Search all articles

+ Advanced search
Search articles within:
186164 articles
Proceedings Article

The Study on Automatic Control Method of Power System Stability

Dongling Peng
In order to control system transient stability and improve TSCOPF’s computational efficiency, the paper, based on analyzing the existing problem of multiple faults’ transient stability constrained optimal power flow trace sensitivity, introduces strict judgment of transient stability in TSCOPF model...
Proceedings Article

Discussion on Fuzzy Logic Operation of Impedance Control for Upper Limb Rehabilitation Robot

Yan Zhai, Xiaobo Guo
For the influence caused by illness condition of suffered limb on system stability when robot makes rehabilitation training on assisted suffered limb, on the basis of the traditional impedance control method, this paper puts forward one kind of impedance control method based on fuzzy neural network....
Proceedings Article

Simulation and application of transformer with multi-magnetic circuits in the ship-breaker’s verifying equipment

Zongliang Wang, Junzhong Sun, Zhanlu Yang
According to the working characteristic of the transformer with multi-magnetic circuits, a simulation model of the transformer with multi-magnetic circuits is established , by using of simulation model and SD-3 type monitor in the ship-breaker’s verifying equipment, close making angle can be selected...
Proceedings Article

Research on streaming media adaptive transmission control strategy

Yunxiang Zhang, Yunpeng He, Chuanhui Li, Jinxia Huang
This paper first introduces the basic principle of the streaming media adaptive transmission, explains the flow of two inseparable part media adaptive transmission technique in adaptive coding: streaming media and streaming media adaptive transmission control strategy, and analyzes the current several...
Proceedings Article

The Population Predicting Based on the Curve Fitting Least Square Method

Lili He, Zhao Jin
In various scientific experiments, experimenter always get some discrete data, to estimate the function with the original rules from these data, interpolation is a method for dealing with this kind of problem.But when the discrete data is too much,it can be caused serious distortion which is called Runge...
Proceedings Article

The virtual harvesting prototype design of Long-roots herbal and the motion simulation of key components

Jin Xia Huang, Yong Hong Yu, Yi Yuan Ge, Yun Xiang Zhang
Design process of long roots Chinese herbal medicine harvester is analyzed,3D solid modeling based on Pro/E for the herbal medicine harvester is made.Virtual assembly for harvest using Pro/E assembly module,also with movement simulation and analysis for it’s key components is made in this paper. All...
Proceedings Article

Coal Conveying Fault Diagnosis Design of Coal mining machine Based On Software Control

Jingyuan Gao
The coal conveying system is the most important composition unit of continuous mining machine, the performance of coal conveying system plays a decisive role in production efficiency, this equipment is easy to cause the fault, in this paper, the faults often appeared in this equipment and the fault reasons...
Proceedings Article

Apriori Algorithm Optimization Study Based on MapReduce

Chunqing Li
To solve the deficiency of algorithm distributed association rules based on MapReduce, this paper introduces global pruning strategy to increase algorithm efficiency, adopts frequent matrix storage to reduce the consumption of internal storage, and puts forward MFMDAP of frequent matrix storage of MapReduce...
Proceedings Article

Effects of Flow Parameters on the Stability of Conical Liquid Sheets

Qingfei Fu, Minglong Du
Linear instability theory can evaluate the beginnings of instability in a liquid sheet. It provides a good starting point for predicting unstable, wave-type behavior in a liquid sheet with disturbances. An existing linear instability analysis method was used to investigate the breakup of a conical sheet...
Proceedings Article

Theoretical and Experimental Study of the Air Flapper Valve Used for the Pulse Combustor

Zhiren Yin, Lijun Yang
The basic process of air flapper valve was analyzed and the mass flow rate model of air flapper valve was established. The loss of flow through the air valve was considered. The opening process of the flapper was modeled with a non-viscous model, and the closing process was modeled with a viscous one....
Proceedings Article

A Circuit Design of High-precision Channel Equalizer for WSN-OFDM System

Xiao Qu, Jincheng Xi, Xinning Liu, Jun Yang
Channel equalizer is a key component of WSN-OFDM (Wireless Sensor Networks Orthogonal Frequency Division Multiplexing) system. Traditional equalizer is mostly designed with LS algorithm, which comes with low precision in channel estimation. The previous LMMSE algorithm could reach a high accuracy, but...
Proceedings Article

Study on Trust Model of Internetware System

Tao He, Yong Wei, Huazhong Li, Lina Fang, Shouxiang Xu, Defen Zhang, Junqiang Liu
We take the overall architecture of internetware on-line evolution model as basic, and study on trust metric model of the software in internetware system. In view of the not accurate results from the rough and existing trust metric model granularity, this paper proposed a multi service and hierarchical...
Proceedings Article

Simulation Analysis on Determination Technology of Catalytic Discoloring Spectrophotometry of Photometric of Trace Selenium in Marine Organisms by Catalytic Discoloring

Weiran Tao
As the improvement of people's living standard, the content of trace elements in food more and more attract the attention from people. In this paper, I integrate all the analysis situation from Catalytic Kinetic Spectrophotometry to trace elements in the food over the past ten years. Through the NH3-NH4Cl,...
Proceedings Article

Properties and Thermal Decomposition of SBS Flame Retarded with Phosphorus- and Nitrogen- Containing Flame Retardants

Yiren Huang, Zhengzhou Wang
Flame retardant and mechanical properties of ammonium polyphosphate (APP), melamine phosphate (MP) and their combination with dipentaerythritol (DPER) in styrene-butadiene-styrene rubber (SBS) were studied. The results indicate that MP is more effective in raising limiting oxygen index (LOI) in SBS than...
Proceedings Article

Construction of evaluation system based on Collaborative Innovation Perspective on the function national of high-tech zones

Wei Wang, Shan Xiong, Yong Zhang
Dynamic reasonable and objective evaluation for the development status of high-tech zone will grasp the development trend of high-tech zone accurately and have a very positive effect on promoting adjustment policies. Through the use of AHP, building a high-tech zone evaluation system from the perspective...
Proceedings Article

Multi-Attribute Three-Stage Procurement Model for Equipment Vendor Selection Decisions

Shao-gan Shu, Xiao-song LI
Equipment procurement had the characteristics of long life cycle, high cost and high technical requirements and the budget may change. So the problem of how to select equipment vendors under the condition comes on. To improve the efficiency and reducing risk, a model of equipment vendor selections under...
Proceedings Article

Construction of Evaluation Index System of supply logistics collaboration based on Supply-Hub

Jun Zou
At present, theoretical studies on collaboration evaluation of supply logistics based on Supply-Chain were very few, while almost no researches were on its index system. The paper took supply logistics system based on Supply-Hub as research object, built up a framework of performance evaluation system,...
Proceedings Article

Design method of campus network structure robustness

Lin Zhu
the traditional design of campus network adopts BP neural network to build the model for evaluating network information of network model, since the information exchange reflected in campus network is between individual and individual, randomness and model property factors of network information are prominent,...
Proceedings Article

Optimization for massive data query method in database

Xiao dong Xie, Jinping Zou, Xi Huang
The massive data query methods in database is studied to improve accuracy of query. In the process of data querying in the database, once the data volume is overflow and thetype of data becomes complex, the query requires a lot of restrictions, resulting in time-consuming and low query accuracy rate...
Proceedings Article

Simulation analysis on evaluation model for the rationality of college budget expenditure performance

Hongwang Li
During rationality evaluation process for college budget expenditure performance, when traditional algorithm is adopted to evaluate, the accuracy and practicability of expenditure cannot be considered at the same time, thus, assessment results have poor accuracy. For this, a rationality evaluation method...
Proceedings Article

Research on data mining methods of potential risk for large cloud computing network

Chen Wang
During the study process of mining methods for data of potential risk in large cloud computing network, when mining data of risk with traditional methods, principal element features and context features of data have significant fluctuations, which results in inaccurate data mining results. For this,...
Proceedings Article

SAW Sensor Technology and Its implementation and application in Electric Power Temperature Measurement

Weihai Song, Jie Tong, Dongfang Wang
This article firstly has an overview of Surface acoustic wave (SAW) sensor technology, including its history, principle, compare of resonate type and delay-line type. SAW technology is also compared with other temperature sensor technologies. To meet the temperature detecting requirement, we have developed...
Proceedings Article

Analysis of Building Energy Efficiency and Wall Heat Preservation

Zhaoxia Han
Rapid development of economy speeds up the pace of China's urbanization. The gradual increasing of structures increases energy consumption. In order to adapt to the development of our country's economic society, the attention to environment protection is strengthened in our country. The energy consumption...
Proceedings Article

Design and Research on Examination Performance Assessment System for College Student Course

Shuwen Chen
In the process of designing college student course examination performance assessment system, with the current algorithm to design examination performance assessment system, only based on the theoretical view to assess the quality of qualitative course examination scores, results in the passive situation...
Proceedings Article

Mobile terminal 3D image reconstruction program development based on Android

Qinhua Lin
During the study process of mobile terminal three-dimensional reconstruction program development based on Android, due to the adoption of the current algorithm for 3D image reconstruction program development, the definition of established model is low, leading to the problem of poor fidelity for 3D image...
Proceedings Article

Implementation of UCDOS Font Interface Based on QT

Jian Huang, Qian Zhao, GuoMing Li
After analyzing the interface work principle of the lattice font supported by QT and UCDOS font feature,It is found that the open source QT is lack of the lattice font more than 16*16 size. For this shortcoming, the UCDOS font is combined with the QT seamlessly. Thus, the QT can use any font in the UCDOS...
Proceedings Article

Electricity communication transmission network risk calculation model design and management system achievement

Hailong Xiao, Chunyu Liu, Yongsheng Zhang
Electricity communication transmission network is the key support network of the power grid. Its security has direct significance to the stable operation of the power system. The article brings out a re-definition of risk. According to the threat of natural disasters, equipment and human resources in...
Proceedings Article

The motion simulation of three-DOF parallel manipulator based on VBAI and MATLAB

Zhuo Zhen, Chaoying Liu, Xueling Song
In order to truly reflect the object situation of catch and place of the three-DOF parallel manipulator based on machine vision, and on the basis of the modeling of the trajectory and mechanical structure, this paper mainly focuses on the analysis on the manipulator system by using the co-simulation...
Proceedings Article

The Electric Power Communication Transmission Network Risk Assessment Index System Research Based on AHP

Chunyu Liu, Jinyu Luo, Yongsheng Zhang, Jie Zhang
By studying the SDH equipment of EPCTN, and the principles and methods of building the index system, combining with the actual situation of electric power communication operation, this paper establishes the index system of EPCTN risk assessment which includes target layer, rule layer, and index layer....
Proceedings Article

2-D DOA Estimation for Acoustic Vector Sensor Array Based on Greedy Block Coordinate Descent Algorithm

Jie Hu, Wei Li, Shaojun Zuo
This paper presents an approach for the estimation of two-directional (2D)direction-of-arrival (DOA) using Acoustic Vector Sensor array based on greedy block coordinate descent(GBCD) algorithm, which can achieve faster convergence rate and better estimation accuracy. Moreover, a weighted form of block...
Proceedings Article

Structure Analysis of Transmitter Coil in Electromagnetic Launch Interceptors

Liangming Zhu, Yanjie Cao, Weibo Li
This paper introduces the composition and working principle of, electromagnetic emission interceptors, establishes the three-dimensional model of transmitter coil, analyzes magnetic - structure coupling of the transmitter coil, gives the transmitter coil magnetic field and stress field distribution and...
Proceedings Article

A Novel Personalized Recommendation Method in E-business Based on Kansei Image

Guangqian Zhang, Enshui Yu
Personalized recommendation technique is an important technology to solve information overloaded in e-commerce. But recently new commodities are emerging constantly, so it is required to recommend commodities that consumers aren’t familiar with but interested in. Consequently our study proposes a method...
Proceedings Article

A Generalized Weighted Closed Sequential Pattern Mining Algorithm with Item Interval

Haitao Lu, Shuo Li
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database; it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which...
Proceedings Article

Relations between the solutions to matrix equations AXA=B and CYC=D

Jing Wang
In this paper, we present some results on the relations between the solutions to matrix equations AXA=B and CYC=D, where B and D are Hermitian matrices.
Proceedings Article

A CM-based model for 802.11 networks security policies enforcement

Karl Mabiala Dondia, Jing Ma, Feng Tao
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is due to the “plug-and-play” nature of the technology and the mobility. The lack of physical containment due to the...
Proceedings Article

Solutions for a coupled system of nonlinear fractional differential equations with integral boundary conditions

Yunhong Li
In this paper, we investigate a coupled system with integral boundary conditions of nonlinear fractional differential equations. Using Leggett-Williams theorem, the existence of solutions is obtained. An example is given to illustrate our result.
Proceedings Article

Discovery Algorithm for Network Topology Based on SNMP

Yun-ting Zhou, Mao-lin Deng, Feng-zhu Ji, Xiao-gang He, Qi-jie Tang
Since computer network has become the basis of the information society, network topology has also become an important part of network management. The theory foundation of the network topology algorithm based on SNMP has been introduced in this paper, and the algorithms of network topology discovery based...
Proceedings Article

Network Security Situation Assessment Based on FAHP

Feng-zhu Ji, Yun-ting Zhou, Qi-jie Tang, Fang-xiang Hu, Shao-feng Ma
In order to solve the problem of methodology subjectivity, long modeling time and low classification accuracy in the information security risk assessment, a network security situation assessment model based on FAHP has been proposed in this paper. Via building a network security index system, using the...
Proceedings Article

A Label Extended Semi-supervised Learning Method for Drug-target Interaction Prediction

Jie Zhao, Zhi Cao
Computational methods for predicting the new drug-target interactions are more efficient that those experimental methods. Many machine learning based methods have been proposed but most of them suffer from false negative problem. In this paper we extend the original label matrix and adopt weighted lose...
Proceedings Article

Cluster lag synchronization of complex networks with nonidentical dynamical nodes via Adaptive control

Shuguo Wang, Haitao Cao
In this paper, synchronization analysis is investigated for an complex networks with time delay. It is assumed the nodes in the network to be nonidentical. In order to achieve cluster synchronization, this paper uses an adaptive controller on each node, by utilizing the Lyapunov stability theory, a new...
Proceedings Article

Assessment and prediction system of sustainable development

Yixuan Han
In this paper, an effective model is constructed to discuss the sustainability of a country. We define Coordination Coefficient (CC) to measure the sustainability of a country or a policy and use the value of CC to define how and when a country is sustainable or unsustainable. To consider all the possible...
Proceedings Article

A fast SPIHT algorithm based on the end scan threshold

Changhua Liu, Xiaole Xu
A fast set partitioning in hierarchical tree (SPIHT) algorithm based on the end scan threshold is proposed in this paper. Because the coding process of the SPIHT needs repeat scanning and sorting, so it takes a lot of extra time and storage space. In order to save the time and space overhead, the end...
Proceedings Article

A Palmprint Recognition Method Based on Gabor Wavelet and Local Direction Pattern

Mianshui Yu, Xiaomeng Xie
Palmprint recognition is an emerging biometric technology that identifies a person based on the hand image. In this paper, a novel palmprint identification method based on Gabor wavelets and Local Direction Pattern (LDP) techniques has been proposed. The Gabor response images at different scales and...
Proceedings Article

Study on the Impact of Big Data on Radio and Television Ratings

Jianping Chai, Xingyi Pan, Fulian Yin, Juanfang Chai
For problems, such as the low accuracy and easily polluted data of the traditional sampling ratings index calculation method, we conduct research on the ratings of big data. Firstly, we argue the effect of the amount of data on the accuracy of the ratings, and do experiments using real data. By sampling...
Proceedings Article

The Study On A Decision Tree Based On The Classification Preference Ratio

Jing Lin
The decision tree is an important data mining method for classification. Granular computing has been applied to the decision tree, then a new decision tree based on the classification preference ratio of attribute is proposed. This decision tree is a hierarchical granularity tree. In information systems,...
Proceedings Article

Research on Small Satellite Formation Scheme for Earth Observation Task

Zheng-yu Zhao, Yuan-wen Cai, Yi-bin Zhao, Yan Li
The demand of earth observation data is increasing currently and the demand of observation data accuracy, real-time, and continuity is improving continually. Aiming at this problem, the small satellite formation scheme for earth observation task is researched. The significance of the small satellite...
Proceedings Article

The Method of Multi-attribute Target Recognition Based On Laser Detection

Jian-biao Chen, Hua-yan Sun, Yong-hui Zheng
Ideal result of target recognition can’t be obtained just with single attribute. In order to improve the performance of target recognition and reflect the physical attributes of the target, some attributes are extracted from the high range resolution profile of the unknown target to form an multi-attribute...
Proceedings Article

Smooth Test for Multivariate Normality

Yan Su, Ya-Ping Huang
Based on the smooth test for uniformity on the surface of a unit sphere , a new test for multivariate normality is presented. The test statistic does not depend on the parameters in the multivariate normal distribution. We obtain the asymptotic null distribution of the test statistic. The test procedure...
Proceedings Article

A Fusion Method of Rocket Launchers’ Testing Information Based on the Improved D-S Evidence Theory

Yi-bin Zhao, Zheng-yu Zhao, Xiao-chen Xing, Guo-feng Xu
In order to make more effective decision level analysis on the testing information of rocket launchers, this paper analyzes the existing disadvantages of evidence theory, draws into the concept of weight coefficient integrated with existing improved method, proposes new improvement of the combination...
Proceedings Article

The CFD Numerical Simulation of H-Boat

Weimin Yang, Yanna Zhang, Shujiang Li, Caixia Shi
Using commercial software CFD (Computational Fluid Dynamics) analysis of fluid to simulate the H-Boat. Based on the numerical methods, use the VOF (volume of fluid) method to simulate the free surface, and use RNG (Renormalization-group) model to close RANS (Reynolds Average Navier-Stokes) equations...