This paper presents a new approach for constructing normal maps that capture high-frequency geometric detail from dense models of arbitrary topology and are applied to the simplified version of the same models generat...
详细信息
In this paper, the PO(physical optics) method is used to study the electromagnetic scattering properties of the complex electrically large conduct target. The target is modelled by software 3DS MAX and divided into tr...
详细信息
ISBN:
(纸本)9781467317993
In this paper, the PO(physical optics) method is used to study the electromagnetic scattering properties of the complex electrically large conduct target. The target is modelled by software 3DS MAX and divided into triangle plane cells after imported into software FEKO, and then extract the point and plane information. The numerical results are in good agreement with results of FEKO by considering self and mutual shading of the target which illuminating the effectiveness of this method in calculating the complex electrically large conduct target.
The basic concepts and development of smart grid is described. The influence of large capacity wind farm interconnected on the smart grid is analyzed particularly, following contents are emphatically presented: model ...
详细信息
The basic concepts and development of smart grid is described. The influence of large capacity wind farm interconnected on the smart grid is analyzed particularly, following contents are emphatically presented: model of wind farm, basic operation performance, output forecasting of wind farm, power flow in smart grid including wind farm, balance of voltage and raeactive power, small disturbance stability, transient stability, faults and reliability, etc., in the hope of offering references for the fast development of smart grids absorbing more capacity of wind power.
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivi...
详细信息
In software defined radio (SDR) transmitter, the baseband data with protocol-specific symbol rate should be up-sampled to the fixed sample rate of synthesized carrier by arbitrary sample rate conversion (ASRC), before...
详细信息
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, ...
详细信息
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is...
详细信息
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an...
详细信息
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process.
Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We examine a satellite passive localization method...
详细信息
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example...
详细信息
ISBN:
(纸本)9781467358088
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example, the millionaire's will problem, the `private-opening' commitment, the scheduled payment problem, and the sealed-bid auctions and electronic lotteries problem, in the literature, the use of token-controlled public key encryption on its own, leads to inadequate solutions. We suggest that when considering applications of TCE, it is advisable to pay close attention to the lack of authentication and incorporate defences against the problems highlighted in this paper.
暂无评论