In this work we study a problem which has been bothering both passengers and operators in the public transportation system long enough – the Bus Bunching *** typically means twoor more buses of the same service route...
详细信息
In this work we study a problem which has been bothering both passengers and operators in the public transportation system long enough – the Bus Bunching *** typically means twoor more buses of the same service route getting tooclose together sothat they "bunch" each other. Itis undesired because it usually increases the waiting time of passengers before and after the arrival of the bunched buses. We analyze the cause of the bus bunching problem, and propose a new solution, namely the Flaxi Fare Bus System, toreduce the problem. Itis different from existing solution because it works on fixing the demand of passengers from the passenger's side,instead of solely on the supply side of bus operators and drivers.
This paper mainly introduced the research on constructing Mongolian Treebank based on phrase structure grammar. Having Considered related Mongolian Treebank work and Mongolian words characteristics, we developed a Mon...
详细信息
This paper mainly introduced the research on constructing Mongolian Treebank based on phrase structure grammar. Having Considered related Mongolian Treebank work and Mongolian words characteristics, we developed a Mongolian syntactic tagset. The tagsetincludes twokinds of tags. One is syntactic constituent tag and the other is grammatical relation tag. On the basis of the tagset, we developed the Mongolian Treebank auxiliary processing system. Finally, we built a Treebank that contains 3645 sentences and did an experiment on this Treebank.
This paper presents the parameters design, modeling and performance analysis of the Sigma-Delta Modulator(SDM) for chromatography application. Chromatograph instruments often have rigid requirements tothe output analo...
详细信息
This paper presents the parameters design, modeling and performance analysis of the Sigma-Delta Modulator(SDM) for chromatography application. Chromatograph instruments often have rigid requirements tothe output analog signal in signal processing. In order toensure the high resolution, it requires not only the noise is very small and the signal distortion is not existence. The rate of signal tonoise of SDM usually should be higher than 106 dB. Specially, the frequency of chromatography signal is very low, often lower than 2Hz. Itis different from other applications. In this paper, the main parameters of SDM for chromatography are designed and the topology of modulator is optimized. Finally, simulations are conducted by simulink modeling. Results show that the proposed SDM is stable and suitable for chromatography application.
As the development of heterogeneous embedded Systems-on-Chip with a multitude of hardware accelerator coprocessors creates new possibilities for evolution in aerospace, medicine, communications and consumer eras, impr...
详细信息
As the development of heterogeneous embedded Systems-on-Chip with a multitude of hardware accelerator coprocessors creates new possibilities for evolution in aerospace, medicine, communications and consumer eras, improving reliable performance of systems is therefore increasingly important and challenging. Our contributions pertaining to this context are two-fold. We focus on enhancing reliability in the execution of coprocessor tasks with a priori known execution times by allowing an embedded system to identify anomalous software behaviors and additionally to provide rapid online reconfiguration and re-execution in run-time. We present an innovative methodology that combines hardware and software techniques for flexibility, through essentially employing low-cost on-line monitoring, debugging and real-time replacement of the failing sections of software algorithms in an embedded multi-core system. The proposed mechanisms introduce negligible performance degradation, reduced hardware cost and require minimum code instrumentation.
Recently many frameworks are used in software development without proper documentation, and are misused by application developers in calling framework APIs. Debugging a failure caused by a wrong API call is difficult ...
详细信息
Recently many frameworks are used in software development without proper documentation, and are misused by application developers in calling framework APIs. Debugging a failure caused by a wrong API call is difficult and requires a proper supporting technique. In our preceding study we developed a dynamic analysis technique to detect possibly unexpected side effects that cause failures. In this paper, we introduce a case study to identify a wrong API call using this technique.
Based on the recent research and statistics by Symantec, significant amount of all global web traffic and email traffic is marked as spam. Spambot is basically a robot that maliciously traverses the World Wide Web (WW...
详细信息
Based on the recent research and statistics by Symantec, significant amount of all global web traffic and email traffic is marked as spam. Spambot is basically a robot that maliciously traverses the World Wide Web (WWW), and gathers information, email addresses, etc. For the spammer. The increasing growth of spam bot sophistication advances in the introduction of Spam 2.0, which infiltrate legitimate Web 2.0 unsolicited. This leads to various unwanted outcomes, such as the appearance of spam pages as the top search engines results due to excessive usage of popular terms, unreal web-pages visit rate, spam emails, and wastes of resources. Here we present an efficient method to detect web spam bot in the presence of decoy actions, by applying efficient approximate string-matching techniques. Our preliminary experimental results show that the proposed method is successful for the classification of web spam bot in the presence of decoy actions, hence eliminating spam in Web 2.0 applications.
A great many algorithms of videoencryption have been proposed nowadays with the necessity of data rights management, especially the selective videoencryption algorithms, which ensure the security of the information an...
详细信息
A great many algorithms of videoencryption have been proposed nowadays with the necessity of data rights management, especially the selective videoencryption algorithms, which ensure the security of the information and meanwhile reduce the data toencrypt. The residue data, intra-prediction modes, inter-prediction modes and motion vectors are key elements that are usually partially or completely selected toencrypt tokeep the security. In this paper, a new encryption algorithm that encrypts different elements according todifferentintra-prediction or inter-prediction modes for the H.264 standard is proposed. This novel algorithm keeps format appliance and has little impact on compression. Mostimportantly, it has flexible security levels with different applications.
This paper proposed a research model toinvestigate the factors that drive users toparticipate in interest communities. The model takes a socio-psychological perspective of flow theory, social presence theory, social c...
详细信息
This paper proposed a research model toinvestigate the factors that drive users toparticipate in interest communities. The model takes a socio-psychological perspective of flow theory, social presence theory, social cognitive theory and organizational commitment. An online survey was conducted and data was analyzed using structural equation modeling(SEM). The results showed that cognitive absorption, social presence and sense of belonging significantly affect behavioral intention, and social presence has a positive effect on cognitive absorption. This study helps tounderstand socio-psychological factors and consequent behavior of users on interest communities.
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to r...
详细信息
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital world. There are a lot of speculations and future forecasts about the Internet of Things devices. However, most of them are vendor specific and lack a unified standard, which renders their seamless integration and interoperable operations. Another major concern is the lack of security features in these devices and their corresponding products. Most of them are resource-starved and unable to support computationally complex and resource consuming secure algorithms. In this paper, we have proposed a lightweight mutual authentication scheme which validates the identities of the participating devices before engaging them in communication for the resource observation. Our scheme incurs less connection overhead and provides a robust defence solution to combat various types of attacks.
According tothe characteristics of the stratospheri satellite tether, consider the tether's own gravity and flexibility build the model of the tether by using piecewise analysis an iterative calculation method. Th...
详细信息
According tothe characteristics of the stratospheri satellite tether, consider the tether's own gravity and flexibility build the model of the tether by using piecewise analysis an iterative calculation method. Then, combined with th overpressure balloon and the pneumatic sail, establish meridional motion model of the "balloon- tether – pneumati sail" flexible multi-body flight system. Based on the fuzzy contromethod, according tothe deviation of the north and sout direction's expectations position and actual position of th balloon, design the control system of the pneumatic sail by usin the self-tuning fuzzy PID control method. Simulation results hav shown that the pneumatic sail using this method can achieve th meridional orbit steady control of the stratospheric satellite i both steady wind field and unsteady wind field.
暂无评论