In this paper, AD637 Root Mean Square (RMS) chip is used to convert the induced voltage signal in the coil into DC signals. A differential amplifier is used to convert the fast DC signal into a pulse signal with the d...
详细信息
with the development of the network, people are more and more dependent on it and also have higher requirements on its convenience and manipulation. Based on Windows platform, long-range ordering system, which has tak...
详细信息
In P2P network, the search function of file resources is one of the important reasons for its rapid development. It brings users convenience and is faced with many safety problems as well. This paper presents a P2P fi...
详细信息
ISBN:
(纸本)9781612846316
In P2P network, the search function of file resources is one of the important reasons for its rapid development. It brings users convenience and is faced with many safety problems as well. This paper presents a P2P file search system based on the RealPeer framework and a P2P system performance test platform is simulated. Using the CL-PKC security authentication mechanism and LDAP, the search system has realized the peer identification and the effective authentication for the file information transferred, and has ensured the integrity and reliability of data. It provides a new solution for the P2P network file search system.
Cameras' miniaturization enable us feasible to capture photos and video at anywhere and anytime, even we wear them on human body and look the world in egocentric point of view. However, image quality degradation i...
详细信息
With development of embedded database technology, network performance of mobile-device and standardization of data management have a significant change. For characteristics of high reliability and real-time that Wi-Fi...
详细信息
With development of embedded database technology, network performance of mobile-device and standardization of data management have a significant change. For characteristics of high reliability and real-time that Wi-Fi Commodity Rapid Positioning System terminal has, embedded database SQLite3 is proposed to manage system bulk data like storing, operating maintaining. Combined with enterprise requirement, this paper analyses the processing in database design and SQLite3 operate procedure under ARM-WindowsCE5.0. Besides the detail of porting SOLite3 based on ARM-Windows CE5.0 is also stated in the paper. Finally the test results show that SQLites3 embedded in the Product Rapid Positioning System is stable and reliable.
Risk management includes phases such as risk identification, risk assessment and risk control. Little work has focused on risk summarization, which is a useful phase of risk management. Risk summarization means a list...
详细信息
Risk management includes phases such as risk identification, risk assessment and risk control. Little work has focused on risk summarization, which is a useful phase of risk management. Risk summarization means a list of occurred risks, risk summarization can also means relative documentation for risk management actions. This study presents summarization indices to evaluate the risk management efficiency. The indices include expected success rate, risk identification ratio, actual key risk ratio, actual key risk identification ratio, etc. The study aims at helping to fill a vacancy of risk summarization in risk management domain.
Front-end converters for distributed power system (DPS) applications are extensively used in telecommunication systems to supply load converters and to charge batteries to provide backup energy during power grid black...
详细信息
This paper analyzes characteristics of CDMA2000 reverse link HPSK modulation pattern, establishes the model of mobile station transmitted signals and observation station received signal and deduces flow of capture usi...
详细信息
This paper mainly deals with the problem of detecting a target in SIRV clutter with steering vector mismatches. Assuming that the mismatch of the steering vector is satisfied the conic constraint, the generalized like...
详细信息
暂无评论