RCS (radar cross section) computation has been a main area of research work at the Syracuse Research Corporation (SRC) for a number of years. Sponsorships of projects in a variety of application areas over the years h...
详细信息
ISBN:
(纸本)0780307305
RCS (radar cross section) computation has been a main area of research work at the Syracuse Research Corporation (SRC) for a number of years. Sponsorships of projects in a variety of application areas over the years have made continuous research work possible in the field of electromagnetic scattering and the accompanying simulation software development. SRC's work to date in this area is summarized. Particular attention is given to the active library concept for target identification. An RCS prediction software named SRCRCS and an accompanying CAD modeling package named SCAMP are discussed. Applications of the simulation software are considered.< >
We define sensor middleware as the binding code mainly running between the sensor OS and applications providing programming abstractions to bridge the gap between application developers and low-level hardware. Hence i...
详细信息
We define sensor middleware as the binding code mainly running between the sensor OS and applications providing programming abstractions to bridge the gap between application developers and low-level hardware. Hence it serves the purpose of simplified integration of components developed by multiple technology vendors. middleware for distributed systems is a relatively mature research area with a considerable amount of work done on the aforementioned topics. In this paper we explain why standard distributed systems middleware solutions are not suitable to address wireless sensor network (WSN) problems. Illustrated by a health monitoring use case, we propose an enhanced middleware framework that better addresses the needs of WSN applications.
When an organization detects a security breach, it undertakes a forensic analysis to figure out what happened. This investigation involves inspecting a wide range of heterogeneous data sources spanning over a long per...
详细信息
ISBN:
(纸本)9781450328364
When an organization detects a security breach, it undertakes a forensic analysis to figure out what happened. This investigation involves inspecting a wide range of heterogeneous data sources spanning over a long period of time. The iterative nature of the analysis procedure requires an interactive experience with the data. However, the distributed processing paradigms we find in practice today fail to provide this requirement: the batch-oriented nature of Map Reduce cannot deliver sub-second round-trip times, and distributed in-memory processing cannot store the terabytes of activity logs needed to inspect during an incident. We present the design and implementation of Visibility Across Space and Time (VAST), a distributed database to support interactive network forensics, and libcppa, its exceptionally scalable messaging core. The extended actor framework libcppa enables VAST to distribute lightweight tasks at negligible overhead. In our live demo, we showcase how VAST enables security analysts to grapple with the huge amounts of data often associated with incident investigations.
Care models for chronic condition treatment place point-of-care in the community and at patient's home and imply an organized care system ("continuous care network"). The contribution of this work consis...
详细信息
ISBN:
(纸本)9781424451753
Care models for chronic condition treatment place point-of-care in the community and at patient's home and imply an organized care system ("continuous care network"). The contribution of this work consists in the proposal of a service framework to support information acquisition, integration and sharing in continuous care networks. The framework is based on a service-orientedmessage-oriented middleware ("SAI middleware") easing the development of context-aware and information integration applications. We describe an ongoing case study aiming at demonstrating the use of the service framework in a reference application scenario for patient conditions monitoring, alarm detection and policy-based handling.
A magnetic core memory is described which has a read-write cycle time of 2.18 μsec, an access time of 1 μsec, and a storage capacity of 1,179,648 bits. The array configuration and the design of the driving system ar...
详细信息
The most important application of fuzzy logic is designing controllers. Fuzzy logic controllers (FLC) are much easier to design than non-linear controllers of similar capabilities. The rules that a designer needs to c...
详细信息
ISBN:
(纸本)0780379187
The most important application of fuzzy logic is designing controllers. Fuzzy logic controllers (FLC) are much easier to design than non-linear controllers of similar capabilities. The rules that a designer needs to create are often based on their current experience and knowledge. Conventional FLCs use Center of Gravity or Mean of Maxima defuzzification methods, though other methods have been studied This paper compares the efficiency of many different models of the defuzzification process. The goal is to examine the accuracy of the output data and the amount of processing time required A simple controller that backs a truck up to a gate is used in the study. All of the variables are granulated with trapezoidal fuzzy numbers. Some of the defuzzification methods examined are Fast Center of Gravity, Mean of Maxima, True Center of Gravity and various new methods that have shown promise in application.
While group communication system have been proposed for some time, they are still not used much in actual systems. We believe that one reason for this is the lack of standardisation of group communication system inter...
详细信息
ISBN:
(纸本)0769519385
While group communication system have been proposed for some time, they are still not used much in actual systems. We believe that one reason for this is the lack of standardisation of group communication system interfaces. The paper proposes an architecture, using the standard decomposition into services, were services are based on standard interfaces: both interactions between services and interactions with the application use existing, open standards. A decomposition of the group communication into services is presented, along with a description of applicable standards. As an example, a group membership service based on the LDAP standard is discussed.
This paper deals with the utilization of "angular diversity" in GPR, an approach, which in comparison to the wide-spread "fixed-offset" GPR helps to improve clutter robustness as well as image reso...
详细信息
ISBN:
(纸本)9076928045
This paper deals with the utilization of "angular diversity" in GPR, an approach, which in comparison to the wide-spread "fixed-offset" GPR helps to improve clutter robustness as well as image resolution. The latter can be achieved by means of enhanced processing techniques-compared to the widely use SAR or tomographic approaches-which rely on the availability of angular diversity data. The paper discusses data acquisition by means of multistatic measurement setups and numerical MoM simulations. The "Factorization method" is proposed as an image formation scheme, which, amongst other advantages, requires only low computational effort. 3-D imaging results from numerical datasets in free-space and a stratified background are presented and discussed.
The article presents the analysis of the existing Internet of Things ( IoT) systems, identifies three levels of application: household, civil and industrial. The shortcomings of the implementations associated with the...
详细信息
ISBN:
(纸本)9781538683644
The article presents the analysis of the existing Internet of Things ( IoT) systems, identifies three levels of application: household, civil and industrial. The shortcomings of the implementations associated with the popular client-server architecture are revealed. The possibility of building scalable solutions in a service-oriented architecture is considered. Argued the merits of such decisions, providing compatibility, fault tolerance and security at any level of the application of the IoT system. The description of the developed automatic room ventilation system and intersection counting system with data transmission over a radio channel are given as examples.
暂无评论