The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the Organizing Committee, I would like to welcome all of you to ICCASM 2010. This is a conference Co-organized by North University of China, Institute for Electrical and Electronic Engineers in U.S.A.(IEEE), and International Association of Computer Science and Information Technology (IACSIT), co-sponsored and supported Shanxi University, Taiyuan University of Technology, Taiyuan University...
For topology optimization of a structure with tension-only material, the effects of the Poisson's ratio of material on the final structural topologies are investigated. To simulate the topology optimization of a structure with tension-only material, the material-replacement method is presented. In the method the original tension-only material is replaced with a new isotropic material with the same...
In recent years, the microfabrication has grown rapidly, and one of the key technique and important basis is pariticle trapping and manipulation. Now, it develops mostly on light, electricity and plasma to make it. The text raises a fire-new concept of “water tweezers”: when fistulous micro water-jet acts on the face of pariticle, the block of viscosity that causes a change of flow velocity and pressure...
Research is held on risk management methods of software organization and the whole risk management process from the risk identification, the risk estimate and the risk response to the risk control of software projects. In terms of theory, a suit of risk management method system of software projects are put forwarded, which combines project management theory with the feature of software itself; in...
To meet the requirement of real-time vehicle navigation, a new path planning algorithm based on partitioned urban transportation network is proposed in this paper. The foundation of the algorithm is that an actual road network has its particular spatial distribution features, and GIS has strong visual editing functions for transportation network. According to the size of the transportation network,...
In this paper, a full review of prediction models of financial crisis has been provided. The differences, advantages and defects of prediction models established by foreign and domestic researchers are compared on the base of four aspects such as the definition of financial crisis, the choice of samples, the choice of variables and computation methods. These four aspects are key points to build prediction...
This system is designed with loss seeding electronic monitoring and reseeding equipment as for various loss seeding problems of mechanical precision machines. The system can realize the precise reseeding by means of electronic feedback. Tests show success rate exceeds 90%, total planting rate exceeds 99%, and the planting distance qualified index reaches 95%, so the system realizes precise reseeding...
A new algorithm for the problem of tracking multiple maneuvering targets in the presence of clutter is proposed, through extending the IMM/Mscan-JPDA filtering algorithm, to the fixed-lag smoothing case. A suboptimal fixed-lag smoothing algorithm is developed by applying the IMM and the multiscan JPDA approaches to a state augmented system. The proposed algorithm is illustrated via a simulation example...
In modular production networks, the members always attempt to acquire knowledge and capacity from their partners. Meanwhile, they try to prevent their partners do like this. That is, opportunism is unavoidable in modular production network. The most obvious opportunism behavior in modular production network is associated with asset specialty. Among them, Hold-up problem is the most typical case. According...
Virtual humans or avatars are three-dimensional (3D) solid models, generated by computers. They are realistic and vivid forms having motion control capabilities. Human communication consists of more than words, and virtual human body movements are also a kind of communication way. In this paper, we propose a method of costume designing and animation synthesis for personalized avatars. A lot of sensors...
A CFD study of the flow through vibrating screens has been conducted with moving body method of PHOENICS. The flow fields around the static and vibrating screens were calculated with laminar and turbulence models respectively, and the pressure-drop coefficients for both states were obtained. It was found that the flow field became very complex and vortex and backflow were produced because of the motion...
In order to improve the detection accuracy of ultrasonic echo signals and ensure the useful signal could be absorbed, we study the Ultrasonic signal processing circuit. By comparing the limit, amplification, filtering and variable gain amplifier in order to choose the best option. The scheme we choose is through changing voltage to save all the low part to get more information, different from the...
Depending on the current fast-growing Web virtual reality technology, a Web three-dimensional virtual geographic laboratory based on real geographic laboratory is created by VRML. Interaction between the user and the scene is achieved through the integrated use of ASP and JavaScript technologies. Students can access anytime and anywhere to the virtual environment to interact with objects in the three-dimensional...
The applications on the basis of SOA proliferate rapidly in a wide range of computer science and are becoming increasingly important as a hot spot of current IT research field. Service composition is one of the remarkable paradigms of SOA for reusing of resources and sharing of information. Since the models of current service composition are mostly application oriented but not the end-user oriented,...
Based on the knowledge rule models and the analysis mathematical models, the two-level real-time expert control system (ECS) was established. With the self-learning ability in expert optimal mode, the expert system (ES) was developed to find the calcining zone's optimal temperature value. To optimize the process, the real-time control system (RTCS) was designed to realize the control of the feeding...
Clustering is an energy efficient method for wireless sensor network monitoring. Existed algorithms are mostly location-based, where physical temporal-spatial correlations are considered, leading to a poor data compression rate. This paper proposes a novel data correlation based clustering approach. A greedy algorithm, minimum degree first clustering algorithm, is introduced to cluster the sensor...
Profibus, CAN bus are two kinds of industrial field bus, which account for 30% in the field of industrial control. At present fieldbus conversion products in the market only achieves the conversion between RS232 and RS485, which can no longer meet the needs of users. However, by comparing the OSI reference model Profibus, CAN communication model structure are found to be streamlined by the OSI model,...
For the three-phase pulse-width modulated (PWM) rectifiers, the controller's performance can be influenced by the mathematic model error, parameter variation and external disturbances, etc. This paper presents a robust H∞ control method for the PWM rectifiers to improve the control performance. The outer voltage loop controller and the inner current loop controller are designed separately. Based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.