The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel approach of acceleration estimation via Time-Frequency image of GPS carrier signal, and the Time-Frequency images are generated by the Wigner-Ville distribution. In TF image, the time-frequency uncertainty is restricted around instantaneous frequency curve in a few number of TF image pixels. Hence by reasonable parameter configuration, the acceleration estimation precision...
In this paper, we propose a method to estimate muscular fatigue in exercises with load fluctuations. Muscular fatigue is an important property when evaluating the state of a muscle. However, it is extremely difficult to apply general methods, which depend on the relative changes in the signal power or frequency characteristics of a surface EMG, during exercise. We define two qualitative factors of...
The complex spatial and temporal behaviors of long-term solar magnetic activity are an important aspect in solar data set analysis, however it is not an easy work in practice owing to its complex features of solar dynamo process. This paper can improve our knowledges on periodic variations of F10.7 radio flux and sunspot areas by determining the phase relationship between periodic identification and...
Interconnection networks are essential elements in nowadays High Performance Computing (HPC) clusters, which must meet the urgent requirement for fast and reliable communication from the HPC applications. As a consequence, the network performance have a great influence on the overall system one. However, traditional routing mechanisms and load-balancing approaches cannot make efficient use of the...
We propose a class of almost rate-1 construction for 2n-bit hash functions, based on (2n, n) blockciphers, where 2n is the length of the cipher key and n is the cipher block length. These hash functions we proposed are proved to be optimum collision resistance and preimage resistance in the ideal cipher model. The hash rate of the construction is l−1/l where l is the number of cipher calls in the...
The Einstein-Podolsky-Rosen(EPR) steering is a manifestation of the quantum correlation in quantum systems. In this article, we adopt moment matrices, which are proposed by Kogias et.al. in [1], to calculate the steering of quantum states. Firstly, we show that moment matrices are superior to Clauser-Horne-Shimony-Holt(CHSH) inequalities when applied to Inept states. Secondly, we use the method based...
Localization technologies are important for lots of potential location-dependent applications. Many localization methods have been put forward for wireless sensor networks. Most of the localization methods are suitable for some special areas or situations. In order to localize in whether outdoor or indoor areas, as well as improve the localization accuracy without increasing the complexity and cost...
Network protocol binary software is threaten by vulnerabilities. Current analyzing methods do not make full use of the interaction information in network protocol and do not treat both sides of network protocol as a whole system. This paper proposes a novel method based on joint symbolic execution to test synchronously both server and client of the whole network protocol binary software stacks. Moreover,...
Packet-level forward error correction (FEC) codes are widely studied to protect real-time video transmission over unreliable networks. The performance of FEC improves with the FEC coding block size when the number of redundancy packets is determined. But for real-time video transmission, the decoding delay which it leads to cannot be tolerable. Besides, the packet loss in one frame affects not only...
In the open network environment, the strange entities can establish the mutual trust through Automated Trust Negotiation (ATN) that is based on exchanging digital credentials. However, the current negotiation takes it for granted that the process of negotiation is about two negotiations. In the open network environment there may be several one want to establish trust, so multi-party will negotiate...
Technology prevalent in networks today logically detaches the control from the data plane yet physically deploys them on the same device on all network devices. This has negatively resulted in expensive management of disparate and closed network devices and the inability to implement coherent, synchronized, and wide-ranged network policies. Software Defined Networking (SDN) solves these issues by...
Because there are too many types of errors occurred in a multi-software integrated platform, such as Integrated Decision Information System (IDIS). It is urgent to design an error searching system to solve all different problems. However, those errors belong to different stages like setup, configuration, and operation, or those errors may occurred in different services, applications, or IP ports,...
With the rapid development of mobile application markets, smart phones and mobile devices are more and more popular and widely used. However, at the same time that brings more disadvantages to users such as the probability of user information leakage is higher. Among any other threats, Android application cloning has brought tremendous risks to the market environment. It is not always feasible to...
A Distributed Key Generation (DKG) protocol is an important part of distributed encryption system, which allows a group of participants to generate a private key and a public key, but only the authorized subset of participants can reconstruct the private key. However, the existing DKG based protocols are assumed to be the same as the participant level. To this end, a Birkhoff interpolation algorithm...
In this research, the ontology is used for the description of educational resources cloud services, and the description, integration, management and retrieval of cloud services of educational resources, both for achieving communication and interoperability between the cloud of educational resources, and providing an engineering reference and reuse for building for some specific educational resource...
The advancement of computer technology had made new tools available that have the potential to enhance students' comprehension and engagement in the English as a medium of instruction (EMI) settings, thus aiding EMI both from a theoretical and a practical perspective. The perceptions of the effectiveness of computer technology were investigated from the perspectives of 292 students at three Taiwan...
The reasons for the decline of the concurrent multipath transfer in the heterogeneous networks are analyzed in this paper and a data distribution algorithm which is applicable to the heterogeneous networks is proposed. The Kalman filter algorithm is used to assess the propagation delay, so that the uncontrolled propagation delay can be predicted in the heterogeneous network. After the path sending...
The ability of narrative would effect on the language, logical thinking, and organizational skills for children, and stimulate children's creativity. We take the objective of “how to narrate a good story” for school-age children to develop a digital storytelling system-children version (DSTS-C), which could be operated by school-age children independently and prompt children to create a whole story...
Air conditionings (ACs) as a typical demand response (DR) resource play an important role in providing ancillary service for the grid. The detailed modeling process of the aggregated model of ACs is given firstly and it comes a conclusion that the previous models can't track the dynamic behaviors of ACs when the dispatch period becomes longer. In order to improve the modeling accuracy at longer dispatch...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.