The development of embeddedsystem (ES) promotes the trend that the numerical-control equipment becomes more networked and intelligent. ES is the kernal of network and intelligence, yet the image data with contained i...
详细信息
Electronic tolling collection (ETC) will be applied in the construction of the new national highway network in China and the Chinese standard has been released. A 5.8 GHz receiver satisfied the standard is one of the ...
详细信息
A low power limiting amplifier designed for received signal strength indicator of a 5.8 GHz ETC receiver is presented in this chapter. systematic analysis is carried out first to determine the optimal number of gain s...
详细信息
Robot, spaceship and other applications that can be called autonomous Cyber-Physical systems (CPS) are all smart embeddedsystems, which usually run in open environment by themselves with inhered intelligent capabilit...
详细信息
IEEE 802.15.4/ZigBee sensor networks support small power consumption and node expansion compared to other network standards for WSN. Body sensor networks (BSN) require a number of sensors for sensing medical informati...
详细信息
In multi-domain environments, the risk of access policy for workflows is influenced by many factors, and it is difficult to calculate the accurate value of risk combining these factors. But choosing an access policy d...
详细信息
In multi-domain environments, the risk of access policy for workflows is influenced by many factors, and it is difficult to calculate the accurate value of risk combining these factors. But choosing an access policy does not need to know the specific value of risk, only to know the partial order of risks. This paper introduces the concept of risk, proves that the partial order of risks is a lattice, which can ensure implementation of the multi-level security policy. And the risk of access policy can be compared using the lattice effectively. Then, according to it, this paper proposes an algorithm to determine the access policy. It can reinforce the security of workflow systems in multi-domain environments.
Finding an accurate network null model for protein-protein interactions (PPI) networks is an important and fundamental problem in today's systems biology. A number of graph models were introduced to model and anal...
详细信息
This paper presents a coevolutionary memetic particle swarm optimizer (CMPSO) for the global optimization of numerical functions. CMPSO simplifies the update rules of the global evolution and utilizes five different e...
详细信息
This paper presents an implementation of robot localization algorithm using FPGA technology. The adopted localization method uses webcam tracking images. This technique has been developed and implemented for the motio...
详细信息
ISBN:
(纸本)9781467315906
This paper presents an implementation of robot localization algorithm using FPGA technology. The adopted localization method uses webcam tracking images. This technique has been developed and implemented for the motion of the robot from an initial position towards another desired position. Firstly, we have validated our approach on PC platform using C language and OpenCV library. Secondly, for the autonomous navigation, a mixed HW/SW implementation was been developed using a high performance version of the NIOS processor coupled with a hardware accelerator. Experimental tests on Altera Cyclone III FPGA Starter Kit proved the effectiveness of the proposed architecture.
A novel four-band CPW-fed antenna simultaneously satisfied the requirement for Radio Frequency Identification (RFID) tag and WiMAX /WLAN applications is reported in this paper. Limited to 30×30 mm2 area on a PCBo...
详细信息
暂无评论