The Design and Implementation of Intelligent Microgrid Monitoring System Based on WEB
With the development of Internet and information technology, the traditional Microgrid environmental monitoring system operation is not stable. This paper designed an intelligence remote monitoring system based on Web. The system used B/S architecture ...
Parallel Computation of Ground Radiation Simulation Based on GPU
This paper introduces a simulation calculation model of ground radiation field. The simulation calculation model includes the calculation of incident radiation field and the calculation of outgoing radiation field. The calculation of incident radiation ...
Twin Odd-graceful Trees Towards Information Security
We design cryptographical graphs for information security by the following principles: (1) be used conveniently in usually; (2) with strong security, that is, it is difficult to be broken; (3) there are enough graphs and labellings for making desired ...
Application of Secret Sharing in XML Protection Mechanism
In order to better protect the data in XML document, a novel method is presented for the XML (eXtensible Markup language) tree structure, which is based on Shamir's secret sharing about polynomial interpolation. In this paper, according to purpose-based ...
Searching Forward Complete Attack Graph Generation Algorithm Based on Hypergraph Partitioning
Attack graph is an effective method for network vulnerability analysis, existing methods of attack graph cant meet the requirements of the dynamical analysis of the large-scale complex network. In this paper, we proposed a searching forward complete ...
A Study on the Factors about Customers Acceptability to Airline Ancillary Products
With the development of low-cost airlines around the world and the background of profit falling, many airlines were trying to find new profit model, which make the concept of airline ancillary products popular. The paper put forward the integrated model ...
An Improved Rainbow Table Attack for Long Passwords
The password recovery of popular encryption applications has great practical significance not only for the circumstance of retrieving forgotten password but also for assisting law enforcement officers to implement data forensics. In this paper, we ...
The Design of Agricultural Machinery Service Management System Based on Internet of Things
By installing the remote monitoring terminal on the large-scale intelligent agricultural machinery and developing the related mobile application software and server software,the agricultural machinery service management system can help those special ...
The Current Status and Future Perspectives of Virtual Maintenance
Virtual maintenance, which is widely used in aerospace, automobile, military equipment, etc., has been given abroad attention among equipment life-cycle including concept definition, system design, component production, daily operation, troubleshooting, ...
Measuring Broadband Internet Performance in Nepal
Broadband Internet performance either Fixed or Wireless has not been studied in details from the view of customer; though, broadband internet savors wide penetration in Nepal. Till now to the best of our knowledge that no independent analysis has been ...
High-speed Train Axle Temperature Monitoring System Based on Switched Ethernet
China railway transportation is developing rapidly, the running speed of high-speed train is promoted. As the promoted speed, the running gear and gearbox of high-speed train produce more heat, causing hot axle easily. In view of the hot axle phenomenon ...
Research of An Intelligent Experimental Teaching Platform Based on Internet
Experimental teaching is an important link of cultivating students innovation ability and practice ability, and is also a good platform for applying the abstract theoretical knowledge to practice. However, the deficiency of teachers and experimental ...
A Warm-CDP Backup System
We lived in a world of data. Data can be created and used continuously across an organization[1]. For us, how to ensure the availability of data and protecting it from out of use is the challenge we need to face. Recently,Continuous Data Protection is ...
Robustness Analysis Model for MADM Methods Based on Cloud Model
MADM method is the basic theory for Effectiveness evaluation. The fuzziness of methods and uncertainty of data have a crucial influence in making optimization decision. How to quantify the influence is an important theoretical problem that needs urgent ...
Describing the Information Spreading on a Small-world Network Based on State Space
The investigation about the information spreading in a network has been described by the ODE dynamic system excellently. It has given a direct explanation to the statistic tendency on result. However it doesnt give enough information about the ...
Web Topic Analysis of the Two-child Policy in China
Since the Two-child Policy was enacted by The Chinese government in October 2015, two children in a family have become an important question related to people's livelihood and have triggered a wide discussion. As an important platform to discuss and ...
Research on Web services-based Extenics Aided Innovation System
Researches in the Computer Aided Innovation System based on Extenics are very few, and we have developed the Web service-based Extenics aided innovation system according to the Extenics innovation process, meanwhile, we introduce the specific detail of ...
Research of the Hardware Architecture of the Geohazards Monitoring and Early Warning System Based on the Iot
For the need of improving the capacity of the geohazards monitoring, a professional monitoring system has been developed based on the Internet of things, WSN (Wireless Sensor Network) and network communication technology. The system consists of wireless ...
Numerical Simulation of Square Section Venturi Scrubber with Horizontal Spray
In order to improve of tar removal efficiency of venturi tube, the authors synthetically analyzed a variety of tar removal methods, put forward square section venturi scrubber with horizontal spray for removing the tar from the gas, modeled the tube ...
A New Framework on Regional Smart Water
Smart water is the development trend of water information. After analysis of the current key issues of water information, such as construction is not intensive, data resources need to be integrated, business collaboration is not enough, a new overall ...
A Method for Group Animation Based on Artificial Life
The hierarchical group animation system model is deeply discussed by introducing the theory of artifical life. In order to effectively display the group animation and real time control, it adopted the control method with packet as the unit by ...
Facial Expression Recognition with Faster R-CNN
In order to avoid the complex explicit feature extraction process and the problem of low-level data operation involved in traditional facial expression recognition, we proposed a method of Faster R-CNN (Faster Regions with Convolutional Neural Network ...
Target Detection Method Before Tracking based on Particle Filter
infrared dim target detection and tracking technology is one of the core technologies in infrared imaging system, and also a hot research topic. When the SNR is low, the tracking technique has a unique advantage. This paper studies the algorithm of ...
New Graphic Password Scheme Containing Questions-Background-Pattern and Implementation
Security of authentication is needed to be provided superlatively to secure users personal and exchange information since online information exchange systems have been developed according to internet speed. Therefore, the aim of this paper is to develop ...
Coordination Dispatch of Electric Vehicles Charging/Discharging and Renewable Energy Resources Power in Microgrid
A large number of distributed powers access to the distribution network have a multifaceted impact on the power grid, while microgrid is an effective way to solve the impact of distributed generation on the power grid. In microgrid, the proportion of ...
Locality of Some Optimal Ternary Linear Codes
A code whose every codeword symbol can be recovered from other certain symbols is called a locally repairable code (LRC). The locality of a locally repairable code for a distributed storage system is the number of nodes that participate in the repair ...
Research on Human-computer Interaction Technology of Wearable Devices Such as Augmented Reality Supporting Grid Work
This study is based on speech recognition and interaction, augmented reality, the movement of the head gesture interaction interactive technology, human-computer interaction system is designed to meet the power equipment installation, operation and ...
Automatic Security Analysis of EPCBC against Differential Attacks
It is necessary for us to evaluate immunity against differential attacks when designing secure block ciphers. Finding the lower bound of active S-boxes is an effective method. Based on MILP, we use an improved method to analyze EPCBC. EPCBC is an ultra-...