-
An Overview of Smart Card Security.
The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it does not need to depend upon potentially vulnerable external resources. Because of this characteristic, smart cards are often used in different applications which require strong security protection and authentication.
標簽:
card
intelligent
Overview
Security
上傳時間:
2017-09-25
上傳用戶:busterman
-
C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics of
C quite quickly. But it takes much longer to master the nuances of the language and to write enough
programs, and enough different programs, to become an expert. In natural language terms, this is the
difference between being able to order a cup of coffee in Paris, and (on the Metro) being able to tell anative Parisienne where to get off. This book is an advanced text on the ANSI C programming
language. It is intended for people who are already writing C programs, and who want to quickly pick
up some of the insights and techniques of experts.
標簽:
programming
reasonably
perfect
basics
上傳時間:
2013-12-20
上傳用戶:ls530720646
-
A routing scheme for content based networking. Content-based network is a network which does nt make use of the source or the destination address to forward a message. This network is quite different from the traditional network.
標簽:
network
Content-based
networking
routing
上傳時間:
2013-11-25
上傳用戶:lizhen9880
-
Guided vehicles (GVs) are commonly used for the internal transportation of loads in warehouses, production plants and terminals. These guided vehicles can be routed with a variety of vehicle dispatching rules in an attempt to meet performance criteria such as minimizing the average load waiting times. In this research, we use simulation models of three companies to evaluate the performance of several real-time vehicle dispatching rules, in part described in the literature. It appears that there
is a clear difference in average load waiting time between the different dispatching rules in the different environments. Simple rules, based on load and vehicle proximity (distance-based) perform best for all cases. The penalty for this is a relatively high maximum load waiting time. A distance-based rule with time truncation, giving more priority to loads that have to wait longer than a time threshold, appears to yield the best possible overall performance. A rule that particularly considers load-waiting time performs poor overall. We also show that using little pre-arrival information of loads leads to a significant improvement in the performance of the dispatching rules without changing their performance ranking.
標簽:
Testing and classifying vehicle dispatching rules in three real-world settings
上傳時間:
2016-04-01
上傳用戶:五塊錢的油條
-
This report presents a tutorial of fundamental array processing and beamforming theory relevant to microphone array speech processing. A microphone array consists of multiple microphones placed at different spatial locations. Built upon a knowledge of sound propagation principles, the multiple inputs can be manipulated to enhance or attenuate signals emanating from particular directions. In this way, microphone arrays provide a means of enhancing a desired signal in the presence of corrupting noise sources. Moreover, this enhancement is based purely on knowledge of the source location, and so microphone array techniques are applicable to a wide variety of noise types. Microphone arrays have great potential in practical applications of speech processing, due to their ability to provide both noise robustness and hands-free signal acquisition.
標簽:
Microphone array
Tutorial
Array Signal Processing
上傳時間:
2016-06-12
上傳用戶:halias
-
DESCRIPTION
The Texas Instruments MSP430 family of ultra-low-power microcontrollers consists of several devices featuring
different sets of peripherals targeted for various applications. The architecture, combined with five low-power
modes, is optimized to achieve extended battery life in portable measurement applications. The device features a
powerful 16-bit RISC CPU, 16-bit registers, and constant generators that contribute to maximum code efficiency.
The digitally controlled oscillator (DCO) allows wake-up from low-power modes to active mode in less than 1 μs.
The MSP430G2x13 and MSP430G2x53 series are ultra-low-power mixed signal microcontrollers with built-in 16-
bit timers, up to 24 I/O capacitive-touch enabled pins, a versatile analog comparator, and built-in communication
capability using the universal serial communication interface. In addition the MSP430G2x53 family members
have a 10-bit analog-to-digital (A/D) converter. For configuration details see Table 1.
Typical applications include low-cost sensor systems that capture analog signals, convert them to digital values,
and then process the data for display or for transmission to a host system.
標簽:
G2553
2553
430G
MSP
430
上傳時間:
2018-12-25
上傳用戶:ygyh
-
obot control, a subject aimed at making robots behave as desired, has been
extensively developed for more than two decades. Among many books being
published on this subject, a common feature is to treat a robot as a single
system that is to be controlled by a variety of control algorithms depending on
different scenarios and control objectives. However, when a robot becomes more
complex and its degrees of freedom of motion increase substantially, the needed
control computation can easily go beyond the scope a modern computer can
handle within a pre-specified sampling period. A solution is to base the control
on subsystem dynamics.
標簽:
decomposition
virtual
control
上傳時間:
2019-09-04
上傳用戶:txb96
-
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. Threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in contrast
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.
標簽:
Fundamental
Limits
Secure
Class
on
of
上傳時間:
2020-01-04
上傳用戶:kddlas
-
關于NACA0012的CFD仿真文件
Computational Study of Flow Around a NACA 0012 Wing Flapped at different Flap Angles with Varying Mach Numbers
標簽:
Computational
Around
Study
0012
Flow
NACA
of
上傳時間:
2020-05-10
上傳用戶:nimo1949
-
The status quo of digital cities is analysed in detail, using six different
perspectives:
1. Social interaction
2. Safety
3. Data management and analytics
4. Mobility
5. Consumer Lifestyle
6. Crowd-based services
標簽:
Digital
Cities
White
Paper
上傳時間:
2020-05-23
上傳用戶:shancjb