The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a concept for a reliable and miniaturized power control unit (PCU). With this PCU, an electro-mechanical actuator (EMA) is controlled. This EMA is intended to be used in a swashplateless helicopter control system. As this is a safety relevant part of the helicopter, the PCU needs to work reliably under challenging ambient and operating conditions. At the same time, the whole...
Combination rules proposed so far in the Dempster-Shafer theory of evidence, especially Dempster rule, rely on a basic assumption, that is, pieces of evidence being combined are considered to be on a par, i.e. play the same role. When a source of evidence is less reliable than another, it is possible to discount it and then a symmetric combination operation is still used. In the case of revision,...
Aimed at the problem of high failure rate in the tension control system of traditional circular knitting machine, this paper proposes and develops a kind of embedded yarn tension control system. Systematically study the causes of different failures in yarn tension control system and analysis the influencing reliability factors of real-time control system by FTA (Fault Tree Analysis) method, built...
In light of the recent development of multimedia and networking technologies, an exponentially increasing amount of content is available via various public services. That is why content identification attracts a lot of attention. One possible technology for content identification is based on digital fingerprinting. When trying to establish information-theoretic limits in this application, usually...
Tracking multiple objects in surveillance scenarios involves considerable difficulty because of occlusions. We report a novel tracker - based on reliability tracking - that demonstrates superior performance under high degrees of occlusion. In our method, distinguishable features between the target and non-target are represented as the object's reliability. When the selected features are no longer...
Student Information Management System realization including establishment and maintenance of the database and front-end application development. This paper describes the system functional and architecture design, and emphasizes the system's functionality, database design and functional modules, etc. Fully functional, flexible and convenient application and friendly interface provide a good guarantee...
For improving the reliability of the data stored up, this paper brings forward an improvement scheme. It expands the error correction from One-dimensional (1-D) model to Three-dimensional (3-D) model. This thesis has listed and has analyzed three models' (1-D, Two-dimensional (2-D) and 3-D) structure method and their error correction process, and from all-round aspects to compare the three kinds of...
Our work focuses on selecting a trusted service from service consumer's perspective. First, we distinguish the two kinds of trust context to separate the ability of service as both a service provider and a service consumer in a service web; and we classify the reputation into two different categories. Second we generate a reputation metric model by improving Subject Logic. The trust decision model...
Take a research in depth on the modeling problem of service path selection based on SON. Firstly, the optimal model is built with the optimal goal of balanced loading and with the functional constraints of users for composed service and multi-QoS constraints. Then the layered method and improved Ant algorithm are adopted to solve this problem. Finally, a simulated emulation is made to the algorithm,...
In this paper, we assess the random coding error exponents (EEs) corresponding to decode-and-forward (DF), compress-and-forward (CF) and quantize-and-forward (QF) relaying strategies for a parallel relay network (PRN), consisting of a single source and two relays. Moreover, through numerical analysis we show that the EEs achieved by using QF relaying along with non-Gaussian signaling (coded modulation,...
While Performance Enhancement Proxy (PEP) is a promising solution for TCP's performance issues over satellite links, it has a serious constraint in terms of a translation table limit of 500 entries that proved to be detrimental when a large number of TCP sessions need to be maintained between endpoints. We experienced one of these cases in Saudi Aramco where web-based drilling applications were establishing...
The main bottleneck to achieve energy autonomy in body area networks (BAN) is the design of an ultra low power yet reliable wireless system. In this paper, we first demonstrate the feasibility of an ultra low power receiver by presenting our implemented receiver chip that could operate on a total power of 479.5 uW, which is more than one order of magnitude lower than commercially available low power...
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input...
Cooperative multicast communication techniques for emerging broadband multimedia services, such as IPTV, over WiMAX channels reduces the network resource consumption, by multicasting the data once to multiple users simultaneously independently of their number, using a common shared downlink channel. Users distributed around the cell face different channel conditions due to fading, user location, mobility,...
Wireless sensor networks may be utilized for various application areas such as health, military, home, and so on. In the wireless sensor networks, data transmission typically relies on multi-hop communication with high packet loss rates on wireless links so that reliable end-to-end data transmission is desirable. Recently, in order to achieve desired Communication Reliability (CR) levels of the various...
In wireless scenarios an effective protocol to increase the reliability for time-varying channels is the hybrid automatic repeat request (H-ARQ). The H-ARQ scheme with cross-packet channel coding (CPC) is a recently published extension of H-ARQ with several advantages. No full-diversity low-density parity-check (LDPC) code design for the whole range of coding rates yielding full-diversity has been...
In this paper, we investigate the performance of opportunistic scheduling in uplink cognitive radio (CR) systems taking into account the spectrum sensing reliability of each CR user. In uplink CR systems, each secondary transmitter (CR user) has a spectrum sensing responsibility to protect the primary system, and the secondary receiver (base station) schedules the transmission opportunity for each...
Machine-to-Machine (M2M), an emerging communications paradigm, is a facilitator of data flows between machines used, e.g., in mission-critical applications. Focusing in this paper on embedded multihop M2M implementations with myopic routing, a prime design aim is to jointly minimize energy expenditure and the end-to-end delay whilst not jeopardizing the network's operational reliability. We thus evaluate...
The general criterium adopted by the Brazilian System Operator for the calculation of the Transfer Capability is (n-1). However, the Brazilian Grid Code establishes that multiple simultaneous outages should be considered as a single contingency when statistics demonstrate that they are likely to occur, with important consequences to the bulk power system, in the following cases: · When circuits share...
Fault tree analysis is a widely used method for reliability evaluation and risk assessment. This paper analyzes the reasons of oil tank fire and explosion by applying Fault Tree Analysis. It establishes a fault tree including a top event and 25 basic events. The top event is oil tank fire and explosion. Through analysis, 7 minimum path sets are obtained and corresponding importance degrees are calculated,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.