P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen...
详细信息
One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish au...
详细信息
One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish autonomous tasks. The characteristic model(CM) based all-coefficient adaptive control(ACAC) designed for PPF systems in horizontal and vertical trajectory control is proposed. The method is easy to use and convenient to adjust and test. Just a few parameters are adapted during the control process. In application, vertical and horizontal CMs are designed and ACAC controllers are constructed to control vertical altitude and horizontal trajectory of PPF based on the proposed CMs, respectively. Result analysis of different simulations shows that the applied ACAC control method is effective for trajectory tracking of the PPF systems and the approach guarantees the transient performance of the PPF systems with better disturbance rejection ability.
If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and pa...
详细信息
If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and passwords for different *** solve these problems,a lot of authentication schemes for multi-server environment have been ***,Odelu and Das et *** a secure multi-server authentication protocol based on smart card,biometric and elliptic curve cryptography(ECC) .We firstly analyze Odelu et al.'s scheme and find some flaws as follows:1) the scheme may suffer Denial of Service(Dos) attack and insider attack;2) The scheme doesn't have strong robustness because improper work of the register center(RC) may lead to the collapse of the whole system;3) There are some design flaws in this *** example,the user cannot choose his/her identity randomly and the register center needs to maintain a data *** order to solve these problems,this paper proposes a new secure three-factor authentication protocol for multi-server environment based on Chebyshev chaotic map and secure sketch *** verify the security of the proposed scheme,we simulate our scheme using BAN logic and Pro Verif *** a thorough analysis,we can see that the proposed schemenot only has stronger security but also has less computation cost than Odelu et al.'s protocol.
A novel sliding mode control (SMC) method for indirect current controlled three-phase parallel active power filter is presented in this paper. There are two designed closed-loops in the system, one is the DC voltage c...
详细信息
Tandem mass spectrometry (MS/MS) is a widely used technique for protein identification, post-translational modifications, immunotherapy, and other applications. As the amount of MS/MS spectra data increases, new compu...
详细信息
In this paper, an adaptive fuzzy control system with supervisory controller is proposed to improve dynamic performance of three-phase active power filter (APF). The proposed adaptive fuzzy controller for APF does not ...
详细信息
We introduce a new logic programming paradigm-answer set programming with uncertain facts (LPuF for short). A LPuF program is an extension of answer set programs (ASP for short). We first define the syntax of LPuF pro...
详细信息
Sentence similarity calculation is one of several research topics in natural language processing. It has been widely used in information retrieval, intelligent question answering and other fields. Traditional machine ...
详细信息
Although recent years have seen much progress in semantic role labeling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b...
详细信息
Although recent years have seen much progress in semantic role labeling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation by using the similar method in an English SRL system. We also explore dependency-based predicate analysis in Chinese SRL. We perform our experiments on two datasets. Our results show that dependency-based Chinese SRL is not only feasible but also superior to the constituent-based SRL in some respects.
暂无评论