The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme...
This paper extends mean shift algorithm to 3D color point cloud, and successfully realizes its clustering segmentation. Then with these segmentation blocks, we use Random Sample Consensus (RANSAC) algorithm to calculate each block's approximate plane, and keep the points which are the nearest to the plane, thus the point cloud is simplified. The experiment shows that our simplifying results are perfect.
The purpose of this paper is to present some issues that arise when applying a traditional continuous-time approach to system identification. In particular, we consider the bias that is introduced into the continuous-time model through the use of sampled data which is filtered to recover the derivative of the continuous time signals. We find that this error has two constituent components, one being...
When denoising with the method of Weickert's an isotropic diffusion equation, the textures and details will be compromised. A fidelity term is added into Weickert's equation. The coefficient of fidelity term will vary adaptively with the instant image, which makes that the diffusion term and the fidelity term come to a better compromise. Otherwise, when deciding the edge directions, because of the...
An improved image encryption algorithm based on chaotic logistic map is designed. First, after two initial values of Logistic chaotic map are pretreated, two of the modified initial values are obtained, according to which two chaotic sequences are generated. Next, two chaotic sequences are operated by cos-1 function. Last, image is encrypted combining the method of the gray value substituting. Results...
Based on the development and utilization of the Tertiary groundwater in southern Xialiaohe aquifer, the development pattern of up Tertiary groundwater is established, the primary evaluating indicators include the extraction coefficient of groundwater, the over extraction coefficient of groundwater, the aquifer thickness, the chloride ion concentration, groundwater level, a new fuzzy identification...
To maintain the maximum achievable efficiency for the photovoltaic (PV) systems, it is crucial to achieve the maximum power point tracking (MPPT) operation for realistic illumination conditions. This paper presents the application of the adaptive extremum seeking control (AESC) scheme to the PV MPPT problem. A state-space model is derived for the PV system with buck converter. The AESC is used to...
Nowadays, multiple bit upsets (MBUs) have been widely investigated in memories. Conventional single error correction and double error detection (SEC-DED) codes are capable of correcting one error and detecting all possible double errors. However, they may not provide adequate protection against MBUs. This paper proposes new single-error-correction, double-error-detection double-adjacent-error-correction...
In parallel computing, the memory requirement is an important problem, and in parallel software development, it is vital to optimize the memory management strategy. Programmers need to know the memory optimizing degree. But, the parallel programs' performance evaluation metric speedup only refers to computing time, without considering the memory cost when executing programs. In this paper, the relationship...
This paper presents a grid-connected control strategy that appLies to wind generation system on the basis of Z-source inverter. It systematically explains the operating principles and the mathematical model of the system architecture, adopting a novel voltage space vector modulation method with shoot-through zero vectors and analyzing its performance characteristics. A method is developed for generation...
It is necessary to calculate temperature field accurately in asphalt pavement with different climatic informations to prevent excessive rutting or fatigue cracks in asphalt pavements. It's also essential to design the suitable pavement structures and to choose grades of asphalt binder rightly. Based on the thermology theory, the mathematical equation of heat exchange in the asphalt pavement for two...
Present a method for computing the embedded depth in rock of the laterally loaded rock-socketed piles. The method, based on the Hoek-Brown failure criterion, takes into account the mobilized lateral shear resistance along the bond of perimeter of the pile in rock. The proposed method is verified to be more reasonable by comparing its result with that of other existing methods.
This paper investigates a three-phase four-wire fuel cell power system. The system is sensitive to the load characteristic in a stand-alone mode, because variation or unbalance of the three-phase load will affect the safety and lifespan of the fuel cell. A novel power management unit (PMU) with its control strategy is proposed. The PMU can compensate fuel cell slow dynamics. In addition, the PMU acts...
Bayesian network is an uncertainty inference network based on probability. Its structure learning is one of the main research techniques in the field of data mining and knowledge discovering, while constructing Bayesian network structures from data is NP hard. According to the information theory and conditional independence test, a new algorithm is presented for the construction of optimal Bayesian...
In a Time Division Synchronous Code Division Multiple Access (TD-SCDMA) system, one of the critical components is the RF power amplifier. However, RF power amplifiers are perfectly linear. This is one of the main concerns in an RF power amplifier design. The nonlinearity control is described by the out-of-band power emission levels, and the nonlinearity of an RF power amplifier is described by the...
To improve the separation efficiency of steam and gas in power plant a new type steam separator is presented. A mathematical model is established for simulating the flow field of gas flow channels in steam separator. The gas-water separating efficiency is calculated for the droplets at different particle diameter. The equations are solved by using computational fluid dynamics (CFD) method. Fibreglass...
In this paper, a braking energy recovery system based on super-capacitor was presented. The method use super-capacitor and the conventional braking resistance constitute a new braking unit to realize the regenerative energy recovery, when braking, braking energy will be stored in the super-capacitor by a DC/DC converter. meanwhile, the conventional braking resistance still keep in system to ensure...
In order to improve collecting efficiency of wet electsostatic precipitation a new polar matching system is presented. Based on Gauss Theorem and image charge method the mathematical model is established for calculating electric field intensity distribution of the new polar matching system. The results show that the electric field intensity gets homogeneous at the polar plate when polar space is at...
Particle Swarm Optimizer (PSO) suffers a problem which gets used to trap into a sub-optimal solution, especially in Constrained Optimization (CO). On the other hand, it's difficult to converge to a feasible domain for some constrained optimization problems. The paper proposes a two-stage probing method to improve PSO method. The first stage guarantees the particle to get away from feasible region...
Based on computational fluid dynamics method of two-phase flow, Separation efficiency of steam separator used for steam-water separating in power plant is presented. A mathematical model is established for simulating the flow field of gas flow channels in steam separator. The trajectory of droplets is obtained by using particle motion equation. The gas-water separating efficiency is calculated for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.