As generally acknowledged, the high step-up DC-DC converter is widely used in the sustainable energy system as the front-end stage of the DC-AC converter. Therefore, a high step-up converter combining one coupling ind...
详细信息
In this paper, a cascaded multilevel inverter with selective harmonic elimination and battery-balanced discharge function (CMI-SHE & BBD) is proposed. The input of each level of cascaded multilevel inverter circui...
详细信息
This paper introduced the concept and the Technical architecture system of IOT, Analysis the current development of IOT and the relative shortage of relying on technology influences the development of IOT, studied on ...
详细信息
This paper proposes a new Modular Multi-level Converter (M2LC) topology, which is based on an Inductive Power Transfer (IPT) technology. The modified M2LC topology employs an IPT system to control the capacitor voltag...
详细信息
Principle of anomaly detection technique based on a chi-square statistic was described. Algorithm of Chi-square statistical technique was designed. In order to verify the effect of principle and algorithm, testing dat...
详细信息
ISBN:
(纸本)9781479928606
Principle of anomaly detection technique based on a chi-square statistic was described. Algorithm of Chi-square statistical technique was designed. In order to verify the effect of principle and algorithm, testing data of sample of UNIX and Windows XP system was presented and compared. The results of this study show that chi-square technology achieves the 0% false alarm rate and the 100% detection rate for abnormal intrusion scenarios. All intrusion scenarios are detected at the first or second audit event.
This paper introduces the confidential asset management system based on RFID(radio frequency identification). The system uses 2.4 GHz RFID remote identification technology for real-time monitoring of confidential asse...
详细信息
ISBN:
(纸本)9781479928606
This paper introduces the confidential asset management system based on RFID(radio frequency identification). The system uses 2.4 GHz RFID remote identification technology for real-time monitoring of confidential assets, in order to accurately determine the trends of assets and prevent illegal outflow of confidential assets. The RFID technology is a communication technology that can identify a specific target and read the data via a radio signal. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. This paper focuses on the principle and function of the system based on the key RFID technique and the cloud computing technique. Future development direction and application direction of the confidential assets management system are also given in this paper.
This paper presents a gate driver, which has the output voltage with triple input voltage under only one positive-voltage source fed. Such a gate driver can reduce the number of voltage sources, and hence the size of ...
详细信息
In this paper we present different non-linear design tools applied on a Magnetic Levitation system for elevation control under the presence of parametric uncertainties and perturbations. The system in view is inherent...
详细信息
We put the major point on the selective relaying scheme, based on the OFDM-based decode-and-forward relay system. A two-stage transmission protocol is adopted. That means the source sends data to both the destination ...
详细信息
ISBN:
(纸本)9781479905614
We put the major point on the selective relaying scheme, based on the OFDM-based decode-and-forward relay system. A two-stage transmission protocol is adopted. That means the source sends data to both the destination and relay on the first stage. The relay retransmits a version of the received data on the second stage, if a certain threshold is reached. First, we give the capacity expression for this system and analyze the threshold determination for selective relaying. Aiming at improving the system capacity, resource allocation and sub carrier pairing are discussed then. According to our researches, the threshold is related to the channel coefficients of the source destination link and the source-relay link. Simulation results show that the selective relaying scheme with the resource allocation outperforms the schemes that every/no sub-carrier transmits data via relaying in the transmission, when the system capacity is taken into account.
The risk of information system is influenced by both attackers and defenders, so it is reasonable to consider the behaviors of both sides. In this paper a Risk Prediction Model based on Bayesian Game (RPM-BG) is propo...
详细信息
暂无评论