The design of tracking loop filter for software GPS receiver is flexible, and the performances of different tracking loop fllters are analyzed in software receiver. The design methods and characteristics of second...
详细信息
The design of tracking loop filter for software GPS receiver is flexible, and the performances of different tracking loop fllters are analyzed in software receiver. The design methods and characteristics of second-order tracking loop filter, the third-order tracking loop filter, and the secondorder IMU-assisted-based tracking loop filter are introduced. The tracking loop filter model based on the Kalman filter is designed, and the simulation result shows that, the Kalman tracking loop filter can accurately track the dynamic signal. Because that the IMU can remove most of dynamics from the incoming signal between the satellite and receiver, allowing for a tightening of the signal tracking loops and a commensurate improvement in noise mitigation.
Collaborative filtering systems have achieved great success in both research and business applications. One of the key technologies in collaborative filtering is similarity measure. Cosine-based and Pearson correl...
详细信息
Collaborative filtering systems have achieved great success in both research and business applications. One of the key technologies in collaborative filtering is similarity measure. Cosine-based and Pearson correlation-based methods are popular ways for similarity measure, but have low accuracy. In this paper, we propose a novel method for similarity measure, referred as hierarchical pair-wise sequence (HPWS). In HPWS, we take into account both the sequence property of user behaviors and the hierarchical property of item categories. We design a collaborative filtering recommendation system to evaluate the performance of HPWS based on the empirical data collected from a real P2P application, i.e. "byrBT" in CERNET. Experiment results show that HPWS outperforms traditional Cosine similarity and Pearson similarity measures under all scenarios.
In this paper a new Persian banknote recognition system using wavelet transform and neural network has been proposed. The required images for the selected banknotes are obtained using a scanner. The color images a...
详细信息
In this paper a new Persian banknote recognition system using wavelet transform and neural network has been proposed. The required images for the selected banknotes are obtained using a scanner. The color images are first converted to gray scale images, and then the discrete wavelet transform (I)WT) is applied on the selected images and features are extracted. Finally, a multi layered Perceptron (MLP) Neural Network (NN) is presentedto classify eight classes of interest, which are 50, 100, 200, 500, 1000, 2000, 5000 and 10000 toman notes. The system was implemented and tested using a data set of 320 samples of Persian banknotes;40 images for each sign (from both sides). The experiments showed excellent classification results. The system was able to recognize more than 99% of all data, correctly.
How to help enterprises realize cost minimum and profits maximum, which is the goal of many foreign trade enterprises. Based on the theoretical basis and practical basis,this paper analyse international trade fina...
详细信息
ISBN:
(纸本)9781467306898
How to help enterprises realize cost minimum and profits maximum, which is the goal of many foreign trade enterprises. Based on the theoretical basis and practical basis,this paper analyse international trade financing portfolio under cost constraints, for MK corporate case, raise the financing strategy of corresponding to the greast financing amounts under financing constraints.
In view of shortage of traditional spatial interpolation calculation needs a lot of time, putting forward spatial interpolation calculation method based on cloud calculation. This paper builds cloud computing plat...
详细信息
In view of shortage of traditional spatial interpolation calculation needs a lot of time, putting forward spatial interpolation calculation method based on cloud calculation. This paper builds cloud computing platform of space interpolation calculation, discusses the key technologies of the cloud computing in realization spatial interpolation calculation, emphases load balancing schedule between client's Map / Reduce and client. Tests show that cloud-based spatial interpolation improves the efficiency of execution time, it is conducive to parallel computing, and it has some theoretical significance and application value.
A method of spectral reconstruction based on FLAASH (Fast Line-of-sight Atmospheric Analysis of Spectral Hypercubes) is introduced in this paper. A scene of Hyperion image is adopted with hypersepctral data in Octo...
详细信息
A method of spectral reconstruction based on FLAASH (Fast Line-of-sight Atmospheric Analysis of Spectral Hypercubes) is introduced in this paper. A scene of Hyperion image is adopted with hypersepctral data in October 14th, 2008 in the Mountainous regions of Guizhou. The FLAASH model is adopted spectral reconstruction five typical objects. Atmospheric water vapor absorption band are removed(1346nm-1467nm and 1800nm-1971nm). The results show that, Vegetation reflectance in the visible band has a significant reflectance peak in green band, and have high reflection in the near infrared region due to multiple scattering effects. Water in the entire spectral range has a low reflection. Experiment and reasonable result could be achieved to improve performance of Hyperion,.
In the past decade, internet of things (IoT) has been a focus of research. Security and privacy are the key issues for IoT applications, and still face some enormous challenges. In order to facilitate this emergin...
详细信息
In the past decade, internet of things (IoT) has been a focus of research. Security and privacy are the key issues for IoT applications, and still face some enormous challenges. In order to facilitate this emerging domain, we in brief review the research progress of IoT, and pay attention to the security. By means of deeply analyzing the security architecture and features, the security requirements are given. On the basis of these, we discuss the research status of key technologies including encryption mechanism, communication security, protecting sensor data and cryptographic algorithms, and briefly outline the challenges.
This Wireless sensor networks will be mapped to the matrix, the points on the matrix form different clusters, cluster heads according to their load and communication cost make the sensor cluster, the cluster key s...
详细信息
This Wireless sensor networks will be mapped to the matrix, the points on the matrix form different clusters, cluster heads according to their load and communication cost make the sensor cluster, the cluster key space corresponds with the set of key pool one to one, the sensor nodes select keys from the key subset which they belong to, establishing shared key with the cluster nodes easily. Nodes in different clusters between clusters can point to something within the matrix east, west, south, north, southeast, northeast, southwest, northwest of radiation to establish a shared key. The paper presents a wireless sensor networks key management scheme based on cluster radiation matrix, which has great scalability and anti-destroying ability.
In the paper attacks in view of the procedure loophole, proposed when the procedure movement from restores and returns draws hack the method. First knows in the method to the procedure entrance point returns as th...
详细信息
In the paper attacks in view of the procedure loophole, proposed when the procedure movement from restores and returns draws hack the method. First knows in the method to the procedure entrance point returns as the procedure draws hack the spot, next when procedure collapse distinguishes and locates the procedure loophole, finally analyzes between the loophole input and exterior input dependent relations distinguishes the triggering procedure loophole the procedure entrance point, and returns to this input point correspondence procedure draws back an achievement this procedure from to restore returns draws back the condition to carry on to the procedure draws back, causes the procedure to be possible to continue the normal operation. The experimental result indicated that, the method can succeed the recognition to attack to the realistic software loophole and completes the procedure from to restore draws back.
The kinematics model of robot is established based on the specific structure of 6R robot. In consideration of the robot base movement and the actuators replacement, the key problem of robot inverse kinematics is s...
详细信息
The kinematics model of robot is established based on the specific structure of 6R robot. In consideration of the robot base movement and the actuators replacement, the key problem of robot inverse kinematics is separated and a new simple method for deriving inverse kinematics without complex matrix inversion is developed. Furthermore, by analyzing the procedure of solution, the author optimizes the solution algorithm in favor of programming realization to satisfy the demand of off-line programming and real-time control. Finally, the validity of the solution of forward and inverse kinematics is verified by simulation experiments. And the result can be used on the robot which has similar mechanical configurations.
暂无评论