The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The information fusion technology was used for processing plant electrical signals. Weak electrical signals of the plant were tested by a touching test system of self-made double shields with platinum sensors. Tested data of electrical signals were denoised with the wavelet soft threshold. A novel autoregressive integrated moving average (ARIMA) model of weak electric signals of Chrysanthemum coronarium...
By studying the design principles of multi-valued logic and characteristics of adiabatic circuits, a novel design scheme of ternary adiabatic counter was proposed in this paper. Guided by switch-signal theory, the scheme derives the switch-level structures of ternary adiabatic T-operation circuit, and using bootstrapped NMOS to realize energy input and recovery, then the ternary adiabatic counter...
At present, using the computer to imitate the complicated circumstance of Urban rail transit, to study the theory and methods of Urban rail transit operation and control, is really an economical, reliable and safe method. Therefore, from the viewpoint of both academic research and realistic application, building and carrying out the test model of ATO (Automatic Train Operation) System is of strong...
Wireless sensors networks (WSNs) are susceptible because of its characters. The traditional security mechanisms can not be use to protect the WSNs. In the paper, a trusted transport mode based on cluster-merkle-tree for WSNs (TTMCMT) is proposed, which can provide a method of trusted transport with WSNs of great restriction. The object of scheme is to realize secure authentication and secure message...
DCT kernel based finite discrete Gabor expansion (DGE) and discrete Gabor transform (DGT) implemented by filterbanks are presented. An analysis filterbank is designed for the finite DGT and a synthesis filterbank is designed for the finite DGE. The parallel channel in each of the two filterbanks has a unified structure and can apply the fast DCT (discrete cosine transform) algorithm to reduce its...
A colony algorithm is a new kind of simulated evolutionary algorithm, which is widely applied to optimization problems, but it has the limitation like other evolutionary algorithms. To avoid the limitation, an improved ant colony optimization algorithm is introduced to solve the traveling agent problem, which is responsible for planning out an optimal migration strategy when agents migrate to several...
As one of the most useful analysis methods of block theory, stereographic projection is used to reduce the dimensions of the problem from three to two, thus analyzing and solving it with graph tools. However, the circle of the stereographic projection is not so intuitive and is hard to understand. In this paper, combined with computer graphics technology, a new method is proposed to analyze rock mass...
Dose calculation of the brachytherapy source was studied. According to the American Association of Physicists in Medicine (AAPM) TG-43 and TG-43U1 protocols, the dose rate of single 125I and 103Pd sources were calculated. The dose rate of multiple sources was calculated with the linear superposition method. With inclusion of time, the calculation method of absorbed dose was developed. The dose rate...
An SOA-based emergency logistics system based on GPS / GIS is presented for that the emergency logistics system can not meet the requirement of managing public emergency frequently. The intelligent vehicle system based on GPS and monitoring platform is designed for real-time data interaction. Ontology-based emergency logistics repository, emergency logistics framework, early-warning rule base and...
Fast network traffic anomaly detection is an important issue in network security. At present, the Internet environment becomes more and more complex than ever before. The unexpected anomaly occurs constantly, which brings great loss to Internet services. This makes people put forward higher requirements for the speed and real-time of network traffic anomaly detection. How to quickly perceive the traffic...
A comprehensive access control model with the main element of “user-organization-role-permission” was proposed based on the control problem of users in different levels accessing the system. The model improved the nature of role inheritance and constraint in RBAC model, and increased the association between the user and the organization. The constraint imposed by the organization to the users can...
The effect of different modeling design on temperature field of headlamp was studied. Numerical simulation of internal temperature field of headlamp was performed and temperature distributing rules were summarized. On those bases, a fast analytical model of temperature field of headlamp was presented considering flow field around the automobile. Taking one headlamp modeling design for example, numerical...
An image based passive auto-focusing algorithm for the multi-objective situation is proposed. The algorithm is composed of the image sharpness measure and the search strategy. To achieve real time requirements, an effective and efficient image sharpness calculation based on Sobel operator is proposed. And a weighted gradient histogram based threshold selection method is used to reduce the influence...
This paper presents a Bayesian denoising method based on Markov Random Field (MRF) models in wavelet domain in order to improve the image denoising performance and reduce the computational complexity. The computations of the initial mask, optimal mask and shrinkage factor of the wavelet coefficient are the core of this method. To obtain the appropriate initial mask, a simple two-state Gaussian mixture...
ANN is the core of the 2rd and 3rd generation traffic flow forecasting algorithm. In order to master the traffic flow forecasting tendency comprehensively, this paper studied every kind of hybrid artificial neural network forecasting algorithms in detail, including ARIMA ANN model, fuzzy ANN model, GA ANN model, Chaos ANN model, Wavelet Analysis Model, Principal Component Analysis ANN model and Particle...
In this paper, we not only analyze the current characteristics of the urban rail transit affiliated commercial circles based on their operating status, but also propose measures on optimizing operating status of its logistics system, suggesting that the whole commercial circles should be jointed for the establishment of a unified logistics center, in which goods are distributed and recycled through...
With the rapid development of communication and information technology, the medical field is influenced deeply. The telemedical system has been paid attention to widely. In this paper, the telemedical system is constructed. Meanwhile, Expert knowledge management modules is developed to collected the experience of medical experts and practitioners in this system. The workflow is used to rule the medical...
Streamline simulation shows particular advantages over finite-difference simulation. By the advantages of streamline simulation such as its ability to display paths of fluid flow and acceleration factor in simulation, the description of flooding process gets more visibility. The communication between wells and flooding area has been represented appropriately.
The “Internet of Things” infrastructure will be strongly integrated with the environment, and its integration with the enterprise systems will not only further blur the line between business IT systems and the real world. To contribute to the secure development of IOT, the research mainly focuses on the key trust control technologies in IOT, including heterogeneous network model, trust routing, and...
Blue-green algae, widely distributed almost all over the world, is one kind of the most ancient and primitive algae plants. The toxin and smell that blue-green algae releases out endanger human life and health directly, it is of great significance to study the mechanism of algae outbreak. The paper presents a method for the algae simulation based on wireless sensor networks and particle systems theory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.