-
Chapter and Conference Paper
Block-Level Storage Security Architectures
With the unprecedented growth of storage systems in all of today’s society, threats on stored sensitive information have become the critical issues that need to be addressed. Further, compared to the transient...
-
Chapter and Conference Paper
Parametric Time-frequency Modeling of Nonstationary Signals by Adaptive Decomposition Based on Time-shearing Gabor Atoms
A kind of localized four parameters Gabor atom (dialating, time-shearing, modulating and translating of Gaussian function) was derived. Based on it, a parametric adaptive time-frequency distribution (PAD) is p...
-
Chapter and Conference Paper
A 3D-Shape Reconstruction Method Based on Coded Structured Light and Projected Ray Intersecting Location
This paper proposes a 3D-shape reconstruction method based on coded structured light. Projecting color pseudo-random coded pattern on surface of object and using the thought of ray intersecting location, 3D sh...
-
Chapter and Conference Paper
A Feature Points Matching Method Based on Window Unique Property of Pseudo-Random Coded Image
Proposed a method for object feature points matching used in active machine vision technique. By projecting pseudo-random coded structured light onto the object to add code information, its feature points can ...
-
Chapter and Conference Paper
Optimal Tracking Performance for Unstable Processes with NMP Zeroes
This paper has investigated optimal tracking performance for unstable processes with non-minimum phase (NMP) under control energy constraint. Firstly, based on prime factorization of unstable process, a perfor...
-
Chapter and Conference Paper
Framework Designing of BOA for the Development of Enterprise Management Information System
This paper put forward the definition of business oriented architecture (BOA) for the development of enterprise management information system and its technical components, as well as the designing method of re...
-
Chapter and Conference Paper
An Improved DES Anti-DPA Algorithm and Its Automatic Simulation System
Based on the analysis of DES cryptographic algorithms and anti-attack strategy, this paper proposes an advanced DES anti-DPA attack algorithm by further improving the Mask method in the power consumption point...
-
Chapter and Conference Paper
An Adaptive Slope Compensation Circuit and Its Application
To solve the over-compensation problem in the current mode PWM switch power, a new adaptive slope compensation circuit is proposed in this paper. In the circuit, the difference between the output and input vol...
-
Chapter and Conference Paper
Research on ZigBee Wireless Meter Reading System in Opnet Simulator
The paper aims to evaluate the performance of a ZigBee wireless meter reading system using Opnet. At first, a scheme of distributed meter reading system is proposed. In order to simulate the real system, an en...
-
Chapter and Conference Paper
A Heterogeneous Data Integration Model
With the rapid development of the Internet of Things (IOT), the data management, data mining and data analysis in IOT systems require improving the usability of the multi-sourced, distributed, autonomous and h...
-
Chapter and Conference Paper
An Emergency-Response Timing Constraint Workflow Model
In view of the requirements for high reliability, high time accuracy and complicated time constraints in emergency response workflow systems, a time constraints modeling method is proposed to meet these requir...
-
Chapter and Conference Paper
DES Algorithm Realization in Asynchronous Circuit Using Four-Phase Bundled-Data
In order to reduce the power consumption of the DES algorithm circuit, this paper designs an asynchronous pipeline based on the four-phase handshake protocol, and realizes the pipeline in the round to satisfy ...
-
Chapter and Conference Paper
Gait Pose Estimation Based on Manifold Learning
A manifold learning based approach for gait pose estimation is proposed in this paper. It consists of two manifold learning based dimension reductions and three map** functions based on General Regression Ne...
-
Chapter and Conference Paper
Simulation of Energy Efficiency in Wireless Meter Reading System by OPNET
A method using OPNET for the energy efficiency analysis is proposed to save the energy cost of the wireless meter reading system in this paper. Firstly, a node energy module is generated to reveal the energy c...
-
Chapter and Conference Paper
High Performance of RSA Simulation System Based on Modified Montgomery Algorithm
In order to eliminate the effect of the factor \({R^{ - 1}}\) and decrease the number of iteration of modular exponentiation al...
-
Chapter and Conference Paper
Locality Constrained Dictionary Learning for Human Behavior Recognition: Using AMEI and EMEI
In this paper, a human behavior recognition method based on locality constrained dictionary learning (LCDL) is proposed, the average motion energy image (AMEI) and enhanced motion energy image (EMEI) are utili...
-
Chapter and Conference Paper
Human Action Recognition Based on Angle Descriptor
A simple and effective method for 3D skeleton based action recognition is proposed in this paper. Instead of taking the whole skeleton joints as the input, we select several active joints to represent the enti...
-
Chapter and Conference Paper
3D Finite Element Modeling and Simulation of Nonlinear Ultrasonic Evaluation for Steel Damage
This research develops a theoretical method to evaluate the creep damage in a 91 steel with ultrasonic nonlinear technique. A three-dimensional finite element model is built to simulate the creep damage of ste...
-
Chapter and Conference Paper
Human Behavior Recognition Method Based on Improved Energy Image Species and Pyramid HOG Feature
Since traditional energy image species are easily affected by the motion time and location shift, this paper proposes a human behavior recognition method based on improved energy image species combined with py...
-
Chapter and Conference Paper
Noise-Removal Method for Manifold Learning
Manifold learning algorithms are nonlinear dimensionality reduction methods which could find the intrinsic geometry structure of the data points and recover the latent main factors that influence object change...