The electromyography (EMG) pattern recognition and classification of intentional movements for control of multifunctional prostheses have adopted steady state data. Actually, most of human body's movements are con...
详细信息
The paper deals with activities towards a design of a methodology to stabilize already existing electrical grids and at the same time utilize the maximum of electrical energy from renewable electrical energy sources. ...
详细信息
The paper deals with activities towards a design of a methodology to stabilize already existing electrical grids and at the same time utilize the maximum of electrical energy from renewable electrical energy sources. The authors believe that the first step towards a methodology is to create a thorough model of the electrical grid with connecting most suitable existing renewable as well as classic electric energy sources. There is also described an idea of an experimental smart grid, but the main attention is given to the physical realization of a laboratory model of the smart grid. The authors described an electronic design and an idea of control strategy to enhance a functionality, stability and effectiveness of the grids with a significant share of the renewable energy sources.
Three-dimensional (3D) face recognition, as an important tool of modern authentication, is being causing concerns interests by more and more researcher. In this paper, a 3D measuring device for Chine-se adult's fa...
详细信息
Considered from the test structure, test time, test power, the paper based on the IEEEstd1500 standards, the first reference in the test circuit is to build a structure of SOC testing, including test cases and test sh...
详细信息
During the NIR spectral analysis to quickly determine concentrations of essential components of milk, spectral region is wider, peaks are overlap, and searching space is larger, spectrum acquiring often subjects to in...
详细信息
JavaScript allows Web-developers to hide intention behind their code inside different looking scripts known as Obfuscated code. Automatic detection of obfuscated code is generally tackled from readability perspective....
详细信息
ISBN:
(纸本)9780769547459
JavaScript allows Web-developers to hide intention behind their code inside different looking scripts known as Obfuscated code. Automatic detection of obfuscated code is generally tackled from readability perspective. However, recently obfuscation exhibits patterns that modify both syntax and semantic characteristics while preserving readability characteristic. There are two problems in dealing with readable obfuscation: 1. Difficulty in locating it since it does not manipulate suspicious strings. 2. It is a common and essential practice adopted in both benign codes and malicious codes. In this work, we first investigate why and how readable obfuscation can hinder detection of maliciousness and prevent the static analysis of suspicious scripts. Next, we propose a readable JavaScript obfuscation detector (RedJsod) system to deal with this type of threat. RedJsod is a well defined detector based on variable length context-based feature extraction (VCLFE) scheme that takes advantages of abstract syntax tree (AST) representation of a given JavaScript code to infer run-time behaviors statically. We applied RedJsod to three datasets collected from real world Web-pages to evaluate its effectiveness. Also, we tested RedJsod on well-known readable obfuscation samples cited in related works as a proof of concept illustration. Our experimental results indicated that RedJsod achieved very high detection rates (greater than 97%) in terms of accuracy, eliminated false negatives completely, while at the same time yielded very few false positives.
There are three steps to establish the visualization simulation platform of low-voltage power line carrier communication system. Firstly, we establish the MARLAB/Simulink simulation platform to simulate low-voltage po...
详细信息
This paper uses a 2D systems setting, based on the control theory for repetitive processes, to design an iterative learning control law with particular emphasis on the commonly encountered problem of maintaining a spe...
详细信息
This paper uses a 2D systems setting, based on the control theory for repetitive processes, to design an iterative learning control law with particular emphasis on the commonly encountered problem of maintaining a specified rotational speed of shaft where disturbances introduce irregularities in the speed achieved. The two motors system is a model for this problem and is used as the basis for a simulation study of the performance of the final design.
Purpose - The complex interactions between firm- and industry-specific factors within a national context and their impacts on innovation often hinder construction enterprises' efforts in optimising their innovatio...
详细信息
We derive the stochastic master equations, that is to say, quantum filters, and master equations for an arbitrary quantum system probed by a continuous-mode bosonic input field in two types of nonclassical states. Spe...
详细信息
We derive the stochastic master equations, that is to say, quantum filters, and master equations for an arbitrary quantum system probed by a continuous-mode bosonic input field in two types of nonclassical states. Specifically, we consider the cases where the state of the input field is a superposition or combination of (1) a continuous-mode, single-photon wave packet and vacuum, and (2) any continuous-mode coherent states.
暂无评论