux. Setting memory access permissions in system initialization improves the reliability of the embedded system. Using FCSE (Fast Context Switch...
In order to solve knowledge ambiguity, dynamic, dependence and uncertainty of agriculture production, this paper using computer modeling and visualization techniques, combined with artificial intelligence, database, intelligent information systems, decision support systems and network technology development of ginseng production intelligent decision-making system, and applied to the field of ginseng...
General aircraft makes life more convenient, yet at the same time poses huge threats to public security. As the detection of low slow small(LSS) target is currently still an international challenge, this paper, based on the multi-living agent (MLA) information system theory, ventures to offer a new perspective in the design, the construction method, and the key performance indicators of the LSS target...
By using the hardware TPM in the client end, anonymous identity protection can be achieved to get higher security and better privacy protection. Combining EAP-TLS protocol and ECC-DAA scheme organically, a new anonymous authentication protocol for WLAN is proposed. As Brickell's and Li's ECC-DAA is more efficient and reasonable than other existing ones, of which the Join protocol and Sign protocol...
A prototype wireless torque measuring device is designed to measure high-speed rotation torque. The aim of this gadget is to measure torque in harsh environment where physical contact is not possible or very difficult. The gadget is very helpful in new era of wireless industrial applications. It is a non-contact and low power consumption gadget. It is based on wireless ZigBee protocol and very smart...
One of the most primary methods of hydroacoustic fisheries resource evaluation is echo integration method, which uses the echo strength integral value of the fish school in a sampling volume divided by the of a single target to get the number of fish. But the target strength of fish school will change with the changes of detective signal frequency, species and length of fish, even the azimuth that...
A portable 3D laser scanner based on laser triangular principles has been developed to increase the accuracy and reliability of surface flaw measurements. The instrument optically scans a 4X4 cmsurface area in under 2 seconds. Resultant data can be sent to a laptop PC via Ethernet transmission. A program running on the PC detects and calculates the dimensions of the flaws, and displays a 3D image...
With the growing communication requirements of users, integration of various kinds of networks has become an inevitable trend. However, it is still a problem how to guarantee the QoS requirements, measure the performances of each sub-network, while making a reasonable network selection. In order to solve this problem, a SNR-based access algorithm in CDMA/WLAN heterogeneous networks is proposed, by...
Through calculating ranger electron reconnaissance satellite surround earth, two phase-control antenna beam departure normal angel, established many weather conditions satellite to multifunction phased array radar main lobe and side lobe beam intercept model, on the base, completted intercept simulation of electron reconnaissance satellite to multifunction phased array radar, plotted intercept effect...
In cognitive radio network (CRN), traditional energy detection algorithm has a bad detection performance in fading and shadowing environment. So cooperative spectrum sensing among cognitive radio nodes is needed in order to overcome these drawbacks. However it will result in a large demand of communication bandwidth on the control channel when the number of the nodes is great. To this problem, this...
Low-Rate Denial of Service (LDoS) attack has been a hot topic in network security area in the last decade. LDoS flows are affected by the dynamical environment of the Internet, making it difficult to understand the behaviors of LDoS flows at the receiver side. In this paper, we studied the impact of end-to-end delay on LDoS flows in order to provide a foundation for detecting and defense of LDoS attacks...
Transmitter and receiver homologous system, which contains down-conversion, A/D sampling, digital signal management, D/A recovering and up-conversion, effect the signal passing through the system. This paper presents the corresponding signal transmission model of the system, analysis the influence of phase noise on the signal, and deduces the formula for the first time that describing signal changes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.