IBM PC/XT/AT机的键盘上有各种特殊键,单独使用或组合使用时,可实现多种功能,如屏幕打印,中西文状态转换(在CCDOS支持下),以及各种锁定功能等。不妨把按某个键完成相应的功能称作“硬实现”,那么,对应的另一个概念-“软实现”当然是指...IBM PC/XT/AT机的键盘上有各种特殊键,单独使用或组合使用时,可实现多种功能,如屏幕打印,中西文状态转换(在CCDOS支持下),以及各种锁定功能等。不妨把按某个键完成相应的功能称作“硬实现”,那么,对应的另一个概念-“软实现”当然是指不按任何键,而用程序来实现同样的功能。软实现有时颇为有用。例如,在中文状态下运行编译BASIC程序时,运行完毕后回到西文状态,对于某些兼容机,按CTRL+F7也只能转换成低分辨率图形方式,因而给用户带来诸多不便,尤其是在编译BASIC与其他高级语言混合编程的场合。但是,如果用户借助于下面将要介绍的小程序CTRLF7.展开更多
By using one static water system,the filtration rates of one kind of freshwater mussel Anodonta woodiana with different body weight(accounted by dry weight of soft tissue)were studied under semi-field conditions.Durin...By using one static water system,the filtration rates of one kind of freshwater mussel Anodonta woodiana with different body weight(accounted by dry weight of soft tissue)were studied under semi-field conditions.During the experiments,the water temperature and the suspended particulate matters concentration were kept relative invariable and there were four ambient ammonia concentration levels.The ambient water ammonia concentration was obtained by the excretion of the freshwater mussel and the accession of ...展开更多
In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(...In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(Y H)) required calibration. The value 0.42 was used for Yp /acetic in this study,while the default value of the BioWin software is 0.49,making it comparable with the default values of the corresponding parameter(yield of phosphorus release to substrate uptake(YPO4)) used in ASM2,ASM2 d,and ASM3 P,respectively. Three scenarios were evaluated to improve the performance of the wastewater treatment plant,the possibility of wasting sludge from either the aeration tank or the secondary clarifier,the construction of a new oxidation ditch,and the construction of an equalization tank. The results suggest that construction of a new oxidation ditch or an equalization tank for the wastewater treatment plant is not necessary. However,sludge should be wasted from the aeration tank during wet weather to reduce the solids loading of the clarifiers and avoid effluent violations. Therefore,it is recommended that the design of wastewater treatment plants(WWTPs) should include flexibility to operate the plants in various modes. This is helpful in selection of the appropriate operating mode when necessary,resulting in substantial reductions in operating costs.展开更多
This paper introduced a thermo tank temperature control system based on STM32. Firstly, the temperature acquisition is real- ized by the high-lxecision electrical bridge based on constant current source. Then the augm...This paper introduced a thermo tank temperature control system based on STM32. Firstly, the temperature acquisition is real- ized by the high-lxecision electrical bridge based on constant current source. Then the augmented PID algorithm realized by software is adopteff But-terworth filter is used to convert the o.aput PWM of STM32 to current signal which is used to control the seniconductor control rectifier to adjust the temrature. Calibration check and practical application both indicated that the system was reliable, high-precision, practicable and could meet reality needs.展开更多
The implementation method of the IEEE 802.11 Medium Access Control (MAC) protocol is mainly based on DSP (Digital Signal Processor)/ ARM (Advanced Reduced instruction set computer Machine) processor or DSP/ARM IP (Int...The implementation method of the IEEE 802.11 Medium Access Control (MAC) protocol is mainly based on DSP (Digital Signal Processor)/ ARM (Advanced Reduced instruction set computer Machine) processor or DSP/ARM IP (Intellectual Property) core. This paper presents a method based on Nios II soft-core processor embedded in Altera’s Cyclone FPGA (Field Programmable Gate Array) and MicroC/OS-II RTOS (Real-Time Operation System). The benefits and drawbacks of above methods are compared, and then the method presented in this paper is described. The hardware and software partitioning are discussed; the hardware architecture is also illustrated and the MAC software programming is described in detail. The presented method has some advantages, such as low cost, easy-implementation and very suitable for the implementation of IEEE 802.11 MAC in research stage.展开更多
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are ...As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.展开更多
The authors will focus on the study of the design of Multiprocessor Systems on Chip (MPSoC), specifically in the context of improving the performance of applications located on the MPSoC architecture. The objective ...The authors will focus on the study of the design of Multiprocessor Systems on Chip (MPSoC), specifically in the context of improving the performance of applications located on the MPSoC architecture. The objective of this research is to study the problems of transition from a pure software implementation for an embodiment admitting one or more hardware components and to develop a methodology for automatic generation of migration of a software task into a hardware component in MPSoC. The transformation of a software task into a hardware task led to many changes, hardware part (connection, the requirement of an interrupt controller...), software part (at least one task, I/O (I/O), synchronization...) and an architectural point of view, the remarkable aspects of data storage. The experiment is done on the MJPEG decoder to illustrate the effectiveness of the authors' tool for automatic generation of migration.展开更多
Compression and encryption are widely used in network traffic in order to improve efficiency and security of some systems.We propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,d...Compression and encryption are widely used in network traffic in order to improve efficiency and security of some systems.We propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,demonstrating both a hardware and a software implementation.With minor modifications to the hardware accelerators,latency can be reduced to half.Furthermore,we also propose a seminal and more efficient scheme,where we integrate the technology of encryption into the compression algorithm.Our new integrated optimization scheme reaches an increase of 1.6X by using parallel software scheme However,the security level of our new scheme is not desirable compare with previous ones.Fortunately,we prove that this does not affect the application of our schemes.展开更多
A few researches adopt virtual reality in landslide. So it is significant to combine the physics\|based deformable method with the process simulation of a sliding landslide, this way the dynamic process of a going lan...A few researches adopt virtual reality in landslide. So it is significant to combine the physics\|based deformable method with the process simulation of a sliding landslide, this way the dynamic process of a going landslide can be simulated. The analysis of the dynamic law of landslide provides a foundation to forecast and make it realiable to foretell disasters. After recounting the condition of VR and landsliding body simulation, this paper puts forward simulating landslide by the physics\|based deformable method. The method divides landsliding into deformable body and rigid one. The deformation of deformable body can be compute by DDA and FEM, and DDA fits the great deformation and FEM is good for the tiny deformation. This paper shows it is feasible to simulate the landslide animation by this method.展开更多
Recently, trimming Soft-output Viterbi algorithm(T-SOVA) has been proposed to reduce the complexity of SOVA for Turbo codes. In its fi rst stage, a dynamic algorithm, lazy Viterbi algorithm, is used to indicate the mi...Recently, trimming Soft-output Viterbi algorithm(T-SOVA) has been proposed to reduce the complexity of SOVA for Turbo codes. In its fi rst stage, a dynamic algorithm, lazy Viterbi algorithm, is used to indicate the minimal metric differences which brings obstacle on hardware implementation. This paper proposes a Viterbi algorithm(VA) based T-SOVA to facilitate hardware implementation. In the first stage of our scheme, a modified VA with regular structure is used to fi nd the maximum likelihood(ML) path and calculate the metric differences. Further, local sorting is introduced to trim the metric differences, which reduces the complexity of trimming operation. Simulation results and complexity analysis show that VA based T-SOVA performs as well as lazy VA based T-SOVA and is easier to be applied to hardware implementation.展开更多
Complementing our previous publications, this paper presents the information schema constructs (ISCs) that underpin the programming of specific system manifestation feature (SMF) orientated information management ...Complementing our previous publications, this paper presents the information schema constructs (ISCs) that underpin the programming of specific system manifestation feature (SMF) orientated information management and composing system models. First, we briefly present (1) the general process of pre-embodiment design with SMFs, (2) the procedures of creating genotypes and phenotypes of SMFs, (3) the specific procedure of instantiation of phenotypes of SMFs, and (4) the procedure of system model management and processing. Then, the chunks of information needed for instantiation of phenotypes of SMFs are discussed, and the ISCs designed for instantiation presented. Afterwards, the information management aspects of system modeling are addressed. Methodologically, system modeling involves (1) placement of phenotypes of SMF in the modeling space, (2) combining them towards the desired architecture and operation, (3) assigning values to the parameters and checking the satisfac- tion of constraints, and (4) storing the system model in the SMFs-based warehouse database. The final objective of the reported research is to develop an SMFs-based toolbox to support modeling of cyber-physical systems (CPSs).展开更多
基金Supported by National Natural Science Foundation of China(30700619)the Open Fund of Key Laboratory of Ecological Environment and Resources of Inland Fisheries,Chinese Academy of Fishery Sciences(YM2007-01)~~
文摘By using one static water system,the filtration rates of one kind of freshwater mussel Anodonta woodiana with different body weight(accounted by dry weight of soft tissue)were studied under semi-field conditions.During the experiments,the water temperature and the suspended particulate matters concentration were kept relative invariable and there were four ambient ammonia concentration levels.The ambient water ammonia concentration was obtained by the excretion of the freshwater mussel and the accession of ...
基金Supported by the College of Scientific Innovation Significant Cultivation Fund Financing Projects(No.708047)the Key Special Program for Pollution Control(No.2012ZX07101-003)
文摘In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(Y H)) required calibration. The value 0.42 was used for Yp /acetic in this study,while the default value of the BioWin software is 0.49,making it comparable with the default values of the corresponding parameter(yield of phosphorus release to substrate uptake(YPO4)) used in ASM2,ASM2 d,and ASM3 P,respectively. Three scenarios were evaluated to improve the performance of the wastewater treatment plant,the possibility of wasting sludge from either the aeration tank or the secondary clarifier,the construction of a new oxidation ditch,and the construction of an equalization tank. The results suggest that construction of a new oxidation ditch or an equalization tank for the wastewater treatment plant is not necessary. However,sludge should be wasted from the aeration tank during wet weather to reduce the solids loading of the clarifiers and avoid effluent violations. Therefore,it is recommended that the design of wastewater treatment plants(WWTPs) should include flexibility to operate the plants in various modes. This is helpful in selection of the appropriate operating mode when necessary,resulting in substantial reductions in operating costs.
文摘This paper introduced a thermo tank temperature control system based on STM32. Firstly, the temperature acquisition is real- ized by the high-lxecision electrical bridge based on constant current source. Then the augmented PID algorithm realized by software is adopteff But-terworth filter is used to convert the o.aput PWM of STM32 to current signal which is used to control the seniconductor control rectifier to adjust the temrature. Calibration check and practical application both indicated that the system was reliable, high-precision, practicable and could meet reality needs.
文摘The implementation method of the IEEE 802.11 Medium Access Control (MAC) protocol is mainly based on DSP (Digital Signal Processor)/ ARM (Advanced Reduced instruction set computer Machine) processor or DSP/ARM IP (Intellectual Property) core. This paper presents a method based on Nios II soft-core processor embedded in Altera’s Cyclone FPGA (Field Programmable Gate Array) and MicroC/OS-II RTOS (Real-Time Operation System). The benefits and drawbacks of above methods are compared, and then the method presented in this paper is described. The hardware and software partitioning are discussed; the hardware architecture is also illustrated and the MAC software programming is described in detail. The presented method has some advantages, such as low cost, easy-implementation and very suitable for the implementation of IEEE 802.11 MAC in research stage.
基金This work was supported by Deakin Cyber Security Research Cluster National Natural Science Foundation of China under Grant Nos. 61304067 and 61202211 +1 种基金 Guangxi Key Laboratory of Trusted Software No. kx201325 the Fundamental Research Funds for the Central Universities under Grant No 31541311314.
文摘As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.
文摘The authors will focus on the study of the design of Multiprocessor Systems on Chip (MPSoC), specifically in the context of improving the performance of applications located on the MPSoC architecture. The objective of this research is to study the problems of transition from a pure software implementation for an embodiment admitting one or more hardware components and to develop a methodology for automatic generation of migration of a software task into a hardware component in MPSoC. The transformation of a software task into a hardware task led to many changes, hardware part (connection, the requirement of an interrupt controller...), software part (at least one task, I/O (I/O), synchronization...) and an architectural point of view, the remarkable aspects of data storage. The experiment is done on the MJPEG decoder to illustrate the effectiveness of the authors' tool for automatic generation of migration.
基金partially supported by National Natural Science Foundation of China(No. 61202475,61572294,61502218)Outstanding Young Scientists Foundation Grant of Shandong Province(No.BS2014DX016)+3 种基金Nature Science Foundation of Shandong Province (No.ZR2012FQ029)Ph.D.Programs Foundation of Ludong University(No.LY2015033)Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund(Fujian Normal University)(No.15004)the Priority Academic Program Development of Jiangsu Higer Education Institutions,Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology
文摘Compression and encryption are widely used in network traffic in order to improve efficiency and security of some systems.We propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,demonstrating both a hardware and a software implementation.With minor modifications to the hardware accelerators,latency can be reduced to half.Furthermore,we also propose a seminal and more efficient scheme,where we integrate the technology of encryption into the compression algorithm.Our new integrated optimization scheme reaches an increase of 1.6X by using parallel software scheme However,the security level of our new scheme is not desirable compare with previous ones.Fortunately,we prove that this does not affect the application of our schemes.
文摘A few researches adopt virtual reality in landslide. So it is significant to combine the physics\|based deformable method with the process simulation of a sliding landslide, this way the dynamic process of a going landslide can be simulated. The analysis of the dynamic law of landslide provides a foundation to forecast and make it realiable to foretell disasters. After recounting the condition of VR and landsliding body simulation, this paper puts forward simulating landslide by the physics\|based deformable method. The method divides landsliding into deformable body and rigid one. The deformation of deformable body can be compute by DDA and FEM, and DDA fits the great deformation and FEM is good for the tiny deformation. This paper shows it is feasible to simulate the landslide animation by this method.
基金supported by NSAF under Grant(No.U1530117)National Natural Science Foundation of China(No.61471022)
文摘Recently, trimming Soft-output Viterbi algorithm(T-SOVA) has been proposed to reduce the complexity of SOVA for Turbo codes. In its fi rst stage, a dynamic algorithm, lazy Viterbi algorithm, is used to indicate the minimal metric differences which brings obstacle on hardware implementation. This paper proposes a Viterbi algorithm(VA) based T-SOVA to facilitate hardware implementation. In the first stage of our scheme, a modified VA with regular structure is used to fi nd the maximum likelihood(ML) path and calculate the metric differences. Further, local sorting is introduced to trim the metric differences, which reduces the complexity of trimming operation. Simulation results and complexity analysis show that VA based T-SOVA performs as well as lazy VA based T-SOVA and is easier to be applied to hardware implementation.
文摘Complementing our previous publications, this paper presents the information schema constructs (ISCs) that underpin the programming of specific system manifestation feature (SMF) orientated information management and composing system models. First, we briefly present (1) the general process of pre-embodiment design with SMFs, (2) the procedures of creating genotypes and phenotypes of SMFs, (3) the specific procedure of instantiation of phenotypes of SMFs, and (4) the procedure of system model management and processing. Then, the chunks of information needed for instantiation of phenotypes of SMFs are discussed, and the ISCs designed for instantiation presented. Afterwards, the information management aspects of system modeling are addressed. Methodologically, system modeling involves (1) placement of phenotypes of SMF in the modeling space, (2) combining them towards the desired architecture and operation, (3) assigning values to the parameters and checking the satisfac- tion of constraints, and (4) storing the system model in the SMFs-based warehouse database. The final objective of the reported research is to develop an SMFs-based toolbox to support modeling of cyber-physical systems (CPSs).