The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Gun's vibration during its shooting makes projectile impact bore much more fiercely, which cause projectile's initial disturbance and affect gun's firing accuracy. Among gun's multiform vibrations, lateral vibration has the maximal influence to firing accuracy. The paper builds simulation model of gun barrel's lateral vibration based on finite element method and ascertain the equations of gun barrel's...
The instability disaster prediction model of tailings dam had been established, based on system analysis of the factors that caused the instability disaster of tailings dam, by selecting 6 prediction index, medium unit weight, cohesion, internal friction angle, slope angle, slope height and pore pressure ratio and combining with using theory of the rough set and neural network. First the rough set...
Against the low efficiency of training on large-scale SVM, a reduction approach based on kernel distance clustering is proposed. The kernel distance's formulation is brought in to cluster the highly-dimensioned dataset, and the clustering step will reduce a large amount of unsupport vectors during training, thereby, the training time will decrease. The experiments show that this new training algorithm...
In this paper, we proposed a lightweight framework for correctness of software development based on B formal method. The purpose of this framework is to transform requirement documents described by natural language to executable codes. During the process, at first, the elements and relations of the target system are acquired through natural language analysis from requirement documents. Then modules...
Firstly, the article introduces the WIA-PA wireless network which is under study at present and can be used for industrial control. Aiming to FTSP algorithm can be used correctly in this network, combined with the unique TDMA media access control method of this network, this article takes a way building the logic synchronization tree to improve the precision of multi-hop FTSP clock synchronization...
Currently, friction drive with ultra-low speed and high accuracy is widely used in large astronomical telescopes. However, astronomical telescope is a large inertia load. Slippage and creepage are hardly avoided while the telescope are operating at ultra-low speed and facing variable external disturbances like wind buffeting. This paper describes the control method and software design for the large...
Ontology matching is the key process of semantic interaction and knowledge sharing. It is the basement of the other semantic web application, such as, semantic web-based service, ontology alignment. The purpose of ontology matching is to reuse the ontologies and integrate them in different fields, so as to implement the bigger pool of information and knowledge for the new communication and application...
Location and tracking the human faces is one of the critical technologies in free stereoscopic display system. But because of illumination variation or facial expression, it is difficult to detect human faces accurately and fast. In this paper, an infrared face detection based on real Adaboost algorithm and Cascade structure is implemented. With active infrared illumination, the problem caused by...
This separated cutting stock problem is a packaging of all rectangular pieces into a predefined size of material stocks using a minimum amount of these materials. It is similar to the trim-loss problem of subtracting the cost of a knife setup and adding the requirement of using the mini-mum number of material stocks. Current solving methods include the cutting stock problem, trim-loss problems, or...
This article firstly presents an analysis and survey regarding the traditional evaluation and forecasting model on fuzzy time series. lt is pointed out that the maximum Subordination degree method and Subordination degree-Weighted average method is not suitable to attribute space usually, and a new evaluation model is proposed. The empirical study show that the new evaluation model is better able...
Based on English phonetic spelling correction algorithm, this paper is to solve common spelling errors such as missing letters, extra letters, disordered letters, as well as phonetic spelling errors in the perspective of from the same pronunciation, similar pronunciation. Through the analysis of the causes of the spelling errors, an algorithm of combination of phonetic spelling correction, phonetic...
A new prediction method combined variable weight Gray Verhulst model and gray integrated relation grade was proposed in this paper to solve the problem of power transformer fault prediction. Because power transformer gases concentration sequence was S-shaped, Gray Verhulst model was chosen to forecast the gases concentrations. Variable weight Gray Verhulst model was proposed based on 2 improved Gray...
Choosing the kernel and error penalty parameters for support vector machine (SVM) is very important for the performance of classifiers. An improved grid-search algorithm is proposed to choose the optimal parameters of SVM. The battlefield multi-target SVM classifier is designed using this algorithm. Also three classifiers including k-nearest neighborhood classifier, improved BP neural network classifier...
Over the last few years, a large number of security patterns have been published. However, this large number of patterns led to a problem in selecting appropriate patterns for different security requirements. In this paper, we present an automatic selection approach for security patterns. We use text processing approach and learning techniques to select appropriate security patterns for given security...
Software cost estimation is a key open issue for the software industry, which suffers from cost overruns frequently. As the most popular technique for object-oriented software cost estimation, use case points(UCP) method, however, has two major drawbacks: the uncertainty of the cost factors and the abrupt classification. To address these two issues, we propose the extended use case points (EUCP) method...
Representation and similarity measure of time series is the research basic of the time-series data mining. This paper uses ESAX (extended symbolic aggregate approximation) representing the time series similarly and raises an improved time series method of similarity measure ESSVS (ESAX statistical vector space) based on the statistics symbolic vector space method. ESSVS measure the time series similarity...
This paper presents a fast stereo algorithm for obtaining disparity maps efficiently. We use a 3D model for storing and computing the depth map. The initial matching by intensity similarity is very fast by using the computational optimization. At the improving matching reliability step, two assumptions that were originally proposed by Marr and Poggio are adopted: uniqueness and continuity. It means...
Map building is very important to accomplish autonomous navigation and other complex intelligent tasks. A novel method of feature map building was proposed to process the uncertainty data and noise data of sonar. This method has introduced sonar arc to describe detectable region for sonar, and extracted line by a novel Hough transform based on randomized Hough transform and multi-resolution Hough...
Hard disk's head (HDH) is one of the most important parts in a hard disk. Because the floating height between the HDH and the platter is very narrow, it is necessary to make sure that the HDH's pitch angle and roll angles are from -0.05?? to 0.05?? on the Head Stack Assembly (HSA). The maximum error is 0.0226?? for pitch angle and 0.0288?? for roll angle according to our experimental results. This...
Requirement tracing is an important activity for its helpfulness to effective system quality assurance, impact analyzing of changes and software maintenance. In this paper, we propose an automatic approach called LGRTL to recover traceability links between high-level requirements and low-level design elements. This approach treats the recovery process as Bayesian classification process. Meanwhile,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.