The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sea clutter is the backscattered returns from a patch of the sea surface illuminated by a radar pulse. An efficient computational electromagnetic (CEM) method based on ray tracing algorithm and a time-frequency analysis method are applied to simulate and analyze the sea clutter from wind-driven sea surface and breaking waves. First, the three dimensional (3-D) time-evolving sea surface is geometrically...
With the rapid development of online social networks (OSN), the influence of rumor propagation on social life raises great concern. Traditional rumor-propagation models, which do not fully consider the features of OSN, are not suitable for use in OSN. In this paper, we focus on discovering a pattern of rumor-propagation phenomena in OSN, and propose a novel rumor-propagation model, inspired by a ball...
The multicast broadcast service (MBS) is introduced in WiMAX for the demand of real time multimedia services in mobile networks. To enhance the performance of MBS, an MBS zone is constructed in IEEE802.16e system. An MBS zone consists of several adjacent BSs. In this paper, a novel scheme is proposed for energy efficiency of MBS zone in WiMAX system. The MBS channel will be terminated for the BS in...
Performance Index is the foundational and essential indices of measurement of SoS(System of Systems) capability. We propose ten sorts of mapping relationships description between kernel elements of SoS architecture based on the DSM/DMM model. The formalization of model transformation, combination and transposing operators are described as the foundation of proposition of formulation to measure the...
The theory of component value analysis and lines analysis were introduced in this paper, we can get a comprehensive description of the product model as a system by lines analysis and identify the inadequacies of the system‥ We can identify the weakest link in the system by components value analysis, so as to provide direction to solve the problem of improving product design. The application of component...
The design software used in the Matlab interface as the application development platform, and with a SQL Server database as the background data storage tool, in order to achieve efficient human-computer interaction function. From the results of view, the end result meets the design requirements, host computer receives a wireless sensor network module transmission to the temperature, humidity, air...
With the informationization of mechanical devices, high precision sensors have been widely applied to all kinds of mechanical devices for the information gathering. However, as the sensors are produced by various research centers and manufacturers, there is a considerable difficulty in examining and identifying the sensors. In this article, A new intelligent analysis model based on BP+GA algorithms...
Although the probabilistic model checking tool called PRISM had been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism lets CAN as leader in serial communication for automobile and industry...
Emergent behavior is a core trait of SoSs. But the emergence cannot be predicted before its appearance. We propose a method which using Semi-autonomous Agent based simulation to detect the emergent behaviors of SoSs. Agent based Modeling and Simulation are available for the observation of emergent behaviors of SoSs. We propose the multi-agent based simulation methods to demonstrate the evolution of...
The road network emergency evacuation means evacuating the traffic flow which is trapped to safer areas as immediately as possible, in order to bring the least impact and destruction by emergent catastrophe events. As the critical issue in emergency evacuation, aiming at the shortest evacuation time, we build a route selection model in emergency evacuation based on quasi-user optimum dynamic traffic...
The propagation model of P2P worms can reflect the worm behaviors and identify weakness in the worm propagation which gives guidelines to worm detection and defense. To improve the security of P2P network, a mathematical model is proposed which combines dynamic quarantine and P2P churn. The SIQRW model departs from previous P2P worm models in that considering the dynamic quarantine methods and the...
Capacitor Commutated Converter (CCC) is a new kind of converter characterized by having capacitors inserted in between the converter transformer and the converter valves. Its behavior as harmonic source is the research point of this paper. Characteristic harmonics at the dc and ac side of CCC-HVDC system are studied, analyzed and compared with the Line Commutated Converter HVDC (LCC-HVDC) system....
In this paper an MRESDL dynamic model is proposed for analyzing file diffusion in a node-to-node (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each node not only shares the downloaded parts of the file, but also downloads the needed parts of the file. This behavior is similar to the spreading of epidemic diseases. The well-known medical model SIR is applied...
Command agent has characteristics such as autonomy, reactivity, sociality. In line with command agent's characteristics, multi-agent and petri nets reintroduced into the study of command agent. The existing Agent-Oriented Petri Nets is improved. Based on the improved AOPN, the specific conduct course of command agent is analyzed in-depth. The formalized model of a single command agent and the architecture...
In this paper we propose an IEDL dynamic model for analyzing file diffusion in a peer-to-peer (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each peer not only shares the downloaded parts of the file, but also downloads the needed parts of the file. This behavior is similar to the spreading of epidemic diseases. We apply the well-known medical model SEIR to...
This paper aims to compare three models in terms of development policies, development potentials and operational mechanism by evaluating, identifying and choosing the best one to meet the needs of tourism development and management in the nonoptimal tourism districts (NTDs). The methods of Participatory Rural Tourism Appraisal and Analytic Hierarchy Process are employed to collect the necessary data...
As changes constitute the main cause of schedule delay, cost overrun and other distributions, change management is an important aspect in construction project management. Many change management systems has been developed to minimize the impacts of change or to facilitate change management. However, changes should be predicted as early as possible, and then enable project management teams to take pre-management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.