The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the rapid regression modeling research for the design optimization of Permanent magnet synchronous linear motors (PMSLM) which are applied in the linear motion machines. Based on the Finite Element Analysis (FEA), the initial PMSLM model is built and the modeling data of optimization are obtained. Then, the machine learning regression algorithm named K-Nearest Neighbor Algorithm...
As a fundamental and effective method, sparse representation based classification (SRC) has been applied to computer vision field for many years. However, SRC assumes that the training samples in each class contribute equally to the dictionary which will cause high residual errors and instability. In order to solve the problem and improve classification performance further, class specific centralized...
This paper presents an energy harvester based on an improved eccentric rotor to generate electrical power from human body motion. An eccentric mass is suspended by a rotational spring to enhance the mechanical energy captured from low and random frequencies. An analytical model of the sprung eccentric rotor is developed to explore the power generation at a volume of 1 cm3. To compare with the conventional...
Nowadays, the methods and tools of the 3D technology and human body modeling are developed rapidly, learning and analyzing 3D body scans will accelerate the development of 3D modeling. In this research, a novel algorithm using intersection views is proposed for retrieving 3D body scans. An Asian Female Body Scan (AFBS) database is established by analyzing various 3D body scan data at first, and then,...
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating...
The corrupted risk influencing factors comes from the regime, system, artificial and other aspects. They are not independent, but influence each other. With the external conditions and internal environment changes, the corrupted risk influencing factors is changing constantly. For the corrupted risk control, it is the goal for all levels discipline inspection and supervision departments to control...
There are many multivariate forecasting models which incorporate weather indicators and other information for wind farm power output forecasting. In most situations, performance of these individual models is problem-dependent. Thus, it is difficult for forecasters to choose the right technique for unique situations. In this paper, firstly, indicators such as wind speed, and wind direction are analyzed...
Cargo transport can perform many type missions, such as airlift, airdrop and airborne etc. Each type mission need corresponding cargo configuration by installing mission equipment in the cargo to meet the need of the mission. The configuration proportions of mission equipments must consider the mission capability rate, economy and utilization ratio. The paper take small scale cargo transport fleet...
In this paper, four new forecasting models ¨C univariate LS-SVM model and three hybrid models of ARIMA and LS-SVM models are introduced for wind power output forecasting. Historical data of 78 wind farms are used to compare and evaluate the performance of the best models. Empirical analysis indicates that the proposed univariate LS-SVM model and hybrid models can not significantly outperform linear...
The load identification of the shield machine is presented in this paper by introducing the mechanical analysis of shield excavating into the nonlinear multiple regression of on-site data. The analysis on mechanical characteristics of shield-soil system can decouple the nonlinear multi-parameter problem of load, so it is great helpful for the regression process to establish a load model. Then a load...
Honesty education is a very important part in higher education, but the status of college students' cheating in examination is widespread and is highly concerned nowadays. Game theory in economics is used to study and research college students' cheating in examination in this paper. By deep analysis on the reason of the behavior, a mathematic model is established, according to which the problem can...
Supply chain competition has demonstrated its popularity in the advanced business world. In such a sophisticated structure often characterized with uncertainty, the move sequence of each member may play a decisive role. However, this problem has been under researched. To fill this gap, this paper considers a competitive supply chain structure consisting of two manufacturers and two retailers, with...
The pollution of harmonics in power system becomes serious because of power electronic devices used widely. As an important device to eliminate the pollution, Active power filter (APF) becomes more popular. The result of ip iq harmonics current detection method based on instantaneous reactive power theory is the sum of all harmonics current. But sometimes it is not necessary. In response to the problem,...
While eigenvalue elasticity analysis can offer insights into System Dynamics model behavior, such analysis is complicated, unwieldy and infeasible for larger models due to superlinear growth of the number of eigenvalue-parameter as the number of stocks rises. To overcome these difficulties, we develop a summary function elasticity analysis method, which aids in analyzing the impact of a parameter...
With the acceleration of China's urbanization, living environment has become a major consideration of residents. Natural ventilation, as an important component of living environment, has therefore received more and more attention in the designing and building of residence. The paper introduces CFD technique to simulate flow field, and employs SIMPLE algorithm and QUICK difference scheme to conduct...
Spectrum sensing is one of the most important mechanisms of cognitive technology. The research of spectrum sensing has caused widely concerned, especially the sample energy detection model is widely used. To guarantee the precision of detection, most of detect mechanisms used joint mechanism, but most of them have redundant problem. This article proposes key nodes based spectrum sensing for cognitive...
Generator retaining ring is one of the maximum stress parts. The safety performance of hydrogen-cooled generator retaining ring directly affects the operation of generators and the influencing factors were studied in this paper. The mechanics of cracks on the retaining ring was analyzed. Using ANSYS finite element analysis software, the stress on the retaining ring of running generator is analyzed,...
Intrusion Detection is an indispensable component of Network Security. Because exists the problems of the high false positives rate and low detection efficiency in the current intrusion detection system, in this paper, we propose a hybrid intrusion detection model and improve intrusion detection system analyzer, applying the Data fusion and data mining techniques to intrusion detection systems. We...
With the social development, people's demand for wireless communication is increasingly urgent, but wireless spectrum resources have become more and more tense. To address these conflicts, cognitive radio has been put forward. In this paper, a cooperation spectrum-sensing scheme is proposed to efficient spatio-temporal weighted the sense results while meeting the delectability requirements. The centre...
Traditional methods for evaluating network security neglect the correlation of network vulnerabilities. To solve this problem, a method based on Colored Petri Net (CPN) modeling is presented. Potential attack sequences are built according to the correlation of network vulnerabilities. The weakness and key paths can be found through analyzing the attack sequences. Simulation results show that the proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.