Search all articles

+ Advanced search
Search articles within:
125132 articles

A Fault Injection System Based on QEMU Simulator and Designed for BIT Software Testing

Yi Li, Ping Xu, Han Wan
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose. This paper presents a simulator implemented fault injection and monitoring environment based on the QEMU platform, called BitVaSim,...

Design and Implementation of Reconfigurable Encryption and Decryption System Based on SOPC

Qingfang Zhou, Qian Huang, Ying Yuan, Jun Yang
The system is based on DES/3DES AES cipher algorithm as the research object.According to the characteristics of the algorithm, designs a configuration mode which can share resource in space and configurate algorithm in time. Then it uses hardware description language Verilog HDL to realize and optimize...

The Application of Fuzzy Reasoning in Cement Particle Size Soft Sensor

Weilei Luan, Qingjin Meng, Tao Shen
In the cement production process, cement quality is the most important indicator. One way to measure the quality of the cement is the cement particle size. Only the cement particle size is symmetrical and the specific surface area could reach the national standard that this kind of cement is qualified...

Research and Design of Beamforming Device of SLC- LSCMA Algorithm Based on FPGA

Qingfang Zhou, Yanyan Yu, Lei Wang, Jun Yang
In this paper,we design a uniform circular array beamforming device of 16 yuan based on the least squares SLC- LSCMA algorithm (based on the linear subspace constrained least squares cma) high stability and rapid convergence for the foundation. The design of the complete beam-forming the SLC-LSCMA algorithm...

A Secure and Energy-efficient Rooting Protocol for WSN

Jiana Bi, Xu E
In directed diffusion rooting protocol, interest and exploratory data are disseminated by flooding, which will bring broadcast storm resulting in substantial energy consumption of wireless sensor networks. Grid-based directed diffusion rooting protocol can improve energy efficiency where geographic grids...

Research on Attack Source traceback

Wei Xu, Qiaohong Xu
The existing methods of attack traceback still have many defects, such as input debugging method requires the professional intervention; ICMP traceback message takes up the network bandwidth resources and so on, so a new collaborative network is picked up, based on ant source of ideological attack tracking...

The Improvement Scheme Based on SIPT

Jieying Lao, Zhilei Sun
Speedy IP Traceback method (SIPT) is deficient in monitoring and position attack sources, this paper puts forward an improvement scheme based on SIPT, it only marks two-three times for the packet on the key locations, and the propose also overload rarely used fields on IP packet header to store the checkpoint...

Construction of Odd-variable Boolean Functions with Optimum Algebraic Immunity

Zhichao Zhang, Zheng Huang, Jie Zhang, Qiaoyan Wen
Recently, algebraic attacks becomes a major attack method to threat to cryptography security. In order to resist algebraic attacks, algebraic immunity as a Boolean function cryptographic property has been put out. This makes that Boolean functions should have high algebraic immunity to resist algebraic...

Research on the cooperation method of traffic control and route guidance of local area network

Weiqing Bai, Maolei Zhang
The city traffic control system and traffic guidance system are two important subsystems of Intelligent Transportation Systems, also main means of the city traffic management. This paper studies the method of control and guidance system coordination for a specific local area, usually 2-6 signalized intersections,...

Research on Dynamic Modeling Of Virtual CNC System Of Human Machine Interface

Bashir Osman, Deji Hu
In this paper, a Virtual CNC system of Human machine interface Modeling described the structure of the real CNC system operator panel, virtual modeling and parser function of CNC panel using Delphi language programming logic as an advanced dynamic modeling concepts and techniques to carry out the virtual...

The Liquid and Plastic Limit Data Treated System Based on VC++

Xiaodong Zhang, Jianqiao Li, Ruiyang Shi, Meng Zou, Yang Wang, Hao Li
According to two standards for soil test methods with liquid and plastic limit combined test, a liquid and plastic limit data treated system was developed using object-oriented visual programming Microsoft Visual C++6.0 based on analytical method. The flow char indicated that programs of the system used...

In C Language How to Use Pointer to Access Two-Dimensional Array Element

Weiqing Bai
In C language, it is difficult to use the pointer to access the two-dimensional array element. The reason is the addresses of two-dimensional array are many, pointers that can access the two-dimensional array element are many and complex. This paper analyzes the two-dimensional array address and pointer,...

An Energy-efficient Security Node-based Key Management Protocol for WSN

Jiana Bi, Xu E
A security node-based key management protocol is proposed for cluster-based sensor networks. Member nodes and cluster heads are responsible for data collection and transmission. Security nodes are responsible for key management. Security nodes restrain key management function of cluster heads, and reduce...

Design of Electric Power Steering for Forklift Based on ARM

Dongmei Ma
After analyzing Electric Power Steering (EPS) and electric control unit (ECU), a controller system based on ARM LPC1752 is designed. Direction control circuit, H-bridge control circuit and PWM technology were used to control a motor. The PD fuzzy control algorithm was used to control the steering system...

A Localization Model based on Irregular Quadrilateral for Wireless Sensor networks

Fengjun Shang, Hongxia Gao
Localization is used in location-aware applications such as navigation, autonomous robotic movement, and asset tracking to position a moving object on a coordinate system. In this paper, we present a localization model based on the irregular quadrilateral in wireless sensor networks. Firstly, a quadrilateral-positioning...

Design for realizing arbitrary fractional divider based on FPGA which duty cycle is up to 50%

Songwei Zhang, Cheng Zhao
This paper proposes a novel method for realizing arbitrary fractional divider based on FPGA. Analyzing the limitations of the existing frequency-divided methods, a new model which consists of two-level dividers is put forward. An arbitrary frequency-divided clock output can be obtained by this method...

A Multiple Constrained QoS Routing Algorithm for the wireless sensor networks

Zeshun Zhou, Yi Xu, Junjie Yan, Zhongwei Nie, Layuan Li
Routing problem is one of the most important issues to a wireless sensor network (WSN). It is the key problem to find an efficient energy strategy for prolonging network's lifetime because power supply might be impossible. This paper discusses the multicast routing problem of WSN with multiple QoS constraints,...

Time-varying LQG control for vibration of coupled vehicle-bridge system

G. Song
Time-varying linear quadratic Gaussian (LQG) control for vibration of coupled vehicle-bridge system is studied. The vehicle is modeled as a moving mass model with three degrees of freedom, which consists of vehicle body, bogie and wheel. Active suspensions are adopted for the primary and secondary ones,...

The Research of ARMA Model in CPI Time Series

Fengwang Zhang, Wengang Che, Beibei Xu, Jingzhi Xu
The changing trend of CPI to a certain extent reflects the degree of inflation, which has a great significance on macro-control and research on national economic. ARMA model is one of the simple and practical models in financial time series analysis with relatively high forecast accuracy. The paper utilizing...

Study on Personalized Recommendation Technology of Digital TV Programs

Xiaobin Wang, Qingjun Wang
This paper aims at one of key technologies in digital television development ---intelligent personalized recommendation technology of digital TV programs for study. This paper proposes to take advantage of ample TV-Anytime to describe metadata so as to perform specific plans of guide service for TV programs...

A new type of optimization method based on conjugate directions

Xin Pan
A new type of optimization method based on conjugate directions is proposed in this paper. It can be proved that this type of method has quadratic termination property without exact line search. The new method requires only the storage of 4 vectors such that it is suitable for large scale problems. Numerical...

An Improved Dynamic Programming Algorithm for Bitonic TSP

Jian Li
This paper puts forward an improved dynamic programming algorithm for bitonic TSP and it proves to be correct. Divide the whole loop into right-and-left parts through analyzing the key point connecting to the last one directly; then construct a new optimal sub-structure and recursion. The time complexity...

A Cooperative Hybrid Caching Strategy for P2P Mobile Network

Mo Zhou, Bo Ji, Kunpeng Han, Hongsheng Xi
Recently mobile network technologies develop quickly. To meet the increasing demand of wireless users, many multimedia proxies have been deployed over wireless networks. The caching nodes constitute a wireless caching system with an architecture of P2P and provide better service to mobile users. In this...

Research on a Scheme for Improving the Chord Routing Algorithm

Xiaobin Wang, Qingjun Wang
The research and application on Peer-to-Peer (P2P) is a topical issue in the present computer network field. The current P2P systems can be separated into two types. One is structured and the other non-structured. The Structured P2P system is based on the principle of DHT which aims to solve some of...

An Fuzzy Petri Net Model of Accident Evolution Process of Coal and Gas Outburst

Li Ma
This article has proposed an accident evolution model of coal and gas outburst on the basis of fuzzy production rules, because the coal and gas outburst accident has the characteristic of fuzziness and uncertainty. Firstly, adverse searching method is used to reduce the initial model so as to decrease...

Study on the Equipment Management System Based on Internet of Things

Jiangkun Mao, Yufeng Xu
For the demands of unit equipment management under the new situation, equipment management system model was constructed based on Internet of Things, building programs of equipment information management system was put forward based on the system. Information sensing device are combined with inside LAN,...

Application of Fusioncharts in Web System

Ting Zhang
This This paper mainly introduces Flash report components Fusioncharts of functions and basic usage, emphatically describes how Java Web development system provided by the use of dynamic data-driven Fusioncharts icon-based, and through examples to achieve Fusioncharts Web system.

Database Design of three Dimensional Simulation and Optimization System for Mine Ventilation Network

Yun Shen
According to the characteristic of three dimensional simulation system for mine ventilation and database technology situation, the systems database was built by SQL Server. This paper analysed the data model, data dictionary, database access control strategy and technology, which provided solid dependence...

The Application of Single Vector Sensor in Direction Tracing of Water-entry Object

Di Xiao, Lanyue Zhang
Water-entry signal was important to broadcast the water-entry object. The vector sensor could gain the pressure and particle velocity signal, so the azimuth angle of water-entry signal could be estimated by single vector sensor. The complex sound intensity method was applied in vector signal processing...

Application of Rough Set Technology to Control Information System of CFBB

Mingming Gao, Jie Hou, Deliang Zeng, Xiujian Lei, Yuping Wu, Mingsheng Zhang
Circulating fluidized bed boiler(CFBB) is a distributed parameter, nonlinear, time-varying and multivariate coupling system. Considering these, the core identity of Rough Set and the theory of self-organizing neural fuzzy inference system is applied to the control system of CFBB. The system is carried...

Research on Structure Size of Muffler to the Influence of Acoustic Properties

Jinku Li
The dimention for muffler has great impact on the car engine. Based on software GAMBIT, GT-POWER,SYSNOISE,through comprehensively using finite element and boundary element method,simulating and analyzing the acoustic performance for the basic noise reduction unit,establishing the finite element model,...

A Remote Educational Video Dynamic Image Sharp Processing Algorithm

Qianjun Tang, Yan Zhang
In distance education network transmission process, because transmission distance is too long, transmission network will be affected by complicated external environment factors, which leads to network failure and failure in remote education video image formation, and finally causes unsmooth transmission....

A Modeling Study of Sensor Data

Feng Liu, Jianyong Wang, Ming Liu
Nowadays, Internet of Things (IoT) has been becoming a hot research topic. Being an important part of Internet of Things, the wireless sensor networks collect various types of environmental data and construct the fundamental structure of the IoT applications. In order to find out the characteristics...

The study found that the intelligent mobile phone technology of malicious code

Ya-qin FAN, Ge Zhang, Miao LIU, Xin Zhang
This paper studies the development trend of intelligent mobile phone, confirmed the necessity of research on intelligent mobile phone malicious code. Study on the detection technology, proposed intelligent mobile phone regular networks and random networks based on malicious code propagation model, propagation...

Optimal Spectrum Sensing Interval to Minimize theTransmission Delay for Cognitive Radio

Shuai Li, Peng Gong, Qian Yang, Mingguan Li, Linchuan Ma
In this work, we have studied the optimal spectrum sensing interval, which is the time between two consecutive spectrum sensing activities, such that the delay of the cognitive transmission is minimized. The throughput maximization of the cognitive radio is always a common goal of the researchers, which...

Design of Glass Flatness Semi-automatic Detection System

Linlin Zhai, Guangfeng Chen, Xin Wei, Xipei Ma
This article proposed a glass flatness detection system. The systems adopt 16 displacement sensors to detect multiple sample points on the glass surface simultaneously. Detection software controls pneumatic devices to realize glass feeding, clamping while displacement sensors’ detection. Sensors output...

Online Biscuit Detection System Based On Machine Vision

Xin Wei, Guangfeng Chen, Linlin Zhai, Qingqing Huang
In order to complete the automated sorting, the manipulator needs the accurate coordinate and angle information of the biscuits. This article design a machine vision based online biscuit detection system. Devise the hardware structure and control logic. Base on geometric matching algorithm, develop the...

University Network Engineering Professional Teaching Model

You-qian Han, Xiu Xu
Network engineering is the field of emerging technologies, and how to better provide the community with the talents currently on network engineering teaching mode design became the primary task to meet the requirements of the close combination of computer technology and communication technology. In this...

Real-Time 3D Hand Tracking from Depth Images

Lin Song, Ruimin Hu, Yulian Xiao, Liyu Gong
In this paper, we propose a depth image based real-time 3D hand tracking method. Our method is based on the fact that human hand is an end point of human body. Therefore, we locate human hand by finding the end point from a predicted position of hand based on the hand position of the previous frame....

Real-Time 3D Hand Gesture Recognition from Depth Image

Lin Song, Ruimin Hu, Yulian Xiao, Liyu Gong
In this paper, we propose a novel real-time 3D hand gesture recognition algorithm based on depth information. We segment out the hand region from depth image and convert it to a point cloud. Then, 3D moment invariant features are computed at the point cloud. Finally, support vector machine (SVM) is employed...

The Effectiveness of Public Hospital Governance Model Evaluation and Analysis

Jianhui Yang, Jie Zhao, Yunkai Zhai
According to the Balanced Scorecard theory and stakeholder theory, this paper points out that the evaluation of the effectiveness of public hospital management mode should be based on in-house effectiveness and the effectiveness of the operation. Article conducts a further demonstration of the effectiveness...

A Fast adaptive transmit power and bit allocation in OFDM system

Juan Wen, Qiming Tian
In this paper, we propose a fast and optimal adaptive transmit power and bit allocation algorithm, which is called Bisection Searching Level (BSL) for wireless OFDMA systems. The algorithm aims at maximization of data rate under the constraints of total transmit power and bit error rate (BER). BSL is...

Modified iterative sphere decoding algorithm in LTE system

Qin Zhu, Xiao-wen Li
In the long-term evolution (LTE) system, channel equalization makes compensation to restore the original signal, the paper puts forward iteration sphere decoding algorithm which combines traditional sphere decoding and the improved QR based on the conventional QR decomposition detection algorithm. It...

Industrial synergy mechanism and operation mode research based on the retail industry

Haiqiang Min, Xu Chen
In recent years, the rapid growth of commerce has led the upgrade of retail, real estate development mode. In the process, the trend of synergy development among retail, real estate and finance has been more and more obvious. In this paper, we analyzed the causes of the synergy development from three...

Third-party Logistics System Based on Lean Logistics

Weiwei Han
Currently the development of third-party logistics enterprises in China is facing opportunities and challenges, and urgently needs new management model. This paper discusses the third-party logistics system based on lean logistics from four aspects: lean-agile distribution, value stream analysis, the...

A Collaborative Filtering Recommendation Algorithm Incorporated with Life Cycle

Chonglin Zheng, Kuangrong Hao, Yongshen Ding
Collaborative filtering recommendation algorithm is the most successful technology for recommendation systems. However, traditional collaborative filtering recommendation algorithm does not consider the change of time information. For this problem this paper improve the algorithm with two new methods...

Study on the Inter-organizational Information System Adaptation Mechanism Based on Organizaitonal Identification

Ming Yin, Qi Liu, Zhanxing Zheng
The adaptation mechanism of inter-organizational information system based on organizational identification remains under explored questions in the area of information system. In order to overcome the inadequacy of previous research, this paper firstly seeks to elaborate on the previous literatures of...

Design of SSL VPN system based on RBAC access

Ya-qin Fan, Ge Zhang, Fei-fei Li, Xin Zhang
in order to solve the access control system loopholes, can appear the problem of chaotic management, security failure and conflict of competence, this paper studies the access control model, on the basis of the design of a SSL VPN oriented access control system, the authentication module, access control...

Information Technologies and Translation Instrumental Competence

Peihua Lei
This paper outlines the types of information technologies applied to translation today and translation sub-competences. A study was made in which students were motivated to participate in building DIY corpus based on a given task and to solve the problems in their former translation. It was found that...

Video Call Traffic Identification based on Bayesian Model

Ying Hou, Hai Huang, Kai Wang, Yu-hang Zhu
This paper proposes Bayesian statistical method to identify the video traffic by the symmetrical features and coding statistical characteristics of video calls. According to the problem of high computational complexity of the non-parametric probability density estimate method in the condition of large...