The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the Organizing Committee, I would like to welcome all of you to ICCASM 2010. This is a conference Co-organized by North University of China, Institute for Electrical and Electronic Engineers in U.S.A.(IEEE), and International Association of Computer Science and Information Technology (IACSIT), co-sponsored and supported Shanxi University, Taiyuan University of Technology, Taiyuan University...
A intelligent control model structure of double-level-three-stage is presented to deal with the moving robot detecting and tracking system. According to basic ideas of imitation of human intelligence control, it includes Decision-making level and Execution level, each level is decomposed into 3 stages. In the process of tracking, the moving objects state forecast and two-step increment tracking algorithm...
Unified theory of least squares was given by Rao (197l, 1972, 1973) and Rao and Mitra (197l). In the generalized inverse (g-inverse) matrix (R + XGX')− involved in unified theory of least squares, G is any symmetric matrix. We give the properties with matrix quadratic form of non-symmetric matrix, and extend symmetric matrix G to an arbitrary square matrix. i.e. G is not necessarily symmetric only...
Aim To research the application of Petri net's theoretical method in the concurrent asynchronous communications control, find out the detect arithmetic of system's deadlock, and analyze the system's liveness. Methods A detect method of deadlock for information net based Petri net is proposed in this paper. The main method is as follows: After standardize the information systems and extract its mathematical...
The prevention and cure of deadlock of command information system for united combat of multi-troops is the fundamental problem to ensure the safety and the reliability of system, it is also one of difficult problems to be solved. The paper puts up a kind of formal method which describes the command information system—Petri net model, giving an example of setting up intelligent running models of planning...
A kind of electronic lock which is used for starting weapon has been widely paid attention to, it involves many aspects of difficult problems such as communication, command automation and the analysis of workflow for weapon starting. In this paper, a kind of method for design and analysis of electronic lock workflow for weapon starting based timed Petri net is put up, the timed Petri net model of...
The increase of P2P applications in campus networks has caused excessive consumption of bandwidth and network congestion, which reduces performance. This thesis uses the campus network as a background for research. It first analyzes the effect of P2P applications on the campus network. Next, it tries to resolve some of the present difficulties in P2P traffic identification by bringing forward a method...
An Oilfield Completion depth error calculation method based on DTW is put forward in this paper. According to the position of oil reservoir is not change in the stratum, and two Natural Gamma Curves which are from Open Hole Logging and Cased Hole Logging, are similar to each other, Activity Analysis is used to recognize the oil layer interface, DTW algorithm is used to compare the similarity between...
In this paper, the problem of observer-based robust fault detection is studied for T-S fuzzy systems. A T-S model described fuzzy observer is considered as a fault detection filter to generate residual. The problem of fault detection is formulated into a model-matching problem so that the influence of uncertainty and disturbance is minimized to increase the robustness of residual to unknown inputs,...
In order to improve the calculation accuracy of structural system failure probability, RBF neural networks which is based on the failure probability data calculated accurately can simulate into the four-dimensional space neural network of a single output neuron and three input neurons because system failure probability is related to reliability index, failure mode number and the correlation coefficient...
Finite element modeling of hyperstatic inclined truss structure is established by using Ansys software, and then the load coefficient can be obtained by finite element analysis. Base on the incremental load method, valid strength, incremental load and incremental load ratio can be acquired. Applying the norm of minimum incremental load and the branch-bound criterion of the stage critical strength,...
Remote sensing image as a digital product, one of its important significance lies in quickly extracting information and applying the information to practice. However, in the process of extracting information, one of the basic problems is to conduct feature extraction. In this paper, the point and line features of remote sensing image are extracted, and the comparison of a variety of feature extraction...
GPS with a global, all-weather, continuous real-time three-dimensional navigation and positioning capabilities, has a broad application value and development potential. GPS receiver with C / A code has advantage of cheap, small, easy to carry, from the results of position by C / A code GPS receiver outputting, researching the C / A code GPS receiver static positioning accuracy, has important practical...
The design of automatic test system based on VC++ implemented the communications between the spectrum analyzer and PC. USB-GPIB Interface board is used, USB with its unique advantages of strong anti-interference?high speed and easy to use make the application of automated test system based on GPIB more extensive and flexible. This paper describes the working principle of the test system and the design...
The determination of weight factor is a complicated and essential issue in the credibility of the comprehensive evaluation of outcome. This paper discusses the effectiveness of weight assignment in comprehensive evaluation through applying three approaches: Weight Treatment, Gradient Treatment, and the combination of both. After evaluating comprehensively the major economic indicators of the nation's...
Information extraction (IE) is a main approach for constructing database from free text corpus and for automatic collecting information. Frame semantic tagging is suggested to be the base for rule-building in IE. IE based on frame semantic tagging uses a uniform approach to guide the process of IE. Processing at a finer granularity level, the approach has a universal appeal for IE in domains showing...
In this paper, a desirable BP neural network is established for function approximation, and three kinds of concrete function is approximated by the network. The better cases for function approximation is presented, and for one-variable polynomial function, a probability characteristic for successful approximation is brought forward, which reflects the relationship between the number of neurons and...
Affected by reservoir regulation, the complicated flow conditions and the traditional discharge monitoring means between Three Gorges and Gezhouba Dam are far cry from meeting demands of flood control, flood reporting and hydrological data processing. On the basis of H-ADCP on-line velocity monitoring data given by the CWRC, this paper extracts index-velocity by using wavelet analyzing techniques,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.