{"title":"Circuit Module Design of High-Voltage Side for Optical Current Transformer","authors":"Ying Zhang, Shenghui Wang, Xuejie Wang, Lei Qi","doi":"10.14257/IJSH.2016.10.1.14","DOIUrl":"https://doi.org/10.14257/IJSH.2016.10.1.14","url":null,"abstract":"The Field Programmable Gate Array (FPGA) technology has been used for designing the signal processing circuit of A/D device, CRE code and Manchester module of high -voltage side for optical current transformer in this paper. The A/D controlling module, CRC code module, Manchester encoding module and the storage in FPGA has been designed and simulated. The signal processing circuit design program of high-voltage side for optical current transformer in this paper has been proved from the simulating results and can meet the requirements of optical current transformer on communication of data, which is rapid and reliability.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76981884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong Zhong, Lei Chen, Zhiqiang Xie, Jie Cui, Yiming Zhang
{"title":"A Secret Sharing Scheme Based on AES","authors":"Hong Zhong, Lei Chen, Zhiqiang Xie, Jie Cui, Yiming Zhang","doi":"10.14257/ijsia.2014.8.6.26","DOIUrl":"https://doi.org/10.14257/ijsia.2014.8.6.26","url":null,"abstract":"In order to solve the key setting difficulty and the key security problem in the file encryption, key distributed storage technology may be a proper choice to help improve the safety of the key. In the paper, a novel secret sharing scheme is proposed by AES encryption algorithm for file confidentiality, dynamic key generation mechanism to generate keys, multisecret-sharing ideas on key pre-treatment, using Shamir threshold scheme for secret dispersed storage. Finally, a few tests are carried out and the test results suggest that the efficiency of the whole scheme is good.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86899240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Smart Home System Based on ZigBee Technology","authors":"Qingchao Gong, Guangming Li, Yong Pang","doi":"10.14257/IJSH.2014.8.6.14","DOIUrl":"https://doi.org/10.14257/IJSH.2014.8.6.14","url":null,"abstract":"The system of smart home can provide a kind of easier, ordered and effective life style to human, and must be the development tendency for future inhabitancy mode. Therefore, a smart home system solution is proposed in this paper. Firstly, this paper analyzes the characteristics of ZigBee technology, device types, network topologies and ZigBee protocol specification. Secondly, a design scheme of smart home system based on ZigBee technology is put forward and discussed. Then, the hardware design of ZigBee nodes based on CC2530 chip is given in detail. And, embedded programming software in each ZigBee node and user management platform software are implemented respectively using IAR and Microsoft Visual C++ 6.0. Finally, system test results show that the smart home system implemented above can be served as practical application reliably.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88799371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology Based Information Retrieval System","authors":"Zhang Feng","doi":"10.35940/ijrte.b3781.079220","DOIUrl":"https://doi.org/10.35940/ijrte.b3781.079220","url":null,"abstract":"Based on Ontology Model for the Semantic Web, this paper proposed a new Information Retrieval System. The system combined a new vector space model based on the concept semantic retrieval and retrieval. Based on the factors like semantic coincidence degree, the concept in the concept semantic model was divided into upper-lower relationship and non-upper-lower relationship for calculating the similarity value between semantic concepts. The system also introduced the Information-Gain, which effectively controlled the semantic extension. The experiment shows that the system utilized the concept semantic information fully and the computation result was reasonable.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"89 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83871702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Matrix Converter Based on Asymmetric Regular Sampling Method SPWM Control Strategy","authors":"Fan Yan","doi":"10.1007/978-3-642-25194-8_31","DOIUrl":"https://doi.org/10.1007/978-3-642-25194-8_31","url":null,"abstract":"","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"42 1","pages":"261-266"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85419617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of Light Pipe with Microstructures for Touch Screen","authors":"Liu Peng-fei","doi":"10.3788/gzxb20114010.1599","DOIUrl":"https://doi.org/10.3788/gzxb20114010.1599","url":null,"abstract":"Touch screen has a very wide range of applications.Most of them are used in public information inquiries,for instance,service inquiries in telecommunication bureau,tax bureau,bank system,electric department … Touch screen can also be used for entertainment and virtual reality applications too.Traditionally,touch screen was composed of pairs of infrared LED and correspondent receivers which were all installed in the screen frame.Arrays of LED were set in the adjacent sides of the frame of an infrared touch screen while arrays of the infrared receivers were fixed in each opposite side,so that the infrared detecting network was formed.While the infrared touch screen has some technical limitations nowadays such as the low resolution,limitations of touching methods and fault response due to environmental disturbances.The plastic material has a relatively high absorption rate for infrared light,which greatly limits the size of the touch screen.Our design use laser diode as source and change the traditional inner structure of touch screen.by using a light pipe with microstructures.The geometric parameters of the light pipe and the microstructures were obtained through equation solving.Simulation results prove that the design method for touch screen proposed in this paper could achieve high resolution ratio(R.R.) and large size of touch screen.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88740880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection System Based on Combination of Expert System and BP Neural Network","authors":"Wu Kai-jun","doi":"10.1109/icciautom.2011.6184024","DOIUrl":"https://doi.org/10.1109/icciautom.2011.6184024","url":null,"abstract":"This paper aims to study the application of expert system combined with neural network in Intrusion Detection System.It brings improvement to BP algorithm of neural networks,meanwhile a series of rule sets have been created through absorbing experience and knowledge from experts,scholars as well as professional forecasters,which benefits simulation of human expert reasoning of the decision-making process and judgments to create an expert system,thereby improving the deficiencies in intrusion detection with single BP algorithm.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82602216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increment PID Controller Based on Immunity Particle Swarm Optimization Algorithm","authors":"Zhang Wei","doi":"10.1109/cesa.2006.313632","DOIUrl":"https://doi.org/10.1109/cesa.2006.313632","url":null,"abstract":"Based on the astringency and practicability of Particle Swarm Optimization Algorithm(PSO) and T cell's promotions and B cell's restrainability of Immunity Particle Swarm Optimization Algorithm (IMPSO) and applied it to PID controllers.It is clear that IMPSO is suitable to Increment PID control according to the simulations and it made the tracking and anti-jamming of IM PID based on IMPSO,IMPSO more effective than those of PID based on PSO and those of IMPID based on Immunity Algorithm.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81375029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Parra-Michel, A. Alcocer-Ochoa, A. Sanchez-Hernandez, V. Kontorovich
{"title":"MIMO Channel Modeling and Simulation","authors":"R. Parra-Michel, A. Alcocer-Ochoa, A. Sanchez-Hernandez, V. Kontorovich","doi":"10.5772/7441","DOIUrl":"https://doi.org/10.5772/7441","url":null,"abstract":"This document studies a method of MIMO channel modeling and simulation for mobile communication system. Both spatial correlation and fading in time domain are integrated into this model, and many channel parameters such as time dispersion, Doppler effect, direction of arrival, azimuth spread, and power azimuth spectrum are fully considered in this model. We simulate this MIMO channel according to the parameters of 3GPP.25.996.The result show that the new method matches the analytical result very well.","PeriodicalId":18640,"journal":{"name":"Microcomputer Information","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85374423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}