-
261
Design and implementation on remote disaster recovery system based on Goldengate
Published 2018-04-01“…As telecom business-critical systems become more and more important,the demand for IT classes has also increased.The IT system should be more reliable,faster and easier to use and to adapt better to changing business needs.On the other hand,the security risks are also increasing.The concept of synchronous replication technology and the realization theory of Goldengate was focused on,the characteristics and advantages of the technology were discussed.Through the analysis of actual cases,the feasibility of using Goldengate data replication technology was verified,the data real-time backup was realized,the core database security was ensured while avoiding the introduction of too many categories software,and the complexity of operation and cost inputs was reduced,also it is conducive to the recovery of disaster recovery system and real-time switching.…”
Get full text
Article -
262
Adaptive transmission scheme of generalized multi-carrier system based on orthogonal transformation
Published 2012-10-01“…A joint adaptive hybrid single-carrier transmission scheme of orthogonal transformation mode and modulation and coding scheme(MCS)was proposed for orthogonal transformation generalized multi-carrier system(OT-GMC).The scheme achieved the maximal spectrum efficiency by adaptive switching the orthogonal transformation mode and MCS according to effective SINR.When identical transformation was used,the data of each sub-band could be transmitted adaptively and independently.As a result,the spectrum efficiency could be improved.When DFT was used,the signal had lower PAPR and it improved the efficiency of power amplifier.Essentially,this transmission scheme obtains the most optimum compromise performance of spectrum efficiency and PAPR in single-carrier hybrid transmission system.The simulation results show that the presented scheme is better than the single transmission scheme in the aspect of throughput performance.…”
Get full text
Article -
263
Safety Profile of the New 5-ASA Based Compounds
Published 1990-01-01“…5-aminosalicylic acid (5-ASA) preparations were anticipated to be and generally are better tolerated than sulphasalazine. Minor side effects such as headache, dizziness, abdominal pain and nausea do occur but are not more frequent than in placebo-treated patients. …”
Get full text
Article -
264
A New Capacitor-Less Buck DC-DC Converter for LED Applications
Published 2017-01-01“…LED lighting systems usually have many LEDs for better illumination that can reach multiple tens of LEDs. …”
Get full text
Article -
265
Vibration Reduction of the Nonlinearly Tufted Carpet Yarn by a Modified Sliding Mode Control Method
Published 2019-01-01“…The fuzzy sliding mode control algorithm based on quasisliding mode is adopted to achieve better control effect with a smaller force. In addition, the control force does not have high-frequency switching, and the change is relatively stable, which reduces the chattering phenomenon of sliding mode control.…”
Get full text
Article -
266
The Review of Beamforming Technology Based on Optical True Time Delay Line
Published 2022-06-01“…The important role satellite communications plays in next-generation communication protocols brings both opportunities and challenges.Beamforming is an essential technology for effi cient and fl exible utilization of onboard resources.To explored a better beamforming technology, the optical control beamforming composed of the optical real-time delay line and the traditional analog beam were compared in principle.The phased array beamforming technology based on optical true time delay line meets the expectations of small size, lightweight, and low power in satellite communication.Phased arrays based on optical true delay lines could easily achieved no squint during beam scanning.The technical advantages and constraints of beamforming of optical real-time delay lines under diff erent technical paths were analyzed.For example, based on micro-ring resonator arrays, based on grating delay lines, based on multi-path switching and optical switches, and based on wavelength-selective optical true time delay lines.Finally, the research status of the existing optical beamforming technology was summarized.The possibility of realization in satellite interconnection was proposed, and its future development direction was predicted.…”
Get full text
Article -
267
Microwave Imaging Using CMOS Integrated Circuits with Rotating 4 × 4 Antenna Array on a Breast Phantom
Published 2017-01-01“…A signal alignment algorithm is proposed to compensate the phase shift of the signals caused by the system jitter. After extracting the scattered signal from the target, a bandpass filter is applied to reduce the noise caused by imperfect subtraction between original and the reference signals. …”
Get full text
Article -
268
Research on the interference control and resource allocation in D2D communication
Published 2018-11-01“…In order to solve the problem of interference caused by D2D users reuse cellular resources in cellular network,an algorithm of interference control and resource allocation of D2D communication in single cell cellular system was proposed.Firstly,an interference graph was constructed according to the interference between users in the system to find the reusable channel resource for D2D users.Then,the channel resource pre-allocation and the channel switching policy were performed for D2D users in sequence according to the preset D2D user priority.The simulation results show that the proposed algorithm can significantly improve the system throughput and the access rate of D2D users so that the system can achieve better performance in the presence of small or large number of D2D users.…”
Get full text
Article -
269
Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication
Published 2021-09-01“…Facing the demand of multi-domain security control in the integrated network of air and ground, to solve the problem that singleprocess regular matching restricts the performance of interconnected security gateway, the method of high-performance optimization of interconnected security control based on semantic security analysis of process communication was proposed.The interaction model of master-slave processes was described in a parallel programming language in the method.The state transition system semantics were given to accurately express the combined semantics of the master-slave processes.The security of master-slave processes in combinatorial semantics was analyzed, which ensured that the parallel running of processes had no deadlock and starvation, and was equivalent to the original regular matching.Experimental results showed that the proposed method could give full play to the advantages of multi-core hardware and reduced the context switching overhead of the scheduler.In the case of complex regular expressions, the method was an order of magnitude better than single-core running.…”
Get full text
Article -
270
Robust Adaptive Fractional Fast Terminal Sliding Mode Controller for Microgyroscope
Published 2020-01-01“…A new fast terminal switching manifold is defined to ensure fast finite convergence of the system states, where a fractional-order differentiation term emerges into terminal sliding surface, which additionally generates an extra degree of freedom and leads to better performance. …”
Get full text
Article -
271
A Novel Method for DOA and Time Delay Joint Estimation in Multipath OFDM Environment
Published 2020-01-01Get full text
Article -
272
Design and Performance Analysis of a Novel Asymmetrical Multilevel Inverter Structure With Reduced Components Using the Half-Height Modulation Technique
Published 2025-01-01“…Existing multilevel inverters utilize a higher number of components to provide better output quality which increases the cost and the complexity. …”
Get full text
Article -
273
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01“…To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was proposed based on the idea of ciphertext extension, and the corresponding homomorphic operations and relinearization procedure were designed on the basis of this new ciphertext form, so that a NTRU-based multi-key homomorphic encryption (MKHE) scheme which supported distributed decryption was constructed.Then, resorting to the idea of key switching, the re-encryption key and re-encryption procedure were put forward such that the functionality of proxy re-encryption (PRE) was integrated to this new NTRU-based MKHE scheme.The MKH-PRE scheme preserved the properties of MKHE and PRE, and had a better performance on the client side.The scheme was applied to the privacy-preserving problems in federated learning and an experiment of the application was carried out.The results demonstrate that the accuracy of learning is scarcely affected by the encryption procedure and the computational overhead of this MKH-PRE scheme is acceptable.…”
Get full text
Article -
274
Resource allocation scheme for IRS assisted heterogeneous SWIPT-NOMA system
Published 2024-04-01“…Considering the heterogeneity of users to be served (different receiver structures) and the diversity of service requirements in the future large-scale Internet of things, an IRS-assisted simultaneous wireless information and power transfer (SWIPT) non-orthogonal multiple access (NOMA) communication system model for heterogeneous scenarios where power splitting (PS) users and time switching (TS) users coexist was proposed. Under the condition of satisfying the quality of service of the proposed scheme was better than other schemes two types of users, the transmit power of the base station was minimized by jointly optimizing the active beamforming of the base station, the passive phase shift matrix of the IRS, the power splitting ratio of the PS users, the time switching coefficient of the TS users and the successive interference cancellation decoding order of the two types of users. …”
Get full text
Article -
275
Design of Sliding Mode Variable Structure Control System for the 3-RPS Parallel Mechanism
Published 2016-01-01“…At last,the Matlab / Simulink block diagrams of PID controller and SMC controller are respectively established,the effects of PID controller with SMC controller are compared and analyzed,the results show that the trajectory tracking precision of SMC controller is higher than the PID controller,and the SMC controller has smaller steady- state error,faster response speed and better robustness,and the effectiveness of the SMC control is verified.…”
Get full text
Article -
276
Evaluation of WHO Criteria for Viral Failure in Patients on Antiretroviral Treatment in Resource-Limited Settings
Published 2011-01-01“…Patients with sustained suppression had better CD4+ T cell count increases over time compared to viremic patients (𝑃<.001). …”
Get full text
Article -
277
Flow consistency in an intensive SDN security architecture with multiple controllers
Published 2017-12-01“…As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.…”
Get full text
Article -
278
A Collaborative Method on Reversible Lane Clearance and Signal Coordination Control in Associated Intersection
Published 2023-01-01“…Combined with the future traffic state, the traffic capacity and saturation flow are greatly improved, and the intelligent reversible lane control is better achieved.…”
Get full text
Article -
279
Design of a High Step-Up DC-DC Converter with Voltage Doubler and Tripler Circuits for Photovoltaic Systems
Published 2021-01-01“…These improvements are high-voltage gain and low-voltage stress across switches. The proposed DC-DC interleaved boost converter has a gain/conversion ratio four times that of the conventional interleaved boost converter and four times less-voltage stress across the main switches. …”
Get full text
Article -
280
Evolutionary Cooperation in Networked Public Goods Game with Dependency Groups
Published 2019-01-01Get full text
Article