oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 132 )

2018 ( 1054 )

2017 ( 1065 )

2016 ( 987 )

Custom range...

Search Results: 1 - 10 of 80935 matches for " Fa-Xin Yu "
All listed articles are free for downloading (OA Articles)
Page 1 /80935
Display every page Item
Comparison and analysis of major embedded real-time operating systems
常用嵌入式实时操作系统比较分析

YU Fa-xin,
郁发新

计算机应用 , 2006,
Abstract: With the foundation of real-time, fault tolerant, standard compatibility, a standard for embedded real-time OS was suggested, which included embedded OS architecture, supported hardware, schedule management, memory management, inter-process communication, timer performance, network support, file system, driver development and debug and so on. Mso a detailed analysis and comparison for major embedded real-time operating systems was given, and it can be a good guide to select the best embedded real-time OS for the application situation.
Research on the Relationship among Government Regulations, Strategy Preference and Manufacturing Performance  [PDF]
Fa-Xin Cheng, Wei Wang
Journal of Service Science and Management (JSSM) , 2012, DOI: 10.4236/jssm.2012.51005
Abstract: Based on the environment-strategy-performance paradigm, the paper constructs a theoretical framework on the rela- tionship among government regulations, manufacturing strategy and performance. Using structural equation model and a sample of 135 SME of Jiangsu Province, this paper examines the relationship among government regulations, manu- facturing strategy and performance, the result of which shows that government regulations have a significant positive effect on cost, quality and innovation; cost, quality and innovation influence financial performance significantly and positively; quality and innovation have a significant positive effect on non-financial performance, whereas cost has not. Finally, suggestions for SME-development promoting policy and manufacturing strategy selection are putting forward.
Early Fire Detection Based on Flame Contours in Video
Xiao-Lin Zhou,Fa-Xin Yu,Yu-Chun Wen,Zhe- Ming Lu
Information Technology Journal , 2010,
Abstract: This study proposed a method for early fire detection in video based on flame contours. The whole fire detection process includes three parts, i.e., candidate fire frame selection, flame region selection and flame contour-based fire decision. In the first step, the suspicious frames are detected and the unlikely frames are removed based on frame selection rules. The second step detects the flame pixels in the candidate fire frames by flame region selection rules. In the last step, four operations (i.e., dilation, erosion, mini region erasing and Canny edge detection) are performed on all flame regions to obtain the exact flame contours and then fire decision rules based on three characteristics (i.e., area, perimeter and roundness of flame contours) are employed to determine whether a fire occurs in the video or not. The proposed approach was tested with several video clips in different environments and the experimental results demonstrated its effectiveness.
A Novel Protection Architecture Scheme for EPON
Xiao-Lin Zhou,Fa-Xin Yu,Yu-Chun Wen,Zhe-Ming Lu
Information Technology Journal , 2011,
Abstract: With the rapid development of the Internet and extraordinary increase of bandwidth requirement, fiber based networks emerge and become more and more popular. The EPON (Ethernet Passive Optical Network) technology, which combines the mature Ethernet technology and high-bandwidth PON technology, is an ideal access method to achieve fiber based network service and appears to be the most widely-used access network. Thus, information reliability is becoming more and more important, making the protection of fiber based networks more and more necessary and crucial. Nowadays most EPONs are protected against failures by adopting redundant network equipments. This study proposes a novel protection method for EPON, which is more reliable and safer than existing schemes. This protection architecture scheme is able to provide protection for EPON and point out the exact failure reason for further physical recovery and repairing by the Network Management (NM) Server. Actual operations show that the proposed scheme can provide protection for at least three types of failures, i.e., the ONU link failure, the OLT link failure and the OLT failure.
A Vector Quantization Based Automatic Fire Detection System
Yu-Chun Wen,Fa-Xin Yu,Xiao-Lin Zhou,Zhe-Ming Lu
Information Technology Journal , 2010,
Abstract: longing to each grade between consecutive frames. Experimental results demonstrated the effectiveness of the proposed scheme and a 93.3% detection rate was obtained with 25 test video clips.
Overview of Radiation Hardening Techniques for IC Design
Fa-Xin Yu,Jia-Rui Liu,Zheng-Liang Huang,Hao Luo
Information Technology Journal , 2010,
Abstract: With the development of astronautic techniques, the radiation effects on Integrated Circuits (ICs) have been cognized by people. Environments with high levels of ionizing radiation create special design challenges for ICs. To ensure the proper operation of such systems, manufacturers of integrated circuits and sensors intended for the military aerospace markets adopt various methods of radiation hardening. An overview of radiation hardening techniques for IC design is given in this study. First, seven major radiation damage sources, two fundamental damage mechanisms, five sorts of end-user effects and six types of single-event effects are introduced, followed by the brief introduction of radiation hardening techniques. Secondly, typical physical radiation hardening techniques are introduced. Thirdly, typical logical radiation hardening techniques are introduced. Fourthly, we propose our radiation hardening scheme for microwave power amplifier chip design. Here, a Radio-Frequency (RF) Power Amplifier (PA) is a sort of electronic amplifier employed to convert a low-power radio-frequency signal into a larger signal of significant power, typically for driving the antenna of a transmitter. Finally, we concluded the whole study.
Color Image Encryption Based on Secret Sharing and Iterations
Hao Luo,Fa-Xin Yu,Hui Li,Zheng-Liang Huang
Information Technology Journal , 2010,
Abstract: This study proposes a novel simple scheme for color image encryption. The RGB color components of the input image are permuted and transformed into the YCbCr color space. Then three simultaneous equations are constructed for secret sharing of the luminance and two chrominance components. After several iterations, the output of this equation set is the encrypted content. These encrypted channels are recomposed to the encrypted image. In image decryption, we merely need to solve the simultaneous equation set based on Largrange’s interpolation with several inverse iterations. The decrypted image is of very high quality for only slight degradation is introduced due to the color space mapping. Security of our scheme is well preserved as long as the permutation key kept secret. Experimental results validate the effectiveness of the proposed method.
A Novel Approach for MMIC Reliability Testing Based on Weibull Distribution
Zheng-Liang Huang,Fa-Xin Yu,Shu-Ting Zhang,Yao Zheng
Information Technology Journal , 2009,
Abstract: This study describes a reliability test method for reliability evaluation of MMICs (Monolithic Microwave Integrated Circuits) in product inspection applications. It takes advantages of the potentiality of various reliability test approaches, aiming at meeting the requirement of MMIC development. In this way, quicker realistic reliability assessment can be also realized for new products or those without historic data. Applications of this prediction model to real MMICs are illustrated and a general overview of the corresponding parameters’ influence is given. The results of this study indicate in order to predict the GaAs MMICs reliability in a fixed shorter time and smaller sample size, one can design the test based on the combination of empirical methods and statistical methods. This study proposed a reliability prediction combing Arrhenius method and Weibull statistical method and we find Weibull slope is important for the MMICs reliability characterization. The analysis predicts excellent reliability for MMICs based on Arrhenius method, Weibulll method and zero fails result.
Progressive Satellite Image Transmission Based on Integer Discrete Cosine Transform
Hua Chen,Hao Luo,Fa-Xin Yu,Zheng-Liang Huang
Information Technology Journal , 2010,
Abstract: This study proposes a progressive transmission method for satellite images based on the integer discrete cosine transform. It has two characteristics, low-complexity and lossless reconstruction ability. Besides, high quality intermediate image can be obtained at the early stage with a low bit rate. The reconstructed images visual quality at stage 4 is acceptable and the associated bit rate is approximately 0.2. In addition, when all stages transmission completed, the reconstructed image is accurately recovered. Experimental results demonstrate the effectiveness of the proposed method and show it outperforms the classical low-complexity progressive transmission method based on BPM. Our method can be used in many practical applications of satellite image transmission.
Every Connection Routing under Modified Random Waypoint Models in Delay Tolerant Mobile Networks
Hui Li,Fa-Xin Yu,Xiao-lin Zhou,Hao Luo
Information Technology Journal , 2010,
Abstract: In delay tolerant mobile networks, there are always no end-to-end paths due to sparse nodes and their irregular movement, so the forwarding of messages from source nodes to the destinations is a crucial task, which results in low probability of successful messages delivery and buffer occupancy for a long time. Routing in these networks is affected by some metrics, but the number of new connections especially is the crucial factor in delivering messages. Under this detection, we proposed every connection routing, which pay more attention to new connections between nodes but not the older ones. Further together with countdown timer and a fast buffer-released mechanism, every connection routing, are influenced by nodes’ speed, communication range and number, expiration time and simulation area. Buffer-release-enhanced weighted every connection routing may only increase processing time by the introducing of messages releasing time, but the benefit is lighter loaded buffers and higher efficiency of networks. The performance of buffer-release-enhanced weighted every connection routing is able to guarantees the validity of message delivery and improve the efficiency of the networks.
Page 1 /80935
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.