The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MATLAB/Simulink is a very efficiency tool to study algorithms on base band signal processing of high-dynamic Global Positioning System(GPS) receiver. The key performance of high-dynamic GPS receiver is realized by the technology of automatic frequency control (AFC) after taking carrier assistant code tracking loop. The paper took the signed cross-product and dot-product automatic frequency control(SCPDPAFC)...
In this paper, we present the concept of a PCI-based GPS receiver architecture with the aim of providing a platform for investigating new receiver architectures and algorithms for current and upcoming GNSS receivers. We designed and implemented the RF front end, the baseband signal processing module and the PCI interface circuit, which compose a GNSS receiver. The work of hardware testing was carried...
Being an evolution of IEEE 802.16e, IEEE 802.16j mobile multi-hop relay (MMR) is proposed to gain coverage extension and throughput enhancement. Although the IEEE standard 802.16j-2006 has not been published yet, the second version of 802.16j Draft Standard (802.16j D2) has been released in 2007. In this paper, for the first time, we evaluate the MAC performance of the Draft Standard based on the...
This paper focuses on the avionics task partition scheduling under the FP-EDF scheduling strategy in which the operation system adopts fixed priority strategy and each individual partition adopts dynamic priority scheduling strategy. For the partition task worst-case response time, a more exact analysis algorithm was addressed through checking each release of tasks during the partition busy period...
The key consideration in heat treatment model is phase transformation kinetics under non-isothermal cooling. In this study, a program is developed to predict austenite transformation by kinetics model under non-isothermal conditions. For doing so, the classical additivity rule and Avrami-type rate equation is evaluated to handle the phase kinetics under non-isothermal conditions. And comparing with...
The blind separation of audio signal is an important application of blind signal separation technology. The traditional separation algorithm based on neural network is analyzed first in this article. The shortage of it is easy to fall into local minimum, and it causes the limitation of convergence slowly and separation results inaccurate. Then, a separation algorithm is designed with genetic algorithm...
In view of TCP/IP stack, this paper analyzes the advantages and disadvantages of two popular UTM solutions. A new architecture of NetChannel UTM based on the NetChannel technology is proposed, which consists of user-space and kernel-space. And their structures are designed separately. At the same time, between their program flow charts and open-user-interface are given, which efficiently solve the...
Ubiquitous computing environment comprises mobile users, system services, system resource, and sensors embedded into physical environment. The ubiquitous, dynamic, invisible, and open nature of these environments introduces challenging security issues that demand new technical approaches in access control. The exiting access control model for ubiquitous computing environment are lack of context-based...
The MVC design pattern which can weaken the coupling among the different application tiers and make the development and maintenance become simpler, and it has been popularly used in designing Web-based J2EE application. Whereas the application scale is larger and larger, traditional MVC pattern exposes some disadvantages. To meet with the development of application, the pattern should be extended...
The most efficient attack on symmetric-key systems is an exhaustive key search. A novel encryption method with infinite key space is presented by modify traditional book cipher. Infinite key space means the unbounded entropy of the key space, which can frustrate any exhaustive key search. Moreover, this book cipher is immune from frequency analysis. Experimental results show that both encryption and...
The increasing use of multi-database technology has led to the development of many multi-database systems for real-world application. Large companies may have to confront the multiple data-source problem,so multi-database mining has been an important research area. Negative association rules (NARs) play important roles in decision-making. But nowadays the techniques of NARs mining focus on mono-database...
Utilizing the advanced mobile technology and the space location information technology, we design to achieve the sharing of resources and data transmission, through computer and other mobile terminal equipment in the wireless environment. Integrating GIS, GPS, mobile communication and computer network technology, realize the mobile informationization of the industry and public information service...
The publish/subscribe communication paradigm is receiving increasing attention in distributed networks, in which routing strategy is one of the key issues. Many existing routing strategies are filter-based routing and multicast-based routing; they have obvious improvement in network efficiency. However, there are some shortcomings in implementation cost and system load, therefore they are not mature...
All of the existing threshold signature schemes cannot withstand conspiracy attacks. Its reason is that the secret of any subgroup shares is the group secret key, and any t or more group members can cooperate to reveal the group secret key with high probability. Therefore, any subgroup can forge the valid signature stand in other subgroups; the design of an efficient scheme is remained open. Lu et...
Nowadays, owing to the accelerated growth in the development of information technology, the aviation industry plays a prominent role in Chinese economy. Therefore, the accurate prediction for the number of international airlines helps in making major decisions in technological reform. In order to analyze the number of international airlines in China efficiently, in this paper, fuzzy adaptive PSO algorithm...
The Aiming at the lack of an agreed and standard modelling technique of safety workflow management systems, A model of uniform Petri Net for safety workflow management is presented based on Petri Net, in which the four patterns of sub- Petri Net along with algorithms are proposed to model resource allocation and assignment decision, a set of composition rules are proposed to guarantee that the patterns...
This paper firstly introduced the traditional LSB information hiding scheme, then proposed an improved LSB algorithm. This algorithm implements the information by many kinds of transformation. Theoretical analysis and experimental results demonstrate that the information hiding scheme can effectively resist both RS and statistics analyses, and improve the security of traditional LSB scheme.
Multicast provides an efficient mechanism for a sender to send messages to multiple receivers simultaneously. Designing secure and efficient key agreement schemes is the key requirement of realizing dynamic secure multicast. In this paper, a new identity-based key agreement scheme for dynamic multicast groups using bilinear pairings is proposed. The procedures of secret communications between subgroups...
This paper puts forward a novel method using dynamic programming and grey relational analysis to find a best seam line because of the grey scale difference in the edges of image in the overlapping region and the relation of neighboring points. The first step is to find an optimal seam line to stitch the images. Then the seam line is removed by a hard correction method based on dynamic width. Finally,...
Peer-to-peer (P2P) systems can be classified into two categories: unstructured and structured. A crucial requirement for practical structured P2P systems is that they should be able to cope with system splitting and merging. To address this issue, we first present a randomized and fault-tolerance broadcast algorithm called RBA. It can inform all nodes in P2P system of splitting or merging. We analyze...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.