Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: January 2012
Authors: Jia Li, Jia Xin
Because INSAR can image in day and night and under all weather, researching on INSAR data processing has became very important in this area.
Meanwhile, the accuracy of this step is crucial to the reliability of subsequent image processing and final results of the data processing chain, meeting sub-pixel precision request.
Flat earth removal is an important step of INSAR data processing
So the technique of flat earth removal is an important step in data processing of INSAR and its accuracy effects on the precision of the DEM.
Interferometric SAR Phase Noise Reduction [J].
Meanwhile, the accuracy of this step is crucial to the reliability of subsequent image processing and final results of the data processing chain, meeting sub-pixel precision request.
Flat earth removal is an important step of INSAR data processing
So the technique of flat earth removal is an important step in data processing of INSAR and its accuracy effects on the precision of the DEM.
Interferometric SAR Phase Noise Reduction [J].
Online since: November 2012
Authors: Mohamad Zikri Zainol, Zulhilmy Sahwee, Halil Husain, Muhd Khairulzaman Abdul Kadir, Mohamad Fiteri Razali, Shahliza Azreen Sarmin
The data acquisition, analysis and display are included in the system, which targeted different user categories [6].
To collect the voltage and current data, micro-controller was used to re-route the system power output to a dummy load.
Two important graphs generated from data collected were current vs. voltage and power vs. load.
Field Test Data.
Based on the gathered data, the maximum output power generated was 1.5W.
To collect the voltage and current data, micro-controller was used to re-route the system power output to a dummy load.
Two important graphs generated from data collected were current vs. voltage and power vs. load.
Field Test Data.
Based on the gathered data, the maximum output power generated was 1.5W.
Online since: January 2012
Authors: Qi Wang, Yong Xue Zhang, Shen Gao
This structured DFT methodology could get an optimal compromise between test coverage and test cost such as chip area, pin numbers, test vectors data size, test time and so on.
DFT design flow When running the memory testing, the data, addresses and control signals applied to RAM are generated by the BIST and then the BIST comparator checks data read from RAM and generates pass/fail signals.
In order to increasing the fault detection, we use two data backgrounds on this algorithm, all 0s and 01s interleave.
These scan chains are too long, which means the volume of scan test data will exceed the ATE’s data volume and the test time will be too long to be accepted.
By using EDT, the test data volume and the test time of this chip are dramatically reduced, without decreasing the test coverage.
DFT design flow When running the memory testing, the data, addresses and control signals applied to RAM are generated by the BIST and then the BIST comparator checks data read from RAM and generates pass/fail signals.
In order to increasing the fault detection, we use two data backgrounds on this algorithm, all 0s and 01s interleave.
These scan chains are too long, which means the volume of scan test data will exceed the ATE’s data volume and the test time will be too long to be accepted.
By using EDT, the test data volume and the test time of this chip are dramatically reduced, without decreasing the test coverage.
Online since: July 2011
Authors: Qi Ying Shi
The main function is in data collection and management and the important target to build the management information system is to support management, control and decision of each level in the enterprise.
Functions of management information system Adi decision making Provide correct data model, assist managers of different level to make the proper decision Transaction processing Support operation manager through tracking basic action and business Prediction Through history data to assist high-level management of strategy problems by mathematics, statistics and imitation Programming Reasonable arrange the functional department planning such as strategic planning (over 5 years), tactics planning (1-5 years), operation planning (1-12 months), scheduling and dispense (at present) Control Tracking analyze the performance with common method of decomposition, conflation and decoupling Data processing Data collection, input, transmission, process, storage and output Ⅲ.
It uses electron way to transmit and manage the data information that includes profile, image and sound.
The electronic commerce planning includes network hardware and information environmental construction, ERP system, CRM (customer relationship management), SCM (supply chain management), PDM (product data management) and establishment of electronic commerce network.
Through data analysis and product research from customer collection that can create more excellent production and service than the competition.
Functions of management information system Adi decision making Provide correct data model, assist managers of different level to make the proper decision Transaction processing Support operation manager through tracking basic action and business Prediction Through history data to assist high-level management of strategy problems by mathematics, statistics and imitation Programming Reasonable arrange the functional department planning such as strategic planning (over 5 years), tactics planning (1-5 years), operation planning (1-12 months), scheduling and dispense (at present) Control Tracking analyze the performance with common method of decomposition, conflation and decoupling Data processing Data collection, input, transmission, process, storage and output Ⅲ.
It uses electron way to transmit and manage the data information that includes profile, image and sound.
The electronic commerce planning includes network hardware and information environmental construction, ERP system, CRM (customer relationship management), SCM (supply chain management), PDM (product data management) and establishment of electronic commerce network.
Through data analysis and product research from customer collection that can create more excellent production and service than the competition.
Online since: November 2012
Authors: T. Ravi, V. Kannan
The SISO accepts data serially i.e., one bit at a time on a single line.
Data input is serially feed into the shift register.
In PIPO, all data bits appear on the parallel outputs immediately, following the simultaneous entry of the data bits.
To write the data into the register, Write/Shift control line must be held Low.
To shift the data, W/S control line is brought High and the registers are clocked.
Data input is serially feed into the shift register.
In PIPO, all data bits appear on the parallel outputs immediately, following the simultaneous entry of the data bits.
To write the data into the register, Write/Shift control line must be held Low.
To shift the data, W/S control line is brought High and the registers are clocked.
Online since: January 2013
Authors: Jian Hong Ma, Li Xia Ji
At this time, slow start threshold (ssthresh) was set to the current congestion window (cwnd) by half,and the cwnd was set to 1.Shrew attacks was the use of this adaptive mechanism, it most of the time in silence,while at a particular time, a short period of time to transmit high speed pulse attack flow, resulting in part of the network data packet dropout then TCP sender network layer feedback, mistakenly believed that congestion exists,start retransmission and reduce the value of cwnd.
time rate L T R Fig.1 Shrew attack flow diagram Fig.2 Shrew attack diagram based on timeout mechanism 2.2 Fairness problem Fairness problem means when the congestion of each source terminal still could equally share the same cyber source (such as bandwidth,cache etc).The aticle [3] explains the fundamental causes of generating fairness.When congestion occurred it would inevitably lead to lost data packets,and packet loss could lead to competition between the limited cyber source by various data streams,competing ability lower data flow would suffer a lot.
TCP congestion control strategies in the transfer layer,was the essence of window-based end-to-end congestion control strategy, can bear long time.It had an obvious deficiency,that was from perception to congestion to take control of the action the process time was too long.If the data packet length was very short, feedback might arrive after the the source transmitted data.
situations.By analysis of a variety of network congestion between control interactions we further examined the fairness algorithm in defense Shrew attack effectiveness. 4.1 The changes of cwnd before and after the attack in congestion control of TCP In the Linux system we used network simulation tool Network Simulator 2(NS2) to establish experimental platform,simulation Shrew attack.we used the TCP congestion control algorithm:NewReno,Sack and Vegas etc.In the model we used the packet loss rate and delay the two parameter to describe the environment of the network,with the congestion window and throughput reflect TCP protocol performance.When the TCP model and IP model were combined,we not only considered the network influence on TCP,at the same time,also considered the effect of TCP output on the network.Through the feedback system model described the interaction between the two:TCP transmission rate could influence the network packet loss and delay,which was in turn applied to TCP data
Fig.4 The three TCP protocol cwnd change of attrack Fig.3 The three TCP protocol cwnd change of no attrack 4.2 IP congestion control on data flow influence The experimental simulation of the network of heavy load cases we respectively used 4 different AQM algorithm (Droptail,RED,DRR and SFQ ) TCP cwnd change simulation.(1)The use of DropTail algorithm and RED algorithm queue management,attack before and after TCP cwnd changes was very obvious,and subjected to attack,the cwnd almost closed to the minimum.The use of SFQ and DRR algorithm,attack before and after TCP cwnd did not change significantly,could maintain normal TCP flow.(2)The key link in heavy load condition,the total flow saturated.Under attack using DropTail and RED algorithm TCP throughput decreased obviously.Using the DRR and SFQ algorithm TCP throughput would be reduced,but not Obvious than before two.(3)The use of RED algorithm and DropTail algorithm,when under attack,whether TCP or UDP data,packet loss rate were
time rate L T R Fig.1 Shrew attack flow diagram Fig.2 Shrew attack diagram based on timeout mechanism 2.2 Fairness problem Fairness problem means when the congestion of each source terminal still could equally share the same cyber source (such as bandwidth,cache etc).The aticle [3] explains the fundamental causes of generating fairness.When congestion occurred it would inevitably lead to lost data packets,and packet loss could lead to competition between the limited cyber source by various data streams,competing ability lower data flow would suffer a lot.
TCP congestion control strategies in the transfer layer,was the essence of window-based end-to-end congestion control strategy, can bear long time.It had an obvious deficiency,that was from perception to congestion to take control of the action the process time was too long.If the data packet length was very short, feedback might arrive after the the source transmitted data.
situations.By analysis of a variety of network congestion between control interactions we further examined the fairness algorithm in defense Shrew attack effectiveness. 4.1 The changes of cwnd before and after the attack in congestion control of TCP In the Linux system we used network simulation tool Network Simulator 2(NS2) to establish experimental platform,simulation Shrew attack.we used the TCP congestion control algorithm:NewReno,Sack and Vegas etc.In the model we used the packet loss rate and delay the two parameter to describe the environment of the network,with the congestion window and throughput reflect TCP protocol performance.When the TCP model and IP model were combined,we not only considered the network influence on TCP,at the same time,also considered the effect of TCP output on the network.Through the feedback system model described the interaction between the two:TCP transmission rate could influence the network packet loss and delay,which was in turn applied to TCP data
Fig.4 The three TCP protocol cwnd change of attrack Fig.3 The three TCP protocol cwnd change of no attrack 4.2 IP congestion control on data flow influence The experimental simulation of the network of heavy load cases we respectively used 4 different AQM algorithm (Droptail,RED,DRR and SFQ ) TCP cwnd change simulation.(1)The use of DropTail algorithm and RED algorithm queue management,attack before and after TCP cwnd changes was very obvious,and subjected to attack,the cwnd almost closed to the minimum.The use of SFQ and DRR algorithm,attack before and after TCP cwnd did not change significantly,could maintain normal TCP flow.(2)The key link in heavy load condition,the total flow saturated.Under attack using DropTail and RED algorithm TCP throughput decreased obviously.Using the DRR and SFQ algorithm TCP throughput would be reduced,but not Obvious than before two.(3)The use of RED algorithm and DropTail algorithm,when under attack,whether TCP or UDP data,packet loss rate were
Online since: February 2008
Authors: Ross Crawford, Cameron P. Brown, Adekunle Oloyede
The correlation matrix, reduced to Table 2, shows the statistically significant
correlations between the instantaneous rebound and ultrasound data.
Eigenvectors for principal components of the ultrasound spectrum showing significant correlations with other data.
Specifically, the newly developed mechanical/functional properties of cartilage can be predicted by using ultrasound data.
A general linear model was used to fit the ultrasound data to the functional property measured by instantaneous rebound.
In this model the ultrasound frequency profile, coupled with the ratio of reflection coefficients, produced a very close fit to the rebound data, scoring highly for all statistical tests.
Eigenvectors for principal components of the ultrasound spectrum showing significant correlations with other data.
Specifically, the newly developed mechanical/functional properties of cartilage can be predicted by using ultrasound data.
A general linear model was used to fit the ultrasound data to the functional property measured by instantaneous rebound.
In this model the ultrasound frequency profile, coupled with the ratio of reflection coefficients, produced a very close fit to the rebound data, scoring highly for all statistical tests.
Online since: May 2016
Authors: Ya Feng Li, Zhen Wu Liu, Zhi Wu Shang, Wang Tai Yong
It was a kind of very effective method of identification, data mining and signal processing.
Savitzky-Golay smoothing method of time series was applied to dynamic time warping method to filter signal, smooth noise data, eliminating data points with large errors obstacles.
Phase compensation method was used to enhance smoothness and robustness and improve singularity problem of dynamic time warping signal processing for reduction of the data transitions.
Time series data was processed to data with waveform characteristics used derivative method.
Only signal data in searching window was calculated used the algorithm.
Savitzky-Golay smoothing method of time series was applied to dynamic time warping method to filter signal, smooth noise data, eliminating data points with large errors obstacles.
Phase compensation method was used to enhance smoothness and robustness and improve singularity problem of dynamic time warping signal processing for reduction of the data transitions.
Time series data was processed to data with waveform characteristics used derivative method.
Only signal data in searching window was calculated used the algorithm.
Online since: February 2014
Authors: Zheng Fu Peng, Yue Yue Lv, Wei Huang, Juan Liu
With the increasing of communication data, the network load rate is becoming high.
However, more researches about redundancy network mainly concentrate on the data backup of network fault.
In each control loop, firstly, the si obtains data from the plants and sends to the ci initiatively via the bus in each sampling period.
The whole data are transmitted through the primary network and the backup network is idle.
So the primary network load rate becomes higher and the time-delay of data transmission becomes longer, especially in the control loop 4 and 5.
However, more researches about redundancy network mainly concentrate on the data backup of network fault.
In each control loop, firstly, the si obtains data from the plants and sends to the ci initiatively via the bus in each sampling period.
The whole data are transmitted through the primary network and the backup network is idle.
So the primary network load rate becomes higher and the time-delay of data transmission becomes longer, especially in the control loop 4 and 5.
Online since: February 2016
Authors: Sergey Galanov, Victoria Ivanova, Mihail Buldakov, Tatyana Yurmazova
Data of X-ray analysis on: sample D composition nanopowders
Table 1.
In addition to α-Fe and magnetite, sample B contained surface phosphates according to IR – spectroscopy data.
Comparative data on doxorubicin sorption are shown in Table 2.
According to the obtained data for sample B with doxorubicin, proliferative activity of cancer cells decreases and the number of survivor cells is close to the control sample.
According to the presented data, significant increase in the number of dead tumor cells was observed, i.e. the type of medicine action has changed from cytostatic to cytolytic.
In addition to α-Fe and magnetite, sample B contained surface phosphates according to IR – spectroscopy data.
Comparative data on doxorubicin sorption are shown in Table 2.
According to the obtained data for sample B with doxorubicin, proliferative activity of cancer cells decreases and the number of survivor cells is close to the control sample.
According to the presented data, significant increase in the number of dead tumor cells was observed, i.e. the type of medicine action has changed from cytostatic to cytolytic.