Aimed at satisfying the monitoring requirement of distribution transformer, a kind of distribution transformer monitoring system based on LPC2103 is designed. Hardware module and data processing program of the monitor...
详细信息
Aimed at satisfying the monitoring requirement of distribution transformer, a kind of distribution transformer monitoring system based on LPC2103 is designed. Hardware module and data processing program of the monitoring system are introduced. The SD card of large capacity is used to store data collected by the supervising system, which could support the detail analysis of running status of distribution transformer. A simplified design of electricity cut examination is adopted to decrease the complexity and cost of the system. The system has been used in truth circumstance and the performance of system is satisfactory.
This paper presents a novel algorithm named Double-layer Multi-expression Programming (DMEP). Then DMEP model is applied to the prediction of 28-day Portland cement compressive strength. We compare DMEP model with oth...
详细信息
security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becomi...
详细信息
Spectra attacks proposed recently are more data efficient than algebraic attacks against stream cipher. They are also time-and-space efficient. A measurement of the security of a stream cipher against spectra attacks ...
详细信息
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif...
详细信息
In this paper, a novel fault-tolerant source routing algorithm for network on Chip (NOC) called Stochastic Prefix-based Source Routing (SPSR) is proposed. Compared to non-source routing algorithms, it releases the int...
详细信息
We propose a evaluation model of botnet based on peer to peer. We propose key metrics to measure their activities(e.g, Stealthy, Effectiveness, Efficiency and Robustness). Using these performance metrics, we can study...
详细信息
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut...
详细信息
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authority in key policy attribute-based encryption scenario,and then give a *** addition,our scheme is shown to be secure in the standard model under the modified Bilinear Decisional Diffie-Hellman (mBDDH) assumption.
This paper presents a mixed deterministic model for coreference resolution in the CoNLL-2012 shared task. We separate the two main stages of our model, mention detection and coreference resolution, into several sub-ta...
详细信息
This paper presents the HITSZ-PolyU system in the CIPS-SIGHAN bakeoff 2012 Task 3, Chinese Personal Name Disambiguation. This system leveraged the Chinese encyclopedia Baidu Baike (Baike) as the external knowledge to ...
详细信息
暂无评论