The paper designs a method based on RS-485 to achieve the communication between the VDR system and the detection system on having an alarm-reporting function when the navigation light's filament is in a state of b...
详细信息
Mobile phone video chat is one of the most important services based on the 3rd generation telecommunication. Supported by this system, the mobile devices can have a video chat with other mobile devices and terminals b...
详细信息
Combined GPRS network data transmission, the advanced GPS satellite positioning and other key technologies, an embedded vehicle intelligent monitoring system could be achieved. This paper introduced the development of...
详细信息
ISBN:
(纸本)9780769549354
Combined GPRS network data transmission, the advanced GPS satellite positioning and other key technologies, an embedded vehicle intelligent monitoring system could be achieved. This paper introduced the development of main device driver, application program design of embedded video capture card, GPS, and GPRS. This build of embedded software system will help to achieve the intelligent vehicle monitoring system and improve the degree of networking. With the embedded mu C/OS-II real-time multi-threading technology to solve the problem of multi-task parallel processing in system, in order to ensure system stability, reliability and flexibility, make the system more practical application value[1].
Base on the Multi-Agent system with basic research and Multi-Agent Intelligent Management Information system for theory andapplication, to design a framework for intelligent management information system model thereb...
详细信息
Fully homomorphic encryption scheme (FHE) has numerous applications, especially in the cloud computation. Recently, FHE has been the focus of extensive study, but mostly were researching into the construction and effi...
详细信息
ISBN:
(纸本)9780769549354
Fully homomorphic encryption scheme (FHE) has numerous applications, especially in the cloud computation. Recently, FHE has been the focus of extensive study, but mostly were researching into the construction and efficiency of the scheme, a fat lot focus on the application of the scheme. In this paper, we present a new system for searching on encrypted data which combined ABE (Attribute based Encryption) and FHE. Our system enables anyone even without private-key of the encrypted data to search the data. In the end, we discuss the application of FHE on outsourcing of computation and present two different systems matched the different requirement.
This paper puts forward an emergency dynamic simulation system based on computational experiments method and cellular automata modeling according to the features of mine fire emergency management. The system has chara...
详细信息
By means of accelerating the fuzzy Analytic Hierarchy Process(AHP) screening index of genetic algorithm, this paper constructs evaluation index system of computer network security, puts forward the information entropy...
详细信息
ZigBee technology brings about the application of wireless communication and data transformation technology in transformation system due to its low cost and low power consumption. This paper presents a solution of acc...
详细信息
modeling and Simulation is a discipline for developing a level of understanding of the interaction of the parts of a system, and of the system as a whole. The level of understanding which may be developed via this dis...
详细信息
ISBN:
(纸本)9783037853634
modeling and Simulation is a discipline for developing a level of understanding of the interaction of the parts of a system, and of the system as a whole. The level of understanding which may be developed via this discipline is seldom achievable via any other discipline. A simulation is the manipulation of a model in such a way that it operates on time or space to compress it, thus enabling one to perceive the interactions that would not otherwise be apparent because of their separation in time or space. A model is a simplified representation of a system at some particular point in time or space intended to promote understanding of the real system.
In RFID systems, miss reading is a common phenomenon, so accurate data cleaning become an essential task for the implementing of an RFID-based system. BBS is a behavior-based unreliable RFID data smoothing system, and...
详细信息
暂无评论