Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
On behalf of the Organizing Committee, I would like to welcome all of you to ICCASM 2010. This is a conference Co-organized by North University of China, Institute for Electrical and Electronic Engineers in U.S.A.(IEEE), and International Association of Computer Science and Information Technology (IACSIT), co-sponsored and supported Shanxi University, Taiyuan University of Technology, Taiyuan University...
For rapid modeling and simulation of MEMS, a MEMS component library consisting of beam, anchor, plate and gap is developed with Modelica. The hierarchy structure of this library are proposed. In order to show micro component's structure, pin definitions, parameters and behaviors of mechanical beam are analyzed and then the lumped parameter beam is modeled based on object-oriented method with Modelica...
Many information management projects of state own and large enterprises in China target in equipment management in recent years. There are some information technology points at this course, but those methods and software usually use the basic data and the traditional job processing control management, which can not meet the big professional equipment's demands. For this reason, this paper designs...
A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system, different from the traditional way which compresses the data first and then encrypts the compressed bit-stream later, can encrypt and compress the input plaintext synchronously. In this paper, an improved scheme using variable interval arithmetic coding and asymptotic deterministic randomness...
Power is a very important indicator in embedded system. In this paper, for decreasing the power of the embedded system, we use an efficiency method that does work in the code generate of compiler to solve the instruction scheduling and reordering problem. The instruction scheduling is a NP-Hard problem. For solving this NP-Hard problem, we design a proper power model to evaluate the power. And the...
Statistics shows Chinese people who own vehicles account for only 3% of the world, while the number of people died each year from traffic accidents in China accounts for about 15%–20% worldwide. Especially the traffic fatality rate is as 10∼20 times as the developed countries such as Japan and the U.S., less-developed rescue facilities is the main factor why fatality rate is so high. This article...
Directional sensor networks have been increasingly deployed in various contexts or environments such as banks, warehouses and museums. Directional sensors, in contrast to normal omnidirectional sensors, are characterized with limited sensing angles, and their sensing region is thus usually modeled by sectors. This paper considers the provisioned deployment of directional sensors for covering a fixed...
Independent component analysis (ICA) is a powerful tool for redundancy reduction and nongaussian data analysis. And, artificial neural network (ANN), especially the self-organizing map (SOM) based on unsupervised learning is a kind of excellent method for pattern clustering and recognition. By combining ICA with ANN, a novel compound neural network for fault sources recognition was proposed. First,...
In previous literature, most researches about auto-focusing technique have based on stationary object. This paper studies the moving target focusing based on image definition. This paper analyzes the image processing frame rate, image delay, focusing step how influence focusing speed and definition and establish the simulation model. Focusing system based on image definition criterion is designed...
The paper presents a Photovoltaic (PV) Inverter System based on TMS320F28027 that can not only achieve single phase DC/AC converting by a full-bridge inverter, but also realize the function of same phase-frequency between sine waveform generated from PV Inverter System and the reference waveform from grid. Furthermore, the single phase DC/VC converting is controlled by means of SPWM generated by taking...
This paper describes a cluster-based transcoder that could transcode MPEG-2 format video files to MPEG-4 and H.264 format video files with faster transcoding speed than traditional single PC transcoder1. A seamless method of video division and a novel multi-resolution load balancing algorithm for distributed transcoding are proposed, and meanwhile, a fast algorithm for embedding watermarking is presented...
The process of recognizing the image of log end by the way of image processing technique was involved in this study, according to the features of the log end images, removed internal hole noises and external band noises of the image by combining the area threshold method and mathematical morphology. Processed the image by the method of homomorphic enhancement, transformed the image to the logarithm...
This paper is dedicated on the system-level thermal design and modeling for AMS-02 (Alpha Magnetic Spectrometer) avionics, with the goal of obtaining a reliable thermal control system. Electronics system thermal design is illustrated with the combination of both passive and active thermal control concepts. Detailed TMM (Thermal Mathematical Model) and GMM (Geometric Mathematical Model) for main radiator,...
Steganography is the science of communicating secret information which no one apart from the intended recipient can be aware of. Most researchers focus on the medium of image, video and audio, while text is paid less attention, especially PowerPoint documents due to some shortcomings. In this paper, a new steganography method which hides information via different combinations of different objects...
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate all system parameters and all private/public keys. Any t members in Ad hoc group can collaboratively generate the group signature with the help of a designated clerk, where the signer respectively...
According to the matrix representation of cubic NURBS surface, this paper presents a G1 continuity sufficient condition for common intersection point of three patches of adjacent cubic NURBS surface and provides specific algorithm for control points and weights of cubic NURBS surface.
Relevance feedback is an iterative search technique to bridge the semantic gap between the high level user intention and low level data representation. This technique interactively determines a user's desired output or query concept by asking the user whether certain proposed 3D models are relevant or not. For a relevance feedback algorithm to be effective, it must grasp a user's query concept accurately...
This paper investigates a class of fuzzy differential delay equations driven by Liu's process with locally bounded coefficients. The fuzzy version of the well known LaSalle theorem is derived. For the proof of our main result, the concept of stopping times on the credibility space is introduced.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.