The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cooperative positioning is an emerging topic in wireless sensor networks and navigation. It can improve the positioning accuracy and coverage in GPS-challenged conditions such as inside tunnels, in urban canyons, and indoors. Different algorithms have been proposed relying on iteratively exchanging and updating positional information. For the purpose of computational complexity, network traffic, and...
3GPP has specified that terminals can be configured to use either 2 or 10 ms transmission time interval in high speed uplink packet access systems. The purpose of this paper is to evaluate the benefit of exploiting a mixture of both of the transmissions time intervals within a cell instead of only one. The study is quantified by means of studying the achievable coverage of voice over IP and possible...
How is our knowledge organized? What research fields in computer science do exist? How are they interconnected? Previous work on knowledge mapping focused on building the map of all of sciences or a particular domain based on ISI published JCR (Journal Citation Report) dataset. Although this dataset covers most of important journals, it lacks of computer science conference and workshop proceedings...
This paper is inclined to introduce the authors' study on a new method for evaluating the production safety in a workshop based on the multi-dimensional and multi-level factors including a lot of uncertainties. Since the safety management of the workshop production involve so many factors and uncertainties, it is necessary to use the interval number fuzzy integrated evaluation, which is based on the...
The research and development of innovative solar cells with high conversion efficiency and low production cost is important for achieving the long-term goal of "Cool earth 50", in which we aim at 50% reduction in the emission of greenhouse gas in the entire world by 2050 in order to prevent further global warming. The primary target of this project is the dramatic improvement in a photovoltaic...
The Ultra Slim Optical Pointing Device (USOPD) is a slim optical mouse as an input device for the application of wireless portable personnel communication device like a smart phone. In this paper, we have fabricated optical components of GaN LED based USOPD. The USOPD consist of illumination optical components and imaging lens. LED beam shaping lens consisting of both aspheric lens and Fresnel facet...
We report our progress and the first optical application on the high-aspect ratio micromirror array for UV-NIR femtosecond (fs) broadband pulse shaping. It is a bulk-micromachined device. capable of individually addressing 100 mirrors with a stroke of up to 3 μm using vertical comb drives in a novel. symmetrical double-spring design. The device was successfully implemented in a fs pulse shaper setup...
This work studies the lead magnesium niobate-lead zirconium titanate (PMN-PZT) multilayer ceramic actuators (MLCA) for laser scanner applications. PMN-PZT MLCA was fabricated. 5×5×30 mm3 size MLCA was fabricated by conventional tape casting method. The displacement of the MLCA with 30 mm thickness was ~30 μm at 150 V Tilt stage consisting of multilayer actuator and two hinge type lever mechanisms...
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
Session identification is an important step in data processing of web log mining. To solve the defects in traditional session identification, an improved session identification algorithm was proposed. After identifying specific users, a great deal of frame pages were filtered, the relatively reasonable access time threshold for each page was made up according to contents of each page and all web structure...
This paper carried out the research on Pu'er fermentation automatic control process, using engineering and biotechnology and the application of parameters in the critical link of Pu'er tea quality formation. Pu'er tea fermentation plant design were optimized; the tide proportion before Pu'er tea fermentation had been carried out accurate quantitative and automatic control study; the temperature and...
Due to the fact that crucial and often the complex components of product can not be manufactured outsourcing as a whole in one organization, this paper presents a solution of manufacturing execution supporting rapid extended manufacturing. The background of rapid extended manufacturing and Manufacturing Execution System are explained. The article analyzes several main issues of manufacturing execution...
This paper focus on the methods of the build process of Real-Time Workshop (RTW), the influencing factors on code efficiency and development of a custom embedded target. In order to generate embedded C code and download it to a user-specified micro-controller (Freescale™ MC9S08DZ60 for example in this paper) conveniently, an embedded target is developed. The embedded target developing consists of...
Low-rate denial-of-service attack is a novel category of attacks that are based on exploiting the adaptive behavior exhibited by several network and system protocols. This attack through periodically non-suspicious low-rate attack pulsing, to reduce the performance of the victims. Based on the simulation of low-rate denial-of-service on NS2 platform, we analyze the defense performance of queue management...
This paper explores Bhattacharyya Distance principle and introduces it to recognize stego algorithms in use. First of all, we select the most important features by the means of applying Bhattacharyya distance. Then, BP neural network is used to classify cover and stego images. Extensive experimental works show that the proposed schemes have satisfactory performance on Jpeg steganography like F5, Outguess,...
Most traditional MAC protocols proposed for wireless networks assume static Network Units (shorted as NUs), which usually lead to performance degradation in mobile scenarios. In this paper, a novel hybrid MAC protocol, called MA-MAC, was presented for multi-hop mobile Tactical Data Link networks based upon the mobile characteristics of NUs. The basic point of MA-MAC is that the transmit mode of each...
Self-healing key distribution schemes are particularly useful when there is no network infrastructure or such infrastructure has been destroyed. A self-healing mechanism can allow group users to recover lost session keys and is therefore quite suitable establishing group keys over an unreliable network where broadcast messages loss may occur frequently. Many self-healing key distribution schemes are...
The ability for a swarm of mobile agents to quickly adapt in unknown environments and reach a goal while avoiding obstacles and maintaining a formation is extremely important in time critical tasks. We utilize a physics-based autonomous agent framework combined with our DAEDALUS paradigm which allows the agents to learn from the neighboring agents. In traditional approaches, a swarm of agents learn...
As ontology is subjective and varies in different domains, the amount of ontologies turns out to be huge but with poor compatibility. Mainstream method for ontology integration is mostly achieved by establishing mappings between ontologies. In this essay, the author put forward another way of ontology merging. After statistic machine learning on concept relations, the frequency of different ontologies...
Relevance feedback has been developed to improve retrieval performance effectively in Content Based Image Retrieval (CBIR). This paper introduces a relevance feedback system for CBIR with both short-term relevance feedback and long-term learning. In short-term relevance feedback, query reweighting algorithm, support vector machines (SVM), and genetic algorithm are adopted. In long-term learning, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.