The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a pipeline wireless communication system for underwater environment applications is proposed. The system is designed to realize communication by penetrating water and metal pipeline. The communication system consists of magnetic antenna as communication antenna, and software using 2ASK modulation and demodulation technology. The details of the proposed pipeline communication design...
In this paper, we propose a ROI (Region of Interest)-based rate and computing resource allocation algorithm for H.264/AVC video coding, targeting at the wireless video communication applications on mobile devices. The proposed algorithm includes three modules: ROI detection, computing resource allocation, and bit rate allocation. A saliency-map-based scheme is performed to detect the ROI. Considering...
Considering the characteristics of ERA based wireless sensor networks architecture and the specific demand of tropical agriculture, this paper proposes a scheme which can be used in high temperature, multiple rain and so on, design and implementation wireless sensor network system of tropical agriculture. ERA is a new type of embedded architecture with the use of reconfigurable architecture, and the...
In the process of designing of the Micro mouse, we often need to spend a large quantity of time on debugging of the maze search algorithm. Research works on modularizing design with mathematical model can helps to modulate the maze environment and the moving model of Micro mouse, thus we can carry out the simulation of maze search algorithm, as well as other functions such as the compiling of the...
Cloud Computing has become a significant technology trend. It is going to reshape IT processes and IT marketplace in recent years. It is grabbing the people's attention rapidly as an opportune resource of computational power as well as priced Cloud computing services save pains to maintain the computational ambience. Gradually, Cloud is bringing new possibilities for a scientific community to build...
Vehicular ad hoc networks (VANETs) are a special type of mobile ad hoc networks (MANETs), where nodes are moving vehicles that communicate with one another wirelessly. The promising technology of VANETs will enable variety of applications from safety to driver assistance. Routing protocols that work efficiently in MANETs perform poorly in VANETs due to high-speed mobility of nodes, resulting in frequent...
In this paper, we analyze the reason why most of the NFC devices are out of application. In order to satisfy the high-tech requirements of NFC information release, we propose a transcoding mechanism between a variety of encoding messages and NFC message (NDEF). We realize the related transcoding process based on Linux OS, which can be used for main control module of NFC information release. It would...
Recent years wireless networks have witnessed an explosive growth in enhanced multimedia broadcast and multicast service (eMBMS). Scalable video coding (SVC) streaming is a mainstream coding in eMBMS. In this paper we present a novel eMBMS user cooperative erasure recovery mechanism based on network coding where SVC streaming and layer network coding are broadcasted by source node. Local cooperative...
At outdoor environment, GPS can provide accurate location services. But at indoor environment, it can not. In order to realize accurate positioning indoor, we propose a fingerprint localization algorithm based on WiFi in this paper. In the process of our research, we will divide the indoor environment that need provide accurate location services into a certain scale of virtual grid, and tag each vertex...
With the continuous development of recommender systems technology, people's reliance and demand on recommender systems is increasing, while traditional recommendation models have been unable to meet this increasingly diversified demand. This paper designs a general improved model to take advantage of the additional information, especially the essential information of objective product category, other...
This article presents a novel simple and compact triple band RFID reader antenna for handheld applications. The antenna is a microstrip antenna and fed by a feeding strip. By cutting a rectangular slot on the radiation patch to change the surface currents distribution, and then adjusting the dimensions and position of the rectangular slot to achieve a tri-band antenna. Radiation patch and the ground...
Combining with RFID technology, Conveyor plays a very important role in modern industrial automation. However, RFID performance will be affected by many factors in conveyor application. In this paper, we build a new experimental device to test RFID performance factors of conveyor belt, the innovative aspects of our new experimental device are we adopt automated guided vehicle (AGV) instead of traditional...
To cope with challenging communication conditions in VANETs where connectivity is intermittent, and the quality of wireless channel is unstable and communication links are easily broken, we present an improved infrastructure assistant vehicle-to-passenger (V2P) protocol was proposed. The proposed protocol can reach very high query efficiency and matching accuracy with low delivery delay and communication...
For improving the precision of the fingerprint positioning algorithm based on WIFI and decreasing the complexity of the algorithm at the same time, this paper proposed a KNN + Bayes fusion positioning algorithm based on subsection and interpolation. In the process of building fingerprint library, we use the method of linear interpolation to get the fingerprint which is in the middle of adjacent sampling...
As the single location technology is unable to meet the needs of indoor positioning accuracy and stability, we propose and design the PDR (pedestrian dead reckoning)/Wi-Fi method for indoor location in this paper. It includes the stride length calculation method based on velocity trace, gyroscope and electronic compass in combination with Wi-Fi positioning method for direction judgement, and Wi-Fi...
This paper gives a research on enhanced ADS-B reception techniques. Extended Squitter reception using enhanced reception techniques will provide better performance. Elements of enhanced Extended Squitter reception include (1) the use of multiple amplitude samples to improve bit and confidence declaration accuracy and (2) more capable error detection/correction algorithms. The simulation results indicate...
Tag collision occurs when a reader attempts to identify a large number of tags simultaneously, which reduces the identification efficiency of RFID systems. The dynamic slots collision tracking tree algorithm (DSCTTA) can reduce the prefix overhead and iteration overhead by using time-divided responding scheme, however, this mechanism generates a lot of idle time slot. An improved dynamic slots collision...
Cloud system peculiarities, such as dynamic virtualization management and multi-tenant shared mode, make authentication and access control more important than ever. This paper presents an advanced Access control model based on the TCG'IF-MAP standard and the OASIS XACML standard to regulate the access of Cloud resources. The main novelty of the architecture is the introduction of MAP server, providing...
This paper discusses the optimization and implementation of a new internet resource locating technology-Handle protocol and server. It introduces the basics of Handle protocol and the characteristics of Handle system. Then it focuses on the overall architecture, especially, the design of the Authority Cache and the Dynamic Thread Pool. The innovation of the paper is the proposal of a high performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.