At present, physical verification of cable assemblies is mainly through simulation assembly in actual project. However, it leads to problems of a long period of production design and high cost. Virtual assembly techno...
详细信息
Environmental states retrieving is the major issue in the implementation of action-based access control model. In this paper, the environmental states retrieving mechanism based on ABAC (Action-Based Access Control) w...
详细信息
Pitch is one of the most important parameters to describe the speech characteristics. The paper proposed a new pitch detection algorithm for ultra-low-bit-rate vocoder based on dynamic programming as well as frequency...
详细信息
In order to meet the request of fast access of power system simulation software base on Oracle, two methods based on OCI (Oracle Class Interface) technology are presented in this paper. The method of Binding array is ...
详细信息
In order to realize on-side rescue after destructive natural devastation or biological and chemical contamination, a new quadrotor aircraft is designed, which can fly into some dangerous areas to detect and search. Th...
详细信息
The traditional method of heterogeneous data sharing can not describe the formal semantics of data and finds it difficult to solve the semantic heterogeneity in the heterogeneous information sharing. Based on the XML-...
详细信息
QoS (Quality of Service) constraintsfibased multicast routing is one of major issues in distributed multimedia on the network. An improved algorithm based CACO (Chaos Ant Colony Optimization) is proposed in this paper...
详细信息
Mobile learning is a relatively new research area, it is the basis of digital learning by the effective combination of mobile computing technology, make learners can at any time at any place you want to get the knowle...
详细信息
This essay presents the DSP + FPGA structure based high-performance image processing system. It aims at solving the overtime-processing problem brought by the increasing complexity of images through the cache-structur...
详细信息
In a recent paper [C.H. Hong et al., Opt. Commun. 283 (2010) 2644], a n-user quantum key distribution protocol with n quantum channels was presented. By analyzing its security, it is shown that this protocol is insecu...
详细信息
暂无评论