The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problem of lacking shear wave velocity information in oil and gas field, based on conventional logging data, a support vector machine(SVM) model is used to map the relationship between shear wave velocity and natural gamma, acoustic time difference and resistivity of shale, and then a machine learning method for shear wave velocity prediction is proposed. The model was trained...
For solving the problems of modern intelligence algorithms such as slow convergence and low precision, a new algorithm based on bionics principle has been proposed which is inspired by the foraging behavior of seven-spot ladybirds in the nature. By analyzing the bionic principle of Seven-spot ladybird Optimization(SLO), we simulate the region search pattern of predation of seven-spot ladybirds, combining...
To meet the force characteristics test for electromagnetic actuator under high temperature, a force characteristics test system for high temperature electromagnetic actuators is presented. In this paper, the structure of the system are introduced and the thermal finite element model of the system are established. The influences of the screw joint and the structure parameters of heat insulation component...
The concept of dual-band reconfigurable terahertz patch antenna using a graphene-stack-defined backing cavity is presented. The proposed antenna employs patch resonance based on backing cavity defined by interleaved graphene/Al 2O3 stacks, which can be dynamically dual-resonance frequency-tuned on large range about 1 THz via electrostatic gating on the graphene stack. The performance is analyzed in...
As for the synchronization control of double winches of large crawler cranes, a master-slave PI control strategy with the hook's inclination as feedback signal is proposed and analyzed. The transfer function of the pump-controlled dual-winch system is obtained by building the mathematical model and linearizing it around the working point and thus the stability and steady-state error are analyzed....
Unidirectional proportional pump-controlled asymmetric cylinder systems are widely used on industry machines, but the analysis and synthesis of such systems is very hard due to the nonlinearity caused by the different working areas of cylinder piston. The one-way flow control ability of the unidirectional proportional pump makes the problem more complex. To realize the nonovershooting position control...
In this paper, we have studied the software control system of battery test platform, focusing on Simulink and C # hybrid programming. At first, we build a simulation model in accordance with the needs of battery test platform. Then, we select RTW tool to generate standard C code after test and verify. Next, we use C# tool and regular expression to write program on the basis of the code to realize...
In general, geometrical-optics and physical-optics were used to analyze paraboloidal reflector antenna. Good numerical results will be obtained by using these two methods for electrically large paraboloidal reflector antenna; however the feeding structure is omitted. The numerical results are not in agreement with experimental results, when the feed structures have strong impact on radiation. The...
This paper formulates a dynamic programming model to investigate the impact on the inventory management with respect to carbon emission problem. Our results show that, the lower control limit of replenishing policy is smaller than that of non-carbon case while when the ratio of transferring cost to holding cost is larger than the service level of non-carbon system, while the upper bound of inventory...
Nowadays, more and more vehicles make traffic heavier day by day, and parking spaces are becoming lack. It leads to parking difficult and disorder. A modernized intelligent parking system (IPS) is designed to help solve these problems. This system is based on ZigBee and Anisotropic magnetoresistance (AMR) technologies. ZigBee is a low-power, low-cost, wireless mesh network standard. ZigBee sensor...
Because of the blocking effect of “knowledge filter”, new knowledge, which has been created out but not well commercialized by existing organizations, may be appreciated by others and then become the main source of entrepreneurial opportunities. Through kinds of knowledge spillover channels, such as spatial agglomeration, social network, labor mobility and intellectual property market, entrepreneurs...
Conical twin-screw is a kind of surface body with complex geometric parameters. In order to realize rapid and accurate 3D modeling, according to the generation theory of the screw kinematics, this paper proposes a swept modeling method based on the spiral curve. In the method, the trajectory of spiral curve and the tooth profile section are taken as swept path and primitive respectively. By the vertical...
In this paper, an inventory control policy and routing strategy are jointly considered by developing dynamic programming model in vendor managed inventory system. The inventory policy is proved to be (s, S) pattern and two routing options are examined by simulation. Our numerical study shows that the best routing policy is to choose the farthest one from the supplier, consecutively. Compared to maximum...
We compare the quality of some classic Electrical Impedance Tomography (EIT) algorithms according to different methods of solving inverse problem. We carried out a transverse comparison between single-step reconstruction and modified Newton-Raphson algorithms (MNR). Our results of the simulation evaluation demonstrate Sensitive matrix algorithm is better than equipotential lines back-projection algorithm...
This paper considers the blind source separation in under-determined case, when there are more sources than sensors. So many algorithms based on sparse in some signal representation domain, mostly in Time-Frequency (t-ƒ) domain, are proposed in recent years. However, constrained by window effects and t-ƒ resolution, these algorithms can not have good performances in many cases. Considering most of...
In view of the shortcomings of traditional multi-objective optimal methods, this paper introduces iSIGHT which is a kind of optimal design software. Based on optimal design framework Isight, the multi-objective optimal design method and step using the Neighborhood Cultivation Genetic Algorithm (NCGA) are investigated. Taking a multi-objective optimal design of spring as the example, the Pareto optimal...
Aimed at the problem of Byzantine Attack in secure network communication, the network security assumptions which may contain Byzantine attacks are analyzed and described firstly. Then a secure random network coding model is proposed for resisting the Byzantine attacks where the CBC (Cipher Block Chaining) technology is combined with random network coding, we prove the correctness and security also,...
In view of conception and connotation system of the HRST (Science and Technology Human Resource) in one area, this paper analyzes systematically the components, the structure, the function, the relationships between elements and the interacted mechanism in this system, and the mathematical description of the system is given in order to lay the foundation in grasping the essence, the evolutionary directions...
The hierarchical threat model is proposed to address the issues that the active-n-m attacker model can't reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls...
A new algorithm for the problem of tracking multiple maneuvering targets in the presence of clutter is proposed, through extending the IMM/Mscan-JPDA filtering algorithm, to the fixed-lag smoothing case. A suboptimal fixed-lag smoothing algorithm is developed by applying the IMM and the multiscan JPDA approaches to a state augmented system. The proposed algorithm is illustrated via a simulation example...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.