The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the problem of fault detection for networked control systems under simultaneous consideration of time-varying sampling periods and packet dropouts. By taking time-varying sampling periods into consideration, a new closed-loop model for the considered NCSs is established. The sampling period switching-based approach and the parameter uncertainty-based approach are adopted to...
Muscle forces modeling and computation around the elbow are focused on in this paper when the elbow flexing and extending in the sagittal plane. The paper introduces a Rehabilitation Intelligent Training System (RITS) for restoration of motor function. The system has advantages of small size, less weight and interaction during the rehabilitation process. Furthermore, this system mainly consists of...
A novel water-drop power generation system is proposed based on ionic conducting polymer film (ICPF) material in this paper. ICPF is a new intelligent material, which has piezoelectric power generation capacity. As a piezoelectric material, ICPF can generate charge with using the feature. This power generation device mainly includes water-drop generating device, rectifier unit and storage unit. In...
A command filtered back-stepping path following control is exploited to design a dynamic state-feedback controller for a Water-jet-based Spherical Underwater Vehicles, which obviates the computation of analytic derivatives in the traditional back-stepping design. The ISS-modular approach provides a simple and effective way for controlling non-linear Underwater Vehicle satisfying the strict-feedback...
Detection of buried radioactive objects faces challenges such as low energy counts and strong background clutters due to the burial of the targets. Classical detection methods such as the constrained energy minimization (CEM) and the RX method, when applied separately, may not be able to yield satisfactory results. In this paper, we propose to combine detection results from individual detectors through...
As the local power load fluctuates more and more frequently, the usual macroscopic method is not suitable for the regional load forecast. The paper presents a load forecasting method mainly for the next 3–5 years, which introduces business expanding information of the large industrial consumers to reflect the local load variation. And the S-shaped growth curve theory is put forward to describe the...
This research aims to explore the perceptions of students in using learning management system (LMS) in order to enhance the learning process of students. The research also identifies issues that students faced when using LMS in order to improve the ease of use of LMS. Technology Acceptance Model (TAM) is used as the theoretical framework to explain the adoption of LMS in term of perceived ease of...
Since the CSI 300 index futures launched by the China Financial Futures Exchange in 2010, stock index trading has become another central issue in domestic financial research. This study determined the theoretical relationship between the margin level and market trading volume by using the definition of margin liquidity cost in a mathematical analysis model, and derived the general conclusions about...
Stroke-density based elastic meshing method can not only absorb the deformations of stroke in different handwritings but also avoid the non-uniform width of strokes which caused by using a nonlinear normalization method. In view of existing situation that the stroke density functions do not consider the distribution of strokes in diagonal direction, the stroke-density based vertical-horizontal elastic...
In World Wide Web, images come together with valuable surrounding contextual information such as texts. There are very few efforts performed to address problems in mining of the images with their surrounding contextual information; although this information has long been extracted for wide range of uses such as image annotation, clustering of images, inference of image semantic content and image indexing...
Many image features can be extracted from very high resolution remote sensing images for object classification. Proper feature combination is a step towards better classification performance. In this paper, we propose a logistic regression-based feature fusion method which assigns different weights to different features. This method considers the probability that two images belongs to the same classes...
The evolution of World Wide Web technologies since 1990 from Web 1.0 to Web 3.0 have dramatically influenced learning of the students, thus provided a new learning environment beyond those traditionally conducted. However, students in academic institutions, who are categorised as digital native, are familiar in using Web 2.0 tools for their personal life but lack the primary skills to use them academically...
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be used for unknown protocols...
The interface design of software used on Home Appliances targeted at satisfying passenger's physiology and psychological needs when operating the machine to the maximum extent is a complicated synthetic topic which embracing ergonomics, visual communication design, user experience design, behavior psychology, cultural studies of the consumer, optics and Chromatics and so on. So, it is very difficult...
In this paper, we propose a color table based distributed collision avoidance algorithm to resolve the reader collision problem (RCP) of radio frequency identification (RFID) reader network. The proposed algorithm is developed to overcome the drawbacks of distributed color selection (DCS) and Colorwave algorithms. Firstly, we use a systematic method to help reader select a new color when collision...
The main purpose of this study is to explore the learning experiences of students in utilizing wiki to facilitate the development of critical thinking skills in higher education. Wiki was introduced to 19 postgraduate students in a post-1992 university in the United Kingdom. The responses of students towards wiki were explored based on the discussion and interaction in the wiki pages. Questionnaires...
Digitally Reconstructed Radiograph has been widely used in 2D-3D image registration. This paper adopted an improved method which optimizes the parallelization on GPU to accelerate DRR generation. A cubic window is proposed to preprocess the object data, which helps accelerate the DRR generation. According to the Cuda-based experimental results, the improvement is quite obvious and the image quality...
As renewable generation and clean energy source, photovoltaic (PV) generation has a promising prospect. China has now established a number of MW solar power plants. With certain control strategy and under certain operating conditions, PV generation is able to demonstrate good reactive power supporting characteristics for future smart distribution system. This paper has done some preliminary researches...
With the development of internet and information technology network security has become the hot spots of computer science. Effective monitoring operational status of every equipment is very important in the Local Area Network (LAN). This paper studies key techniques for monitoring LAN, such as process automatic loading and hidden, network covert communications, network data secure transmission, to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.