This paper begins with a brief introduction to RS code and Turbo code, then introduces the RS-Turbo concatenated code in AOS (Advanced Orbiting systems), and details its implementation process. Then, through quantitat...
详细信息
ISBN:
(纸本)9781479907571
This paper begins with a brief introduction to RS code and Turbo code, then introduces the RS-Turbo concatenated code in AOS (Advanced Orbiting systems), and details its implementation process. Then, through quantitative analysis of simulation results in simulated space channel and experimental results in TT&C system, the conclusion is that the concatenated code has higher coding gain, smaller complexity cost and shorter decoding delay. The advantages of this concatenated coding scheme from different points are analyzed. In particular, the impact of RS-Turbo concatenated code on measurement accuracy is explained at the end of the paper.
An IT-Architecture can be viewed as a high-level design that supports and restricts the construction of IT-systems of a given type. Starting from a list of general requirements, this paper gives an overview of the dim...
详细信息
An IT-Architecture can be viewed as a high-level design that supports and restricts the construction of IT-systems of a given type. Starting from a list of general requirements, this paper gives an overview of the dimensions of such a design. In addition, the various, often contradicting, architectural views that are relevant for the various stakeholders are discussed. Special emphasis is given to the modeling of the system behavior and the related timing and dependability constraints. Although, these issues are discussed in an object-oriented context, the underlying principles hold for other modeling techniques as well.
Recent technological advances have made multimedia on-demand services, such as home entertainment and home-shopping, important to the consumer market. One of the most challenging aspects of this type of service is pro...
详细信息
ISBN:
(纸本)9780897916950
Recent technological advances have made multimedia on-demand services, such as home entertainment and home-shopping, important to the consumer market. One of the most challenging aspects of this type of service is providing access either instantaneously or within a small and reasonable latency upon request. In this paper, we discuss a novel approach, termed adaptive piggybacking, which can be used to provide on-demand or nearly-on-demand service and at the same time reduce the I/O demand on the multimedia storage server.
The paper presents the temperature measurement and thermal conditions analysis system for the photovoltaic generator, located in the Department of Microelectronics and computer Science, at Technical University of Lodz...
详细信息
ISBN:
(纸本)9788392875604
The paper presents the temperature measurement and thermal conditions analysis system for the photovoltaic generator, located in the Department of Microelectronics and computer Science, at Technical University of Lodz. The work is a part of a comprehensive monitoring system to study dynamic behavior of photovoltaic devices in real-life conditions. The design of a custom microcontroller system and its implementation is shown, together with dedicated software, written in assembler. Finally, its operation principles, data acquisition details and cooperation with overall monitoring system are described.
作者:
Yan, Jie
Key Laboratory of Instrumentation Science and Dynamic Measurement Ministry of Education North University of China Taiyuan Shanxi China
Tapered fiber microlens is widely used to couple the laser light to fiber in communication and material processing. A new technique for making tapered fiber microlens is described. Firstly, one CO2 laser is used as an...
详细信息
Agility is difficult to measure due to the vagueness of the concept. The overall problem of measurement is limited to three fundamental questions: what to measure? How to measure it? How to evaluate the results? Measu...
详细信息
Agility is difficult to measure due to the vagueness of the concept. The overall problem of measurement is limited to three fundamental questions: what to measure? How to measure it? How to evaluate the results? measurement of enterprise agility has been a major topic of research since the inception of agility in the early 90s. Some measurement methods have been developed;they mainly remain tied to manufacturing industry. Thereafter, the concept of agility was extended to supply chains, business networks and software development. In this paper, we try to extend more the concept of agility to the e-government field through an evaluative framework for the measurement of e-government information systems (E-GIS) agility. The key idea of this framework is to combine the fundamental parts of an E-GIS with their operational parameters to evaluate the overall agility of the system. One of the advantages of this practical framework is that agility parameters are measured thanks to quantitative metrics, which allow decision-makers to examine and compare different systems at different agility levels.
Security quantification is a topic that has gained a lot of interest in the research community during the recent years. In this paper, a new method is proposed for modeling and quantifying attack effects on a computer...
详细信息
ISBN:
(纸本)9780769534862
Security quantification is a topic that has gained a lot of interest in the research community during the recent years. In this paper, a new method is proposed for modeling and quantifying attack effects on a computer system. In this work, intrusion process is considered as atomic sequential steps. Each atomic step changes the current system state. On the other hand, system tries to prevent and detect the attacker activity and therefore can transfer the current system state to a secure state. Intrusion process modeling is done by a semi-Markov chain (SMC). Distribution functions assigned to SMC transitions are uniform distributions. Uniform distributions represent the sojourn time of the attacker or the system in the transient states. Then the SMC is converted into a discrete-time Markov chain (DTMC). The DTMC is analyzed and then the probability of attacker success is computed based on mathematical theorems. The SMC has two absorbing for representing success and failure states of intrusion process.
Memristors are passive elementary circuit elements, which essentially are resistors with memory. This property makes the memristor well suited for applications in neuromorphic computation circuits. In such circuits th...
详细信息
ISBN:
(纸本)9781509009169
Memristors are passive elementary circuit elements, which essentially are resistors with memory. This property makes the memristor well suited for applications in neuromorphic computation circuits. In such circuits the functionality mainly depends on the memristor. Hence, different desired functionalities for the resulting circuit need appropriate devices. Normally, memristors are not commercially available. This makes the use of emulators, which mimic the memristive behavior, expedient. For this purpose, we introduce a method based on wave digital virtualization for emulating real memristors after identifying them from i-u-measurements. The so virtualized memristor can be directly integrated in a real circuit.
The proceedings contain 40 papers. The special focus in this conference is on computer Networks. The topics include: Molecular networks and information systems;sorting of quantum states with respect to amount of entan...
ISBN:
(纸本)9783642026706
The proceedings contain 40 papers. The special focus in this conference is on computer Networks. The topics include: Molecular networks and information systems;sorting of quantum states with respect to amount of entanglement included;management of web services based on the bid strategy using the user valuation function;a markovian model of a call center with time varying arrival rate and skill based routing;a novel multicast routing protocol for mobile sensor networks with topology control;on the lifetime maximization design of mobile Ad Hoc and sensor networks;modeling of the throughput capacity of hierarchical mobile ad hoc and sensor networks;object oriented vertical communication in distributed industrial systems;combining timed colored petri nets and real TCP implementation to reliably simulate distributed applications;adaptive streaming of stereographic video;the influence of electromagnetic disturbances on data transmission in USB standard;electromagnetic emission measurement of microprocessor units;software influence upon AX.25 protocol performance;buffer capacity adjustment for TNC controller;the reliability of any-hop star networks with respect to failures of communication nodes;dependencies and configurations of solutions in multicriteria optimization in nets;web traffic modeling for e-commerce web server system;on the performance of AQM algorithms with small buffers;adaptive RED in AQM;modelling of multi-tier internet applications with the use of BCMP queueing networks and simulation model in simulink;creating 3D web-based viewing services for DICOM images;efficiency analysis of the server-side numerical computations;adaptive approach to network security and the general concept of a distributed computer system designed for monitoring rock movements.
This paper presents a model-based method for road signs detection and tracking. The object is described by a CAD model and tracked through the sequence. The detection and tracking problem is modeled using the estimati...
详细信息
ISBN:
(纸本)9781424405886
This paper presents a model-based method for road signs detection and tracking. The object is described by a CAD model and tracked through the sequence. The detection and tracking problem is modeled using the estimation theory of hybrid processes, in which each sign of the database is described as a distinct mode. The proposed state-space modeling is here strongly nonlinear. Hence, one develops a Multiple Hypothesis Particle Filter solution that is based on the theory, of the Sequential Monte-Carlo Methods. This solution is then applied in real time to real road image sequences.
暂无评论