The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Partially observable Markov decision processes (POMDPs) provide a kind of general model that can deal with problems in uncertain environment efficiently. There are many different planning methods for POMDPs model. Partially Observable Monte Carlo planning (POMCP) method, using Monte Carlo Tree Search (MCTS) method, which can help break the curse of dimensionality and the curse of history. However,...
Data privacy preserving in wireless sensor network has attracted more and more attentions. This paper proposes a secure top-k query scheme in wireless sensor networks (STQ). STQ uses symmetric encryption to preserve data privacy. To verify completeness of query result, STQ uses the improved hashed message authentication coding function to create a chaining relationship by binding ordered adjacent...
As the advantages of high performance and low power, the Loongson-1 processor has wide application prospects in industrial control, high-performance embedded, and other fields. Now the Loongson series platforms are mostly based on Linux operating system. However, VxWorks is a better choice for its high real-time performance and high reliability in the field of industrial control and high-performance...
Networked video courseware(NVC) provides a new research perspective for resource development in education technology field by combining education technology and film arts knowledge. Teachers often have difficulty in fulfilling complex courseware designs due to the lack of sufficient film arts knowledge. This paper presents a systematic object-oriented knowledge modeling which is developed and described...
Lipreading techniques have shown bright prospects for speech recognition under noisy environments and for hearing-impaired listeners. In this paper, we discuss a feature extraction method based on the homeomorphic manifold analysis for lipreading. Given a set of image sequences, we think there is an underlying low dimensional unified manifold embedded in the visual space, and each image sequence can...
It is effective to ensure the credibility of program to monitor the real-time status in the whole process when the program is been executed. Aiming at the problem of high convexity of feature extracting and interaction between false positive and false negative rate in current study, this paper proposed one kind of program behaviour model based on the dependencies. It constituted variable-length system...
The contents of this paper is about the design and implementation of hardware and software for water wells monitoring terminal, and its hardware adopts the ARM architecture, including atmel AT91SAM9263 as main processor and GPRS wireless network. For software design of water wells monitoring terminal, designing terminal software solutions based on uClinux embedded operating system takes account of...
Aviation Cyber-Physical Systems are the integration of cyber systems and physical systems. Recent concentration to Aviation Cyber Physical Systems (ACPS) is driven by the demand for deeper Convergence of design disciplines that integrate physical and computational worlds. In this paper, we supply a new idea to support cyber-physical system design by proposing multi-dimension and multi-domain approach;...
MAC (Medium Access Control) protocol is a key technology in mobile ad hoc network. Aiming at the problem of node mobility and a lack of central coordination mechanism in mobile ad hoc network, this paper proposes a MAC protocol solution applied to the FH (Frequency Hopping) communication system. The scheme firstly utilizes the characteristics of the frequency hopping system to provide the inter-node...
This paper constructed the overall design of the elevator running parameters remote monitoring system based on zigbee technology and GPRS network, combining with the concepts and features of IoT. For the remote communication server need to parallelly handle a large number of different level datagrams, we constructed a high concurrency UDP communication model by using the technologies such as JavaNIO,...
This paper designs and implements the bionic robot which is as an implementation of soldiers in the strategy game, and the robot has three parts: perception system, target and path system and decision-making system. The perception system is responsible for perceiving information inside the scene; the target and path system is to find the best position for attacking and the optimal path for the robot;...
Solving systems of linear equations in finite fields is among the most fundamental operations and used extensively in areas of cryptography, signal processing and clustered file system. In order to implement such systems, it is desirable to improve solving systems of linear equations. We propose FPGA implementations for Gaussian elimination in finite fields. Experimental results and comparisons show...
It is well known that UHF RFID, one of the key technologies of Internet of Things, is becoming the mainstream research of RFID applications. In a RFID system, reader plays an important role, however, RFID reader with only one channel often cannot satisfy the application requirements due to the complicated working environment. This study introduces a novel design solution of Four-channel RFID reader...
The wireless sensor network routing strategies determine the lifetime and the energy consumption of the sensor networks. An algorithm on calculating the approximate maximum network lifetime is presented by establishing the wireless sensor network routing strategy planning model. Through the simulation, the amount of information acquired during the network lifetime could account for 98.2% of the maximum...
Average symbol error rate performance of a dual-hop amplify-and-forward (AF) multi-relay cooperative communication system in Rician fading environment is investigated in the paper. We also derive the closed-form expressions for the probability density function (pdf) and the moment generating function (MGF) of bounded SNR with a maximal-ratio combing receiver at the destination terminal. The correctness...
In order to get more accurate data, it is very important to remove noise in embedded ECG acquisition system based on Bluetooth wireless communication technology. FIR digital signal filtering algorithm based FPGA-FFIR is proposed to complete ECG filtering. Firstly, Simulation is processed in MATLAB to achieve corresponding filtered waveform coefficient. Then comprehensive design and simulation are...
In view of the shortcomings of traditional image encryption schemes, image encryption methods based on chaos theory has come into being. This paper presents a grayscale image encryption method using the combination of Tent and Lorenz chaotic maps. It leverages the Lorenz sequence to alter the Tent sequence in order to improve the randomness of secret keys. It also couples generated keys with plaintext...
Nowadays, the driver drowsiness has become a main cause of many traffic accidents, while the state of eye is a significant factor which has a close relationship with sleep. This article presents an algorithm which can estimate drivers' eye states, aiming at reducing the rates of traffic accidents by monitoring drivers' drowsiness. Firstly, a driver's face images are grabbed from a digital camera and...
In the MANET with high mobility, many routing responses of the contiguous nodes in the DSR routing protocol can not arrive to the resource nodes. So the routing requests which broadcast to these nodes produce much unnecessary use. We can acquire relatively steady routing responses if we chose the contiguous nodes to start the routing require which with less mobility compare with resource nodes. This...
The next-generation of cloud computing will thrive on how effectively the infrastructure are instantiated and available resources are utilized dynamically. Load balancing, which is one of the main challenges in Cloud computing, distributes the dynamic workload across multiple nodes to ensure that no single resource is either overwhelmed or underutilized. An improved particle algorithm is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.