This paper studies the problem of degree constrained minimum radius (DCMR) spanning tree in overlay multicast routing. A new heuristic greedy routing algorithm called degree-delay compact tree (DDCT), which is based o...
详细信息
This paper studies the problem of degree constrained minimum radius (DCMR) spanning tree in overlay multicast routing. A new heuristic greedy routing algorithm called degree-delay compact tree (DDCT), which is based on both degree constraints-delay integration and application layer topology optimum strategies, is proposed. The simulation results show that, comparing with similar algorithm having the same computing time complexity, the DDCT algorithm presents better performance all in radius, cost and link's reduplicate packages of the overlay multicast tree.
This paper presents the design and implementation of a wideband power amplifier for UWB applications, covering the lower band frequencies of 3.1 GHz to 4.8 GHz. To achieve sufficient linearity and efficiency, this PA ...
详细信息
This paper presents the design and implementation of a wideband power amplifier for UWB applications, covering the lower band frequencies of 3.1 GHz to 4.8 GHz. To achieve sufficient linearity and efficiency, this PA operates in the class-AB regime, delivering an output power of -4.2 dBm at an input 1 dB compression point of -22 dBm for a 4 GHz signal. This PA has a differential input and a single-ended output that has been matched to 50 /spl Omega/ at both ends. Complete design and implementation was done using TSMC 0.18 /spl mu/m CMOS technology and it consumes a very low power of 25 mW, while realizing a flat gain of 19/spl plusmn/1 dB across the whole band of operation.
The MPEG-4 AAC introduces a new tool called Perceptual Noise Substitution (PNS) whose function is to use locally generated noise to replace the noise inside the coded music. The key issue to the PNS tool relies on the...
详细信息
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC...
详细信息
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.
In order to help ISPs to deploy a mobile IP network into current Internet environment with satisfying users' mobility requirements, this paper evaluates and compares the performance of MIPv4 and MIPv6 networks. Th...
详细信息
ISBN:
(纸本)076952432X
In order to help ISPs to deploy a mobile IP network into current Internet environment with satisfying users' mobility requirements, this paper evaluates and compares the performance of MIPv4 and MIPv6 networks. This paper shows that TCP performance in MIPv6 network outperforms that of MIPv4 network in terms of amount of dropped packets and lasting the connection with mobile node and corresponding node. And so, in this paper, we design a simple deployment approach, which all mobile node operates in MIPv6 networks under fixed IPv4 network environments
We believe that with regard to the information technology applications in education, one student one computing device is the future and long-term trend. Many related studies on learning systems have been carried out, ...
详细信息
We believe that with regard to the information technology applications in education, one student one computing device is the future and long-term trend. Many related studies on learning systems have been carried out, from applying the simplest functions of the remote controller to the very powerful capabilities of the tablet PC. Based on this research spectrum, this paper focuses on the improvement of the pocket electronic dictionary, which is a very popular personal device among students to facilitate English learning, to serve as an individual's learning device called English learning mobile device (ELMD). From using it simply to learn English, its functions are expanded to provide interactions in the classroom. At the same time taking into account the teachers and parents' participation to form a completed English learning scenario. Thus, a learning-centered, class-centered, and interactive-centered wireless technology enhanced language learning environment could be realized in ordinary classroom.
We developed ultra-wideband impulse type ground penetrating radar (UWB-GPR) system with 100-300MHz frequency band at -10dB bandwidth. The prototype of the system was tested in real environment and 2D visualization of ...
详细信息
ISBN:
(纸本)078039433X
We developed ultra-wideband impulse type ground penetrating radar (UWB-GPR) system with 100-300MHz frequency band at -10dB bandwidth. The prototype of the system was tested in real environment and 2D visualization of raw data was achieved. Experimental results show that UWB-GPR system has a good ability in detecting for buried metal objects between 0.5m and 3m depth under ground in domestic field.
In this paper, it discuss the analytical method of ATBM interception via TVM (Tracking Via Missile), it use the modified CLOS(Command to Line of Sight) in the terminal phase. The major difference between conventional ...
详细信息
In this paper, it discuss the analytical method of ATBM interception via TVM (Tracking Via Missile), it use the modified CLOS(Command to Line of Sight) in the terminal phase. The major difference between conventional CLOS is observation (Reference) point, which is changed from the ground to seeker "lock-on" position in collision course. The second difference occur in the constant P, which is the ratio of speed of missile and target, the value is decreased from 1.5 to 0.7-0.5 and form as a head-on collision. It also give a rigorous study for some methods of CLOS, such as Locke method, Jalali-Naini method and Wen's method, to make some refining results. Under some assumption, the paper give a prediction for the best lock-on point, and the angle of lock-on, it can obtain a collision with the most accurate and the best energy consumption in the interception course.
The Gyroscope-free inertial navigation system can measure the direction, velocity and position of a vehicle after a suitable configuration and mechanization. Because of system error effect, the navigation error of a G...
详细信息
The Gyroscope-free inertial navigation system can measure the direction, velocity and position of a vehicle after a suitable configuration and mechanization. Because of system error effect, the navigation error of a Gyroscope-free INS is deeply affected by the time influence. This paper presents three important research issues. The first is the navigation equations of a Gyro free (six-accelerometer) INS that is based on the tangent-plane coordinate. The second is error equations of the proposed strap-down six-accelerometer INS. The third is a novel method for the integration of the six-accelerometer INS and the GPS. A superior result of simulation is found that the integrated INS/GPS can possess a more accurate navigation error, it almost have two orders less than conventional INS. The novel method of integrating six-accelerometer INS and GPS would be considered in auto-pilot and UAV design for the future application.
Call center technology has been widely used in China, including industries of banking, railway, telecommunication, electron, insurance, and so on. But the actual effects and benefits brought by adoption of call center...
详细信息
Call center technology has been widely used in China, including industries of banking, railway, telecommunication, electron, insurance, and so on. But the actual effects and benefits brought by adoption of call center are really poor. This paper analyzes the situation of call center's adoption in several major industries in China and also analyzes the existing problems, From the point of view of strategies of enterprises and call center, this paper puts forward a set of strategic and theoretical suggestions for call center development in China.
暂无评论