The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using phase change memory (PCM) as main memory for embedded systems, such as Beidou navigation terminals, has many advantages, such as non-volatile, energy saving, anti-crack and so on. However, the problem of write operations needs to be solved to prevent premature failure of the PCM chips. In this paper, the data allocation problem of a hybrid PCM and DRAM main memory in Beidou navigation terminals...
seL4 is formally verified for its functional correctness and its kernel modules provide strong support to achieve interprocess communication mechanism. In recent years, some scholars designed Interprocess Communication Systems with library-based architecture. This design abandons Message-Passing technique that most of microkernels adhere to. The present research still insists on the Message-Passing...
Physical limitations for CMOS technology have provided the way for manufacturing the quantum cellular automata technology-based hardware elements at Nano level. From the purpose of very high speed, area and low power consumption, this Nanotechnology has been taken into consideration. Improving their structures will lead promoting the system performance completely, because the Full adders are assumed...
The reliability of conditional probability systems refers to the fact that a system operates properly in timeframe [0, t1] provided that it was healthy at the beginning of the timeframe. Enhancing the reliability of the operations of computer systems is possible by implementing fault tolerability. Fault tolerability in a digital system can be obtained through redundancy in hardware, software, information,...
A detection of moving object using Zernike moments comes up in this paper. First of all, the Zernike moments are introduced briefly. Then the algorithm of moving object detection using the Zernike moments is elaborated, after that it presents the performance evaluation. After the testing results, we get that the Zernike moments could reduce more noise compared with the Gaussian Mixture Model [1].
This paper firstly introduces the definition and types of wavelet transform. Then we introduce the Mallat decomposition and reconstruction algorithm in detail. Secondly, after comparing the advantages and disadvantages of several Better Method, we choose wavelet thresholding and make improvements of that. At last, we compare the SNR of the signal de-noising by matlab simulation analysis to prove the...
Long Term Evolution Advanced (LTE-A) is the fourth generation (4G) wireless cellular communication standard. A covert channel is a noticeable threat to network security because it is able to transfer data under the overt channel. In this paper, a new class of covert channel coined as SNsteg is proposed, designed for LTE-A system. The SNsteg peculiarly utilizes the feature of Sequence Number (SN) fields...
Network Virtualization allows multiple tenants share physical network resources flexibly. As a newly emerging architecture, Software-defined network (SDN) decouples the control plane and data plane, realizes the efficient control of network traffic. The emergence of SDN provides network virtualization a new solution for virtual network deployment. One of the most challenging issues, called Virtual...
Multimedia streaming applications have high throughput requirement and stringent Quality-of-Service (QoS) guarantee. In this paper, we aim at designing a novel transmission and retransmission scheme, which integrates both the Network Coding and the Superposition Coding for wireless video broadcast networks by packet-erasure channel. Specifically, the Scalable Video Coding (SVC) technology is introduced...
A novel divide-by-4 injection-locked frequency divider (ILFD) is provide and was manufacture in the 0.18 μm 1P6M CMOS from tsmc. Conventional harmonic mixer divide-by-4 ILFD has limited locking range; this letter shows a wide locking range divide-by-4 ILFD designed with linear mixer technique. At incident power of zero dBm and at the drain-source bias of 1V, the locking range of the divide-by-4 is...
A novel divide by five injection-locked frequency divider (ILFD) is suggested and was manufacture in the 0.18 μm 1P6M CMOS from tsmc. Normal harmonic mixer divide-by-5 ILFD has finite locking range. This design proposed a wide locking range divide-by-5 ILFD, which is lean against voltage-controlled oscillator (VCO) by a capacitive cross-coupled. Resistors are included in the resonator to prolong the...
During recent years, Peer-to-Peer (P2P) Content Sharing Networks (CSNs) have intrigued researchers to measure and analyze them for the dominant proportion of P2P traffic volume and wide applications of the sharing platform. However, to the best of our knowledge, most of the measurement tools have not been updated under the current situations of P2P CSNs. In this paper, we develop an enhanced measurement...
The grey forecasting model has been successfully used in many fields. But it still has some defects. Research has found that the problems of the conventional grey prediction model in the background value and the boundary value have great influence on the accuracy of prediction result. To address this problem, a combinatorial optimization method is proposed in this paper. Firstly, to overcome the shortcomings...
For large-scale, high-dimensional, sparse categorical data clustering, compared with the traditional clustering algorithm, CLOPE has a great improvement in the quality of clustering and running speed. However, CLOPE algorithm itself also has some defects in clustering quality stability and does not distinguish the attribute clustering contribution between dimensions, besides, it needs to specify rejection...
Influence is an important part of social network. After the appearance of online social network, the data could be analyzed conveniently. Based on the influence of important nodes and communities in the network, a new influence modeling method which is based on twin support vector machines is proposed. Also the uncertain query technology is applied to search the key nodes. The new methods are used...
In this paper, aiming at discretizing continuous-time systems, a new formula of the improved finite difference, Zhang finite difference (ZFD), termed 4-instant g-square finite difference of subtype L (4IgSFD_L) is proposed with g denoting the sampling gap. The derivation and the corresponding numerical experiments of this new formula are also presented. Based on Taylor series expansion, the finite...
The popularity of the Internet has changed everything about the radio industry. With the deep integration between the radio and the Internet, the radio industry has faced great challenges to organize the large-scale audio dataset, build an flexile architecture, and recommend highly personalized content to users. To address these problems, we realize a lightweight web application of the Internet personalized...
Dempster-Shafer Theory has been extensively employed in the field of information fusion due to its impressive capability to cope with uncertain information. But when it deals with completely conflictive evidences or highly conflictive evidences, the phenomenon of counter intuition will occur. In this paper, shortcomings of the commonly accepted measure of conflict are analyzed and to avoid the wrong...
Infrequent itemsets are very important because many valued information can be mined from them. 2L-XMMMS model, which has been mentioned in previous studies, can mine infrequent and frequent itemsets by assigning two different minimum supports to every item. But it is based on Apriori algorithm and its efficiency is not high. To improve its efficiency, we use the FP-Growth algorithm instead of Apriori...
The relation of knowledge is vividly represented by hypergraph in big knowledge base. In this paper, hierarchical quotient space theory in granular computing model is applied to weighted hypergraph, so uncertainty inference of knowledge in big knowledge base is converted to the optimal path approximate of weighted hypergraph based on granular computing model. Thus, the complex degree of solving problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.