The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the cross regional interconnection of the power grid, it is more and more inconsistent with the actual development of the power grid to use a single sandpile to simulate the power grid. The multi-sandpile model is developed to simulate the evolution process of the whole power grid failure in the form of all the single sandpiles evolving synchronously. First of all, the modeling method of multi-sandpile...
According to the application of cellular automata theory in complex system, a new kind of cellular automata model of grid failure is proposed which starts from basic concept of cellular automata and defines the composition method of cell, cellular rules and neighbors and so on. By simulation of the model, it is able to get the evolution of grid failure and it comprehensively considers of structural...
We present a novel method for performing Electromigration (EM) verification for VLSI interconnects. It provides an accurate metric for EM reliability for the entire design thus it is not affected by the inherent pessimism existing in the current state-of-art methods used by the industry. In this method, failure rates are computed for each wire interconnect and accumulated in the design. It then becomes...
Small cell densification and advanced multi-user access schemes are promising approaches to dramatically improve 5G system performance. Towards efficient spectrum usage in ultra-dense heterogeneous networks, spectrum reuse between backhauling and access links combined with full duplex is applied. This forms a full-duplex self-backhauled heterogeneous network (FS-HetNet). Considering co-channel interference...
We consider link scheduling in wireless networks for emptying the queues at the transmitters in minimum time, with time constraints, or deadlines, for one or multiple individual links. We formulate the minimum-time scheduling problem with deadlines (MTSD) mathematically and derive the optimal activation order of the link sets in a schedule solution. Theoretical results are obtained, showing that the...
A permutation flowshop scheduling problem of optimizing the makespan and the total flow time, which can be expressed as Fm|prum|(Cmax, ΣCi), is considered in this paper. An improved multi-objective memetic algorithm (IMOMA) is proposed due to the NP-hardness of the problem. In order to effectively trade-off between two objectives, we propose a NEH and LR heuristic based initialization strategy and...
Episode Rule Mining is a popular framework for discovering sequential rules from event sequential data. However, traditional episode rule mining methods only tell that the consequent event is likely to happen within a given time intervals after the occurrence of the antecedent events. As a result, they cannot satisfy the requirement of many time sensitive applications, such as program security trading...
Belt conveyor is one of the most important devices to transport bulk-solid material for long distance. Dynamic analysis is the key to decide whether the design is rational in technique, safe and reliable in running, feasible in economy. It is very important to study dynamic properties, improve efficiency and productivity, guarantee conveyor safe, reliable and stable running. The dynamic researches...
This chapter addresses existing techniques for Web mining, which is moving the World Wide Web toward a more useful environment in which users can quickly and easily find the information they need. In particular, this chapter introduces the reader to methods of data mining on the Web developed by our laboratory, including uncovering patterns in Web content (semantic processing, classification, clustering),...
In this paper, the risk measurement and early warning of future power blackouts are carried out, from the angle of the lost load. Based on the entropy theory which is used to characterize the degree of power blackouts, this paper proposes a lost load forecasting model based on maximum entropy, and uses the Gansu power grid to calculate and analyze the proposed model. The example shows that the proposed...
Electroacupuncture (EA) is often used in China for treatment of muscle spasticity in post-stroke patients, however the duration of EA stimulation is decided subjectively currently since there is no objective means of outcome monitoring for EA. To explore a potential prompt monitoring technique for EA, inertial sensor system is used in this study on tibialis anterior (TA) muscle under EA therapy among...
A new collaborative detection method of TDOA(Time Difference of Arrival) and DOA(Direction of arrival) has been proposed for weak signals. The fuzzy evidence theory is used to fuse the peaks of TDOA correlation and the spatial spectrum of MUSIC(Multiple Signal Classification).In the paper, the TODA/DOA collaborative detector is designed, the basic probability assignment fuction(mass fuction or BPA...
In wireless powered communication networks (WPCNs), each user node, e.g., wireless powered sensor, is capable of either harvesting energy from a power station or transmitting data to a sink node. In the previous works, time division multiple access (TDMA) is typically used for transmission scheduling in WPCNs, that is, only one node can transmit data in one time slot. The spectrum efficiency is therefore...
Power grid weak links affect the safety of power system operation directly. The index of conditional value-at-risk will be applied in this paper to evaluate weak links. Firstly, the paper introduces the theory of the index and the method of evaluation. Then a lines status sampling method which combines load rate and non-sequential Monte-Carlo method is proposed to calculating lost load. Finally, the...
In order to further study the self-organized criticality when large-area blackouts happened in power system, a model that is used to simulate power system blackout process in all the components power flow limit relative fixed time is proposed. This model researches holistic dynamics when power system is in SOC state and research on the relationship between loading rate distribution and self-organized...
In this paper, a data driven method for Wind Turbine system level anomaly detection is proposed. Supervisory control and data acquisition system (SCADA) data of a wind turbine is adopted and several parameters are selected based on physic knowledge and correlation coefficient analysis to build a normal behavior model. This model is based on Self-organizing map (SOM) which can project higher dimensional...
Target tracking has always been a hot research topic in the field of computer vision. Tracking-Learning-Detection (TLD) is a new algorithm for online learning tracking proposed by Zdenek Kalal. In the algorithm, the computation consuming of detection module is relatively large. To solve this problem and improve the algorithm, we proposed an online learning method to adaptively update the threshold...
In order to recognizing the feature of abnormality in advance and fix the possible dirty data simultaneously, this article proposed a method to construct a proper mode for a production process producing specific product, a method to estimate the stability of a linear process and a group of data cleaning rule. Both the data processing procedure and algorithm are given detailedly with some samples and...
Nowadays motion detection in video sequences is the basis for the high-level analytics and applications. After ViBe is proposed, the current mainstream detection algorithm is based on pixel level to construct the background model for the foreground / background segmentation. Influenced by this kind of algorithm, this paper proposes a spatiotemporal-based algorithm to construct an approximate precise...
In this paper presented a CPW-fed monopole antenna,which design for WiFi and 4G (LTE) utilizations. The proposed antenna contains a U- slot in the circular patch with gradually varied ground to improve the impedance match, and it occupies a compact size of 42*28.38*1.5mm3. Through simulations and measurements, the proposed antenna with dual-band operation is suitable to for 4G LTE and WiFi utilizations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.