The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problem of combined explosion in disassembly sequence modeling, a theory of general axle is proposed based on the relationship between containing and being contained of hole-shaft constructs in mechanical system. Principles are then employed for decomposing a disassembly system into several leveled and nested general axle units. All general axle units have the unified name and...
The marine environmental data has a strong temporal-spatial characteristic. The ocean is always changing. In terms of time scale, marine environmental information is characterized by its climatology-scale variation features (i.e. year, season) and weather-scale variation features (i.e. day, hour). The multi-time scale and time-varying characteristics of marine environmental data products bring foreword...
This paper describes policy-based dynamic resource allocation for virtual machines on Xen-enabled virtualization environment. Though virtualization technology provides better utilization of server resources, it adds much more management complexities such as monitoring and reallocating resources constantly for each domain. Resources consumed by domains may differ subject to the services provided by...
The middle-low voltage distribution networks mostly adopt neuter point not-valid grounding(be so called to the small current groundding system).The distribution wire fault particularly the fast and accurate location that the single grounding fault, not only to the repair wire and promise dependable power supply, and circulate to the safe stability and economy that promises the whole electric power...
How to suppress Gauss white noise that is inside the pass band of Pseudo-random code phase-modulation and pulse-doppler combined fuze is studied. According to the characteristic that Gauss white noise is stochastic, noise can be suppressed through getting the average of echo signals in several pseudo-random code cycles. The simulation results show that the ratio of maximal side lobe and main lobe...
Because of the environment and the nature of the signal itself, GPS or wireless mobile positioning technology always has any unavoidable defect. But higher coverage percentage, reliability or precision than single positioning can be gained if integrating at least two positioning technologies' advantages and avoiding their deficiencies. So the developmental trend of mobile positioning technology is...
In order to overcome the convergence deficiency of the basic ACO, an improved ACO based on the direction of the logistics and distribution problem was proposed. The logistics optimization method was used to optimize the path finding in the ACO. The simulation results show that the method of optimization of logistics and distribution path is practical and effective. This study provides a new powerful...
The paper propose a new algorithm based on NSCT in fusion for CT image and MR image. The low-frequents subbands and high-frequents subbands are get after NSCT. Gray value weighting is adopted in low-frequency image, and maximum module rule are adopted in high-frequents subbands. Experimental results compare with other method, and a set of quantitative evaluation criteria is given. Experimental results...
A soft sensor was developed to estimate the concentrate grade and recovery rate of a flotation circuit. The algorithm uses kernel principal component analysis (KPCA) and composite kernel support vector regression (CK-SVR) to perform the estimation. Firstly, the flotation prior knowledge and KPCA are employed to reduce the dimension of input vector of CK-SVR. Then, considering that the characteristics...
A novel method on characteristic lines extracting of digital images is presented in this paper by using the moment of inertia theory, which is used to extract the characteristic lines in digital images through treating them as rigid bodies. The characteristic lines process scale and rotation invariant inherently. Experimental results manifest that using the angle difference between characteristic...
In this paper, we present a software framework in single chip machine (SCM) based on the message-driven method which used to be applied in message-driven operating system in PC. Due to the computing limitations of SCM, many crucial design patterns and components of the PC operating system, including soft-timer, User Interface, message classification and instruction queue should be redesigned to be...
In order to realize the on-machine verification of CNC, both the uploading of the verification programs generated in user's computer to CNC and the downloading of the verification results from CNC to user's computer are badly needed for the subsequent modules in on-machine verification system. In light of serial port RS232's universal application, the author would do in-depth research on the serial...
This paper put forward a new method of the SVM and variable structure artificial neural network model for short-term load forecasting. The neural call function is basis of nonlinear wavelets. We overcome the shortcoming of single train set of SVM. It can be seen from the example this method can improve effectively the forecast accuracy and speed. The forecast model was tested and the result showed...
The principle and step of performance evaluation of project management based on SVM and fuzzy rules are studied. The index system of performance evaluation of project management is set up. Then we built up the evaluation model on SVM and fuzzy rules. Finally, take some samples of project for an example, we carry on this model to instance. It can take a preferably evaluation, so that it is a viable...
In order to solve high energy consumption and avoid energy wasted in industry, an energy-saving pulse power supply is used in this paper. According to the principle of electrostatic precipitation, the paper analyzes the reason of anti-corona when higher resistivity powder is removed. Electrostatic precipitation can work with high efficiency and energy-saving by using new technique of power supply...
XML is a self- describing and platform- free language, which has become a powerful tool when exchanging and sharing information among different heterogeneous system on internet. The data Consolidation method based XML Schema is put forward in this paper, by the combination of model method based XML and schema mapping method, schema Consolidation is realized, thus, public schema is produced, lastly,...
LTE of the UMTS Terrestrial Radio Access and Radio Access Network is aimed at supporting high speed package data service. LTE constitutes a major step toward 4G network and supports both FDD mode and TDD mode. In this paper, we study the interference cases of LTE TDD system, especially the crossed timeslot interference (CTI) is discussed and evaluated in detail. According to the simulation assumption,...
On the basis of the analysis about the existing large-scale industrial and mining enterprises amplifying telephone communication system, a VoIP amplifying telephone communication system based on simplified MGCP is proposed and realized. DSP, CPLD and network interface circuit are adopted to design the terminal, MGC and TMG of the system. Based on analysis of the MGCP protocol, a DSP-based simplified...
The evaluation of network security is a hot issue in present research of network security. After acquiring each host's confidentiality, integrity and availability evaluation index by attacking the network, we can directly evaluate the network security. But, for the network with Read-Write management privilege setting to the root directory, it is necessary to execute the state transition of the security...
To resolve the training problem of high dimension BP neural network with limited small samples, this paper puts forward the concept of loosely and tightly grouping-cascaded BP network model, the definition of equivalence with BP neural network, and relative theorem. On the base of constructing the grouping-cascaded model which is proved equivalent to BP network, the required training sample numbers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.