Machine to machine (M2M) communications will lead to dramatic changes in the applications and services offered to citizens, allowing smart city to become a reality. In this article, we first introduce the new tendency...
详细信息
With the continual scaling of semiconductor process technology, the circuit timing is increasingly impacted by process variations. It is thus important to categorize high-speed digital circuits into multiple bins of d...
详细信息
With the continual scaling of semiconductor process technology, the circuit timing is increasingly impacted by process variations. It is thus important to categorize high-speed digital circuits into multiple bins of different performances. However, the speed-binning process typically needs very long test application time. In this paper, we proposed a unified architecture, which can accomplish performance grading with a high confidence and short test application time. Moreover, the proposed architecture can be used for on-line circuit failure prediction and detection. Experimental results are presented to validate the proposed architecture.
According to the characteristics of pure delay, time-varying and nonlinear in brine freezing sinking flow control system, therefore, the author imported the fuzzy theory into intelligent immune feedback control algori...
详细信息
ISBN:
(纸本)9781467300889
According to the characteristics of pure delay, time-varying and nonlinear in brine freezing sinking flow control system, therefore, the author imported the fuzzy theory into intelligent immune feedback control algorithm and designed a kind of embedded intelligent flux controller based on fuzzy-immune adaptive PID algorithm. Results show that this controller has better static and dynamic control performance than traditional PID control and fuzzy PID control, what's more its overshoot is less, adapt ability is better, stable speed is faster, which has good significance to technology renovation of frequency control of coal mine freezing sinking.
This paper introduces the Canny edge detection algorithm and the implementation of the Canny edge-detection algorithm on an DSP. Canny edge detection significantly preserves the important structural properties in an i...
详细信息
Blind deconvolution algorithms for blur images have been in widespread use for a decade. However most of the methods suffer from issues like processing speed defects, robustness, ill-posed ness. In view of the current...
详细信息
As the user's identity and sensitive information are regularly used in the process of cloud service access control, there will be a need to protect the user privacy from disclosing to cloud provider. This paper de...
详细信息
As the user's identity and sensitive information are regularly used in the process of cloud service access control, there will be a need to protect the user privacy from disclosing to cloud provider. This paper describes a new access control policy based on group signatures in cloud service, which allows users to access the cloud services on behalf of group and prevents users from disclosing their privacy to the cloud service provider. To build our access control policy, we construct a double center access control model. On this basis, a scheme of access control based on group signatures is given, which is derived from of the short group signature. This scheme can manage multi-groups and validate the group certificates of users. We also prove the correctness of our scheme.
According to the principle of the acquisition of lateral multi-lens video logging images, the distortion correction method based on camera calibration model is proposed. The proposed method is consisted of two steps. ...
详细信息
According to the principle of the acquisition of lateral multi-lens video logging images, the distortion correction method based on camera calibration model is proposed. The proposed method is consisted of two steps. Firstly, space conversion. According to the image model, transform three-dimensional space coordinate into 2D image plane coordinate, establish corresponding relation of distortion image coordinate and image coordinate, find out the corresponding lens distortion parameters and the camera parameters, then work out correction coordinates through the distortion imaging formula based on the camera image model. Secondly, grey correction. On the basis of bilinear interpolation method, compute image pixel value, and achieve the effect of corrected image. The experimental results show that the use of the proposed method makes it possible to correct image distortion with high resolution realize image distortion correction quickly, and improve the image accuracy.
As Chinese government is exploring to establish a unified hospital registration system to solve the general problem of waiting in a long queue to make a hospital registration, correct registration is an efficient way ...
详细信息
Using fuzzy c-means clustering procedure to find a condensed set for Parzen windows estimation (ParzenFCMC) is proposed in this paper. The full Parzen windows estimator usually requires more computation and storage. H...
详细信息
Wireless ad hoc networks built up on such as the airborne, vehicular or shipborne, which have known geographic location when they had been equipped with GPS, have a requirement of real-time traffic for collision avoid...
详细信息
Wireless ad hoc networks built up on such as the airborne, vehicular or shipborne, which have known geographic location when they had been equipped with GPS, have a requirement of real-time traffic for collision avoidance in emergency. That is, the closest two nodes desire an assurance of the priority. Therefore, a new protocol called a distributed reservation MAC protocol (DR-MAC) has been presented. Based on geographic location, DR-MAC implements the reservation of control channel based on SOTDMA, further solves reservation of data channel. The algorithm design and the collision analysis are also introduced in this paper. The simulation results show that it can decrease the average end-toend delay and improve priority of the nearest nodes.
暂无评论