The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future distribution networks in Australia are likely to include large volume of medium scale concentrated solar power (CSP) plants. Like other renewable resources such as photovoltaic (PV) and wind, CSP has a variable output. To plan the power system's reserves with variable generator like CSP, it is important to study the long term energy yield in detail. Moreover, the long term energy yield is the...
The arm parallelogram mechanism i s a significant component of the hybrid palletizing robot. Its size not only affects the work efficiency and kinematic accuracy of the robot, but also determines the size of the robot's workspace. In this paper the mathematical model of the arm mechanism is proposed to analysis the proportional relationship between the robot's workspace and the inputs. Based on the...
Ghost imaging has attracted a lot of attention since it was first demonstrated. However, the image contrasts of ghost imaging are usually unsatisfying and have became a main obstacle in ghost imaging application. In this article, the contrast of ghost image of a single-slit transmission mask using linearly polarized light is analyzed. The theoretical analysis and simulation demonstrated that the contrast...
Scrum has become the most popular agile methodology in recent years. It focuses on management and organization of software project, and doesn't provide descriptions about how everything is to be done on a project. This paper presents an approach of combining the Scrum methodology with the UML modeling methods, in which UML modeling technologies are mapped onto the scrum practices. This approach follows...
Accurately obtaining readers' satisfaction is great significant to improve the service level of library, on the basis of the United States Libqual+TM evaluation system, we design the readers' satisfaction survey of one university library in Yunnan. then we divide the research data into two parts, one part used for exploratory factor analysis, extract the factor of the library readers' satisfaction...
Increased concern about global warming coupled with the escalating demand of energy has driven the conventional power system to be more reliable one by integrating Renewable Energies (RE) in to grid. Over the recent years, integration of solar PV forming a grid-connected PV is considered as one of the most promising technologies to the developed countries like Australia to meet the growing demand...
The traditional workflow access control strategy has often found to be inadequate to detect and restrain malicious behavior effectively. With the aim to solve this problem, this paper presents a new workflow access control model based on trust, and a new access control strategy with an authorization process. This strategy introduces user behavior evaluation, trust computation and role hierarchy into...
Knowledge can be understood as the specification of classifications and causes, kinds and causes usually are fuzzy. Fuzzy Cognitive Maps has been applied in different areas to express the dynamic behavior of a set of related concepts. Its graphical structure allows systematic causal propagation forward and backward chaining. In the same way, nowadays individuals use a lot of different technological...
With the fast emergence of Software-Defined Networking (SDN) and Cloud SIP Fire Wall (SFW), new solution is possible to defend SIP DoS attacks in IMS core network, which is impossible in traditional telecomm network through traditional SFW. In this paper, we first analyze the security threats of SIP DoS attacks in the telecomm network. And then based on the analysis, we construct the SIP DoS attack...
The central pattern generator(CPG) is used to control robot very well. But the adjustment of CPG parameters and it's interaction with the external inputs are still open problems. Based on biological knowledge, the central nervous system rules the switch of the CPG modes. In this paper we focus on the coupling relationship between the cerebral cortex and the CPG and establish the mathematical model...
The complex network theory is applied to manufacturing, manufacturing of complex networks have been proposed fault model construction methods. According to the four different manufacturing network, based on the performance of a large number of experimental data of successive failure model is analyzed.
SEM is a burgeoning multivariate data analysis method. ARMA is one of the most widely used model about time series data. This paper compare the mathematical model about the SEM and ARMA model, and find they are similar. So we can process ARMA model with SEM.
The purpose of this study is to explore educational methods for conceptual modeling for novices. In this research, the subjects are high school students and freshmen in university enrolled in various programs. Typical errors in class diagrams made by these types of novice learners are not easily detected. Therefore, we collected and analyzed some common errors, then developed appropriate teaching...
Information value model is a widely used landslide susceptibility assessment method. However, it neglects the weights of different factors. This paper proposes the weighted information value model based on AHP. The impact of seismic intensity (SC), land-use types (LUT), lithology types(LT), fault density (FD), terrain (T) and rainfall(R) on landslide in the 512 Wenchuan earthquake-hit 10 degree region...
Cooperative Vehicle Infrastructure System is an important research area of ITS. Evaluation of CVIS aims to evaluate the technical feasibility, economic benefit and the social effects of CVIS. This paper puts forward a comprehensive evaluation method based on Analytic Hierarchy Process (AHP) and Grey Relational Analysis Process (GRAP). It selects parameters which can reflect the performance of traffic...
Piezoelectric stack with its large output force and small displacement, which cannot satisfy the requirement of the opening of the cone valve core of the actual situation. A piezoelectric hydraulic principle of the hydraulic actuators based on displacement amplification was put forward, the output displacement and piezoelectric stack driving volt length, area and enlarge the structure dimension parameters...
This paper derives an approximate sampled-data model for nonlinear systems using a first-order hold (FOH), and analyzes the sampling zero dynamics of the sampled-data model to show a condition which assures the stability of the sampling zero dynamics of the model. It is also further extension from a zero-order hold (ZOH) to a first-order hold (FOH).
Coverage control is one of the fundamental problems in WSN (wireless sensor network) and determines the ability to monitor the entire WSN system. Based on the Voronoi diagram and the CVT (Centralized Voronoi Tessellation) theory, and combined with the Lloyd's algorithm, we propose a dynamic covering algorithm of WSN to achieve a dynamic coverage among different areas by adjusting the geometric boundaries...
Building on our previous work, we examine the effect of role specialisation on a society using a scenario from the area of comparative economics. In connection with this our central contribution is the use of Interval Type-2 Fuzzy Sets to model emerging normative understanding, which is represented using the concept of Dynamic Deon tics. This integrated mechanism, along with a supporting visualisation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.