The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of RFID technology in logistics industry, the integration of RFID and business process becomes an important factor for RFID projects. In this paper, we study the issues of RFID application in third-party logistics and propose a component-based solution by integrating OSGi (Open Service Gateway initiatives) and jBPM (Java Business Process Management) technology. The paper...
The paper begins with introduction on the xen-based secure computer, the common data sharing methods and virtual disk access control. It puts forward a data sharing method based on virtual disk between guest OSs of Full-Virtualization in order to deal with the shortages of data sharing between virtual guest OSs based on Xen secure computer. It induces further analysis on the Xen driver split mechanism...
A new method of optimized path planning about smart card based on Dijkstra algorithm is proposed in this paper, for the path planning problem of China road charges. The IC Card Key Infrastructure and CRC check code technology of city uni-card system are combined in the algorithm, and the division with the shortest path using the minimum rate of fees is formed based on the recursive optimized and improved...
For video transmission over wireless or highly congested networks, video transcoding is typically used to reduce the rate and change the format of the originally encoded video source to match network conditions and terminal capabilities. Error resilient video transcoding can insert error resilient tools in the compressed video to enhance error resilience of the video over wireless channels by increasing...
Aiming at the problem of higher false positive and missing report rate in network intrusion detection, an intrusion detection method based on clustering algorithm is proposed in this paper. This method applies Fuzzy C-means clustering Algorithm to the detection of network intrusion. Through the building of intrusion detection model, carries out fuzzy partition and the clustering of data, and this...
Rough set theory has been successfully applied to many areas including machine learning pattern recognition decision analysis process control, knowledge discovery from databases. An algorithm in finding minimal reduction based on prepositional satisfiability (abbreviated as SAT) algorithm is proposed. A branch and bound algorithm is presented to solve the proposed SAT problem. The experimental result...
The novel translational meshing motor (TMM) has inherent torque ripple because TMM torque is highly nonlinear relationship between rotor position and phase current. The torque ripple of TMM drive system can cause undesirable acoustic noise and vibration. In this paper, a novel controller scheme for TMM is presented. The controller is based on an adaptive neuro-fuzzy inference system (ANFIS) and combines...
The paper propose a new non-linear dimensionality reduction algorithm based on locally linear embedding called supervised locally linear embedding in tensor space (SLLE/T), in which the local manifold structure within same class are preserved and the separability between different classes is enforced by maximizing distance of each point with its neighbors. To keep structure of data, we introduce tensor...
Cluster analysis based on Delaunay diagrams has been widely researched in all kinds of fields. In this article, a new method is proposed to treat with datasets of non-spherical and multi-density clustering. As well as, the problem of noise data is solved by defining the conceptions of In_Points and Out_Points in this method. The above points was illustrated by two simulation experiments.
The energy constraint bottleneck in the wireless sensor networks (WSN) exist objectively. To reduce energy consumption and ensure the Quality of Service (QoS) in data transmission, a method of solving the QoS multicast routing in WSN by quantum particle swarm optimization algorithm (QPSO). The algorithm is based on PSO, quantum-bit, principle of superposition and quantum gates. By the premise of avoiding...
This paper aims to develop a standard system framework for RFID application in logistics according to the existing application context within the industry. Following the mainstream standard development procedure, it begins with analysis of current RFID standard system for both home and abroad. After integrating it with RFID technology and existing domestic application status, it puts forward a standard...
In order to monitor the production condition exactly and real-timely in underground and surface of coal mine, a new mobile application solutions scheme based on TD-SCDMA in coal mine is proposed. According to the high speed data service of third generation mobile communication systems, the wireless network of surface scheme was designed by the C/S structure, which can provide mobile communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.