There are many means in reducing the active powerloss of distribution network, two important methods are feederreconfiguration and capacitor placement. Minimum NodalVoltage method (MNV) and Genetic Algorithms(GA) are ...
详细信息
There are many means in reducing the active powerloss of distribution network, two important methods are feederreconfiguration and capacitor placement. Minimum NodalVoltage method (MNV) and Genetic Algorithms(GA) are chosento solve the network reconfiguration problem and capacitorplacement problem, respectively. These two means are combinedtogether so much better effect of loss reduction can be achievedthan whichever one method alone. The methods presented in thispaper have been testified in real-time application in actualdistribution network.
Fast and efficient disparity estimation(DE)isa key technology in stereoscopic image sequenceprocessing. On the basis of analyzing the correlationbetween disparity vectors and motion vectors. a new fastdisparity estima...
详细信息
Fast and efficient disparity estimation(DE)isa key technology in stereoscopic image sequenceprocessing. On the basis of analyzing the correlationbetween disparity vectors and motion vectors. a new fastdisparity estimation algorithm for stereo video coding ispresented in this paper. Experimental results show that,compared with the full search algorithm, the proposedalgorithm can significantly reduce DE complexity whilethe reconstructed image quality is quite close to that offull search method.
In this paper, existing iterative multiuser detection tech-niques, including the iterative (Turbo) soft interferencecancellation, the iterative improved parallel interferencecancellation, the gradient descent algorith...
详细信息
In this paper, existing iterative multiuser detection tech-niques, including the iterative (Turbo) soft interferencecancellation, the iterative improved parallel interferencecancellation, the gradient descent algorithm and theslowest-descent search algorithm, are studied. Two newiterative multiuser detection methods, namely, the simpli-fied iterative soft interference cancellation, and the iter-ative slowest-ascent search algorithm, are developed andare compared with the above techniques. It is seen thatthe simplified iterative multiuser detection method signifi-cantly outperforms the other methods in coded CDMA sys-tems except the Turbo receiver, in additive white Gaussianchannels, and also it has low complexity.
IPSec protocols offer a standard securitymechanism, used for security service to upperprotocols (such as UDP nd TCP). This paperintroduces the design and implementation of RouterSecurity Subsystem based on IPSec, the ...
详细信息
IPSec protocols offer a standard securitymechanism, used for security service to upperprotocols (such as UDP nd TCP). This paperintroduces the design and implementation of RouterSecurity Subsystem based on IPSec, the importantpart of High Performance Security Router made byTsinghua University. We complete consummate andreliable security functions, use various optimalmethods to enhance the performance furthest.
This paper, using the new technologies and controlsolutions recently emerging in the area of industrial automation,brings forward a new design of distributed control system basedon PC and fieldbus. In the hardware des...
详细信息
This paper, using the new technologies and controlsolutions recently emerging in the area of industrial automation,brings forward a new design of distributed control system basedon PC and fieldbus. In the hardware design, the system is moredistributed using the field-installed I/O modules which replacethe I/O cards in the traditional DCS. And a kind of redundantProfibus-DP fieldbus is used as the reliable communication pathbetween the I/O modules and the CPUs in the DPU. While forthe software system of DPU we realize the control enginecompatible with the standard IEC61131.
In the case of authentication through anopen network, such as non-face-to-face trading,cryptography techniques are adopted (public keycryptography and digital signature) to avoid unauthorizeduse of the biometric infor...
详细信息
In the case of authentication through anopen network, such as non-face-to-face trading,cryptography techniques are adopted (public keycryptography and digital signature) to avoid unauthorizeduse of the biometric information and guarantee theintegrity of data. In this paper, the integrity andauthenticity of biometric information can be maintainedand verified using a digital signature technique. We havedeveloped a prototype system in which the system isapplied to a smart-card-based workflow. Initialevaluation of the prototype system is *** techniques can be used to authenticate people formore flexible application.
In this paper a new control scheme for uncertaintime-delay systems is put forward, in which the precise model ofthe plant is not necessary. The time delay term is taken outside thecharacteristic equation of the closed...
详细信息
In this paper a new control scheme for uncertaintime-delay systems is put forward, in which the precise model ofthe plant is not necessary. The time delay term is taken outside thecharacteristic equation of the closed-loop transfer function. Anyvariation of time deley doesn't influence the system's dynamicperformance and the steady state. And the change of the process'parameters doesn't influence the stability of the system. Theparameters of the controller, adopted as PI controller,don't needadjust frequently so that it is easy to control the system in *** simulations show that the proposed scheme is superiorto the Smith predictor in the presence of large uncertainty inprocess dynamics.
We introduced a newly developed textsummarization system. It supports both Chineseand English, while this paper focuses on Chineseprocessing. We apply 6 word level features and 3sentence level features to weigh each w...
详细信息
We introduced a newly developed textsummarization system. It supports both Chineseand English, while this paper focuses on Chineseprocessing. We apply 6 word level features and 3sentence level features to weigh each word andsentence. We also describe two new techniques,one is for processing the topic sensitive wordfeature and another is for processing the sentencelength feature. Primary subjective evaluationshows that these approaches are effective andefficient, and performance of the. system ispromising.
Digital watermarks have been proposed for thecopyright protections of multimedia products. Mostschemes were performed primarily for fidelityconsiderations, and not specifically to improve thedetector performance. In t...
详细信息
Digital watermarks have been proposed for thecopyright protections of multimedia products. Mostschemes were performed primarily for fidelityconsiderations, and not specifically to improve thedetector performance. In this paper, a robust and blindwatermarking scheme is presented. The concept ofcommunication with side information was applied at theencoder to improve the probability of detection withinacceptable fidelity, and the template matching techniquewas employed to estimate the undergone attacks inattacking channel. This scheme is optimized by theoptimal design of the encoder to match with the mediacontent and the decoder to adapt to the attack channelstate. Experiments show that our method is robust againstsome common attacks such as filtering, compression,rotation, scale, and translation. It can be applied to bothcolor and gray image.
The proposed protocol, Code Grouping Multiple Access(CGMA),partitions mobile users into virtual code groups toenhance channel utilization for multimedia traffic in a TDD-CDMA environment. CGMA performance has previous...
详细信息
The proposed protocol, Code Grouping Multiple Access(CGMA),partitions mobile users into virtual code groups toenhance channel utilization for multimedia traffic in a TDD-CDMA environment. CGMA performance has previouslybeen evaluated for both error free and error prone uplinkchannels [1]. It has been shown that CGMA allocates channelresources more fairly to mobiles while guaranteeing QoS forvoice service in comparison to reservation protocol such asfirst come first serve algorithm. In this paper, the delayperformance of CGMA and its fairness in resourcedistribution are evaluated assuming both uplink and downlinkerrors. Simulation results confirm that CGMA provides fairresource allocation under both error free as well as withuplink/downlink channel errors.
暂无评论