• Citations Per Year
Learn More
Here introduces a monitor system technically based on ARM7 embedded micro processor (HMS30C7202) and Micro C/OS-II embedded operating system. The paper provides the scheme of the principal, introduces the connection method of outside signals, tells about how to transplant the Micro C/OS-II to the operating system, and shows the programming emphases and some(More)
In this paper, a new classification scheme, which extracts the main scattering mechanism with target scattering similarities, is proposed. This approach not only leads to improved understanding of scattering mechanisms, but also has good performance in discriminating different scattering type of land cover. The NASA/JPL AIRSAR data is used for validating(More)
The resource requesters and providers often belong to different security domains in the openning network. It can be achieved through automated trust negotiation to build confidence and to ensure the security of shared resources. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper analyzed the automatic(More)
The resource requesters and providers often belong to different security domains in the opening network. It can be achieved through automated trust negotiation(ATN) to build confidence among strangers and to ensure the security of shared resources. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper(More)
In the open network, the resource requesters and providers often belong to different security domains. It can be achieved through automated trust negotiation(ATN) to build confidence among strangers and to ensure the security of shared resources. How to speed up the subsequent negotiation between these entities is the important issue. This paper analyzed(More)
  • 1