The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, there is a strong trend of intelligence and miniaturisation of equipments accord with the rise of the Intelligent Equipment, the Mobile Internet and the Internet of Things. As the comprehensive research subject of the Artificial Intelligence and Pattern Recognition, Statistics Theory, Signal Processing subjects, Speech Recognition has got enough attention and development for a long time,...
It introduces the association rules correlation theory in detail, and analysis the classical Apriori algorithm performance, makes the improvement to it. Before the natural connection to generate the candidate set, conducting a pruning process based on the concept lattice similarity, to reduce the number of connected set, thus to reduce the generation of candidate item sets size, to reduce the number...
MLAT (Multilateration) in the civil aviation is a typical sensor network which locates the positions of aircrafts by the TDOAs (Time Difference of Arrivals) of signal from the aircraft to the different remote stations. It is important for MLAT to ensure the clock synchronization. On the basis of CHAN algorithm, this paper proposes an improvement based on TDOA adjustment. In this method, a reference...
In order to detect the intrusion in the system, the information fusion technology was applied into intrusion detection. First, the audit data based on host and network data based on net were trained all together by using SVM and classification were realized. Then the D-S evidence theory was adopted to complete decision fusion. The performance of intrusion detection system is improved greatly, false...
A scheme is put forward in this paper of master-slave PLC control network based on distributive control model for fulfilling the vast control scope and adapting to the sordid conditions in coal mine signaling centralized and locking system. The implementation of controlling hardware is well discussed. The software is analyzed as well, primarily consisting of supervision program and communication programs...
An advanced threshold secret sharing scheme to identify cheaters is proposed in this paper by using authentication codes. The performance of the scheme is discussed. The results show that in the scheme the valid shareholders not only can identify the impersonation of an adversary, but also are able to detect cheating of some valid shareholders. In particular one honest shareholder is able to detect...
The stability of discrete time systems with single and double state-delay was analyzed in this paper. Lyapunov function was constructed to get the system's stability, where the LMI (Linear Matrix Inequation) was applied to simplify Lyapunov function. And the conclusion was finally extended to the discrete time systems with multiple state time-delay.
Helix is widely used in industrial modeling. Characteristic parameterization and modeling are based on helix parameterization. However, helix cannot be accurately represented by NURBS, and no helix interface for UG secondary development. It is difficult for modeling parameterization based on helix. This paper proposed a novel modeling method by using NURBS approximating helix, and presented the error...
In this paper, flight faults are generated and visual aircraft instruments are created as well as real-time information communication between simulation flight data and virtual instruments is established. Particularly, dynamical faults generation and its corresponding display system are developed and simulated in detail. Finally, the system is validated for authenticity and reliability by taking the...
The status of the remote monitor system is introduced and the composing and the principle of implement of the system are presented. Based on it, the function and the characteristic and each of modules of software and database design are introduced too. The system improves the performance and stability of supply power and reduces the times of power cut, it can forecast the possible fault through analyze...
ARP spoofing is a deception within the LAN caused by ARP protocol flaws, which could cause the whole network paralyzed and even worse users' important information stolen through spoofing. The features of ARP is introduced in detail, the update mechanism of ARP mapping table is summarized by ARP spoofing simulation experiment, and the process of ARP spoofing is analyzed. An effective solution which...
In the present work, we provide a type of block extension method base on instruction list and ladder-diagram drawing structure. This new method not only can transform instruction list into corresponding ladder-diagram, but also can give corresponding error message while the ladder-diagram can not be transformed. By programming proving, the algorithm is simple, practical, and universal. Especially,...
Iodine flowrate is an important coefficient, but coagulation and corrosiveness make the measurement inaccurate. The method of absorption spectroscopy can eliminate the influence and realized measurement in real-time by pursing hot gas and utilizing two lines absorption. It was sensitive to the total pressure in reaction cell. Technique of high-speed photography with CCD camera gave complementarities...
In this paper, KZQ-36T-300 multi-model controller is used for separate excitation electric motor which is used for material handing electric vehicle. It can control the motor rate and torque to make it in smooth, mute and low. The electromotor ECU testing system aim at the feature of KZQ-36T-300 multi-model controller, imitate many different road and working condition, imitate accelerator output the...
Analyzing the problem and key technology about integration of heterogeneity database, a distributed database integration model with global schema based on multi-agent technology is put forward. Firstly, DDB global schema and fragment and assign schema is designed according to actual instance of production organization. Secondly, multi-agent system of administration architecture is designed. Thirdly,...
Intrusion detection technology has developed over more than 30 years from the host-based to network-based and has become the indispensable security technology of information systems. On the basis of the study of the existing intrusion detection systems, this paper reviews the history of intrusion detection technology, and sum up the recent hot-spot problems researched. Then, six technical difficulties...
An air defense decision-making model based on modern artificial intelligence technology is introduced in this paper. It also solve many difficult problems during model establishing, such as design of neural network structure, network propagation algorithm, fuzzy control algorithm and data reduction algorithm. Simulation experiment with typical battlefield situation data is conducted. First, quantify...
According to characteristics of coal mine goaf, a suitable routing mechanism based on LEACH protocol was proposed. The mechanism's improvement including two sides: Firstly, LEACH cluster heads selection mechanism was improved. Secondly a routing algorithm of wireless sensor network was designed with the multi-path routing mechanism. Finally, the NS2 simulation result show that this new routing mechanism...
The standard FCM is sensitive to noise deficiencies. To solve this problem, this paper presents an adaptive FCM algorithm. By way of combining cluster validity function into FCM algorithm, the adaptive identification of the cluster Numberc can be realized The experimental results show that, the improved algorithm is a robust and efficient remote sensing image ossification method
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.