Tao Liu, Yu Hua, Meifang Wu, Zeng Ting
In this paper, the author makes use of the characteristics of UWB (Ultra Wideband) signals, proposed a new approach to so achieve the time synchronization in distributed wireless communication networks. In order to validate our ideas and evaluate the performance of the algorithm, we built a test platform,...
Jin Wang, Changjiang Jin
The traditional algorithm used for resource scheduling modeling in asymmetric network, is time-consuming, and has bigger error. The cloud computing resource scheduling method based on catfish PSO algorithm is proposed. By adopting the particle encoding method initialize the particle swarm, and through...
Wenbin Wang, Ketang Chen, Liangliang Chen
During action recognition process under the mobile phone visual sensor, in order to ensure the speed of recognition, generally distributing as sloppy feature points, so as to express composite action feature needs to be recognized. However, if the action is composite feature in small area, traditional...
Xiang-gang Wang
The software robustness is affected by many factors, in order to improve the detection accuracy of software robustness, multiple probability analysis of computer control system is introduced, and a software robustness detection model based on probability robustness analysis is put forward. The computer...
Zhaoyu Wu
During the process of defect spot recognition among metal solder joint, if the defect spot is responsible characteristic within small region, the traditional identification method of metal solder joint defect spot is based on sparse representation, unable to express details of characteristics in small...
Gou Ge
The resin is `d for vehicle brake, in order to avoid the safety problems because of the significant temperature rise caused by the resin substance friction effect, the process of friction heating resin substance is made mathematical modeling analysis. Through the strengthen Lagrange algorithm obtain...
Xianrui Jian
For large data environment, the traditional K-means clustering algorithm flaw in the software in real-time fault detection process, we propose a K-means clustering software intelligent real-time fault detection method is improved. The K-means clustering algorithm and particle swarm optimization combined...
Ming-rong Wang, Shu-qing Jiang
Under some special conditions, the quality of the inquired image is low, and the image has blurred characteristic, in order to improve the quality of the blurred image, this paper proposes a blurred image enhancement algorithm based on improved multi-scale Retinex. The shortcomings of the traditional...
Ting Li
Accurate classification of massive data in the field of electronic commerce, can service consumers to the greatest degree. The variety and quantity of goods fast growth make a large number of useful products information would be submerged in massive data. The traditional electronic commerce data classification...
Ying-quan Wang
Architecture design with the use of three-dimensional virtual modeling technology has become the main trend of the architecture field. To this end, a 3D virtual modeling architecture design method based on the model of multilevel texture mapping is proposed. Combining the relevant principles of multilevel...
Hong-bo Zhao, Wei-hua Yao
The traditional method of judging standard degree of martial arts movement uses fixed constraint model, it is difficult to describe the dynamic and small area change. The method of judging standard degree of martial arts movement based on computer vision is put forward, computer vision is utilized to...
Wei guo Hu
Because it cannot obtain enough information, the traditional virtual 3D image simulation method in art design direction, can only be based on the simple, upward, rotation rough information to complete simulation of three-dimensional images of the art design, the effect is not good. This paper presents...
Zhihua Zhang
In large joint network, traditional methods cannot accurately determine the source of virus, leading to data classification of virus feature extraction model in joint network with a low convergence efficiency. A kind of virus feature extraction model for large joint network based on unconstrained clustering...
Zhongyi Hu
During the study of DNA image recognition at the beginning of infected styphnolobium japonicum, the features of DNA profile are arbitrary. Both characteristic angle and direction change are disorderedly distributed. This study presents a new method to examine the features of early DNA profile based on...
Bin Miao
This paper presents a face recognition system design based on computer vision and the specific realization method, including the hardware structure, face recognition specific algorithm, drive, and software design and implementation of the application. The system uses ARM9 chip as the core, the built-in...
Ming Li, JianYun Li
The system design of enterprise performance evaluation is researched, traditionally, there is no effective business enterprise performance management mathematical model, the quantitative venture evaluation of enterprise performance is difficult, and the science and quantitative analysis of enterprise...
Ming Li, JianYun Li
In the coastal areas, the logistics industry and sales industry have taken a great development, and development is very rapid, it is necessary to research the relationship between logistics status and product sales model of coastal areas, and it has an important value in practice. The logistics supply...
Baojin Meng
In the research of the transformation method of numerically-controlled machine tool (NC machine), due to the current methods exist the problem of that for solving process is complex and the optimization process is easy to fall into local optimal solution, a transformation method of NC machine based on...
Baojin Meng
The temperature variation have a larger effect on metal material condensation crispness properties, its impact is nonlinear, and the method for measuring the effect of temperature variation on metal material condensation crispness based on least square method is raised. The ultrasonic technology is utilized...
Li-yan Zhang, Xin-yan Rong
The cost of enterprise employees turnover has big impact on the enterprise economic growth, so the relationship of enterprise employee turnover and the enterprise economic is researched, and the risk warning assessment of employee turnover is realized. At present, the mathematical model of enterprise...
Xin-yan Rong, Zeng-xin Li, Li-yan Zhang
As the complexity of the task of large mechanical work continues to increase, during the assembly scheduling process between each sub task, direct optimal standard of local scheduling have conflicts, contradiction of different sub task direct scheduling process is becoming more and more prominent. When...
LiXin Wang, Wei Jing Wang
The reasonable scheduling of tasks can maximize the conservation of resources, improve the utilization rate of work resources. The current task scheduling regards task conflict have already occurred as the prerequisite, and passive coping strategy is adopted, the model is built based on the prerequisite...
Bo Cheng
Aiming at the promotion of logistics transportation in the stacking sale goods evacuation, it has been to lack of complete and effective theoretical analysis of this issue. By analyzing the changes of logistics data, the massive stacking sales of goods are taken as the foundation, to carry on the analysis...
Baichuan Cai, Rongfang Mei, Wenjuan Wang, Bo Yang, Yi Zhang
The traditional 3D motion real-time image reconstruction technology, without considering the missing reconstruction feature points brought by wrong estimation for the shape based parameter in the algorithm, effects the authenticity and definition of 3D motion real-time image reconstruction. To this end,...
Rongfang Mei, Baichuan Cai, Jianguo Mei
In the design of LTE system, the multi input and multi output (MIMO) platform is taken as the basic configuration, high speed data transmission business is realized, due to multipath channel reorganization produced spatial focusing, intersymbol interference leads to channel imbalance, in order to improve...
Nanyou Lu
The effective engineering data survey algorithm is an important basis for engineering construction surveying, design, construction and management. In order to improve the survey accuracy of engineering data, the sensor survey method is researched, and the fusion detection and survey of engineering data...
Wei Liu
Effective guidance on data flow in large multimedia teaching system, can service student to the greatest degree. With the growth of covered data of multimedia teaching system, a lot of useful teaching information will be drown in the deluge of information in multimedia teaching. Using the traditional...
Haifeng Yue
Psychological factor is essential for athletes. This paper proposes a model for the effects of psychological tension on athletes’ performance. In this paper, the principal component analysis method is used to quantify the psychological factors of athletes. The paper through the analysis of positive and...
Yi-rong Li, Hanying Hu
A new method of orthogonal poly-phase code design is proposed to improve signal orthogonality and Doppler tolerance for MIMO radar system. First, eight-phase code which has a better compromise of freedom and processing complexity is generated by Walsh matrix. Initial code sequences are chosen from the...
Kang Li, Dong Liu
This paper drawing idea of the Semantic Web and ontology technology advantages, semantic model proposed architecture and equipment - equipment system semantics, semantic concepts and definitions given in the relevant equipment system, discusses the semantic structure of the framework and building equipment...
Juan Huang
In order to improve the rate of first wish, we propose that the C4.5 decision tree classification algorithm is applied to a college graduate enrollment. The candidate information is processed, decision attributes are selected and decision tree is constructed. From extracting rules, it can acquire the...
Jianjun Yu, Qiangqiang Zhu
This paper studies under the retailer’s competition a supplier how to make an optimal decision about the delivery lead time. With continuous development of the financial market and the trade market, more and more companies are choosing to have a make to order production plan as to save money from storage,...
Dong Liu, Kang Li
In the evaluation of equipment system of systems(SoS), equipment data has shown some new characters, such as big volume, wide range sources, and dynamic variance. The paper pointed out the idea to evaluate equipment SoS based on big data analysis techniques. The outline of the method is provided from...
Bin Wang, Jing Li, HuaQi Zhao, ShiJie Zhang
In the design process of automobile data recorder detection system in the intelligent traffic management system, the traditional design method is difficult to resist the interference due to external environment, making the image of automobile data recorder is obscure, resulting in low detection precision...
Hai Wang, Chun-dong Li, Tao Ma, Shi-shen Guan, Ping Yang
The AC voltage at the both ends of the excitation winding of the magnetic control reactor should be zero volts, but because of the reason of magnetic control reactor structure design and the influence of such factors as the symmetrical deviation of manufacturing process, exciting winding ends there is...
Wei Liu, Jiabao Zhao
Nowadays, distributed systems have been used everywhere, some for online applications, such as Apache HBase [1] and Cassandra [2], and some for offline applications, such as HDFS [3] and GFS. These systems achieve good result and largely reduce the cost. Due to the fact that distributed system is generally...
Feng-zhou Ju, Xiao-liang Chu, Jian Wang, Yan-zhen Gu
It is a useful way to gain ocean wave information using X-band nautical radar images. In this paper, an algorithm of 2-D CWT in spatial domain and 1-D FFT in time domain is presented for extracting the wave information. Firstly, the basic theory of 2-D continuous wavelet transform for space domain and...
Meng Xu, Xiao-liang Chu, Jian Wang, Ye-hui Wang, Kai-jin Wei, Tao Zhou
A method for wind speed retrieval is developed by applying fitting techniques with the ratio of signal to noise. The method is applied to the wind speed retrieval from the nautical radar images. And we get a correlation coefficient of 0.88 and RMS error of 1.34m/s by comparing the data from the radar...
Yongyu Fan, Ruoming He, Xuesong Wang
The previous experiments have shown that hydrophobic properties of 20 kinds of human’s amino acid are different. It was of great significance to study whether hydrophobicity of proteins had a role in the research of the intimate relationship of proteins. Besides, it is also very important to balance...
Zhuan Li, Chun-mei Liu, Jun-ling Wang, Min Zhang
We use two-mode squeezed vacuum state as a quantum channel to teleportate the quantum squeezed vacuum state and analyze the fidelity of the teleportation by the Wigner function. The result shows that the squeeze factor of the quantum squeezed vacuum state is smaller, the quantum features of the teleportation...
Jinjiang Yang, Peng Cao, Jianbing Hu, Le Chang
A Coarse-Grained Reconfigurable Architecture targeted on block cipher is designed in this paper, which can meet the needs of various cipher supporting in the security applications and enhance the performance of these ciphers. By analyzing the character of the execution and data structure of block ciphers,...
Di Yu, ShengYao Song
Estimation of injection production relationship is discussed for multi-injectors and multi- producers of heterogeneous water-flood reservoir. The well pattern model is established and the definition of regional impact is proposed. In order to avoid the negative estimation parameter in the process of...
Jie Li
In regard of how to construct an open and efficient teacher education system to realize the teacher’s continuous professional development needs, this paper bases on the English major of Hebei University as study materials, to establish Hebei University, itself, multiple interaction on English education...
Sui Zhang, Wei Su, Zhipeng Li, Junchao Xiong, Qing Sun
In photovoltaic grid-connected system, it is an essential link to inspect frequency, phase position and amplitude of network voltage accurately and rapidly. Using DSP inner capture unit, common timer and comparing element realizes signal capture on network voltage and photovoltaic power generation, so...
Yunxiang Zhang, Yunpeng He, Shengcan Jin
In this thesis, the main part is the research on the Video-On-Demand. Using an adaptive streaming media transmission program, according to network conditions on the video-on-demand server control pro tournament at the same time adjust the client's cache, so that the client be able to smoothly carry out...
Dongling Peng
In order to control system transient stability and improve TSCOPF’s computational efficiency, the paper, based on analyzing the existing problem of multiple faults’ transient stability constrained optimal power flow trace sensitivity, introduces strict judgment of transient stability in TSCOPF model...
Yan Zhai, Xiaobo Guo
For the influence caused by illness condition of suffered limb on system stability when robot makes rehabilitation training on assisted suffered limb, on the basis of the traditional impedance control method, this paper puts forward one kind of impedance control method based on fuzzy neural network....
Zongliang Wang, Junzhong Sun, Zhanlu Yang
According to the working characteristic of the transformer with multi-magnetic circuits, a simulation model of the transformer with multi-magnetic circuits is established , by using of simulation model and SD-3 type monitor in the ship-breaker’s verifying equipment, close making angle can be selected...
Yunxiang Zhang, Yunpeng He, Chuanhui Li, Jinxia Huang
This paper first introduces the basic principle of the streaming media adaptive transmission, explains the flow of two inseparable part media adaptive transmission technique in adaptive coding: streaming media and streaming media adaptive transmission control strategy, and analyzes the current several...
Lili He, Zhao Jin
In various scientific experiments, experimenter always get some discrete data, to estimate the function with the original rules from these data, interpolation is a method for dealing with this kind of problem.But when the discrete data is too much,it can be caused serious distortion which is called Runge...
Jin Xia Huang, Yong Hong Yu, Yi Yuan Ge, Yun Xiang Zhang
Design process of long roots Chinese herbal medicine harvester is analyzed,3D solid modeling based on Pro/E for the herbal medicine harvester is made.Virtual assembly for harvest using Pro/E assembly module,also with movement simulation and analysis for it’s key components is made in this paper. All...
Jingyuan Gao
The coal conveying system is the most important composition unit of continuous mining machine, the performance of coal conveying system plays a decisive role in production efficiency, this equipment is easy to cause the fault, in this paper, the faults often appeared in this equipment and the fault reasons...
Chunqing Li
To solve the deficiency of algorithm distributed association rules based on MapReduce, this paper introduces global pruning strategy to increase algorithm efficiency, adopts frequent matrix storage to reduce the consumption of internal storage, and puts forward MFMDAP of frequent matrix storage of MapReduce...
Qingfei Fu, Minglong Du
Linear instability theory can evaluate the beginnings of instability in a liquid sheet. It provides a good starting point for predicting unstable, wave-type behavior in a liquid sheet with disturbances. An existing linear instability analysis method was used to investigate the breakup of a conical sheet...
Zhiren Yin, Lijun Yang
The basic process of air flapper valve was analyzed and the mass flow rate model of air flapper valve was established. The loss of flow through the air valve was considered. The opening process of the flapper was modeled with a non-viscous model, and the closing process was modeled with a viscous one....
Xiao Qu, Jincheng Xi, Xinning Liu, Jun Yang
Channel equalizer is a key component of WSN-OFDM (Wireless Sensor Networks Orthogonal Frequency Division Multiplexing) system. Traditional equalizer is mostly designed with LS algorithm, which comes with low precision in channel estimation. The previous LMMSE algorithm could reach a high accuracy, but...
Tao He, Yong Wei, Huazhong Li, Lina Fang, Shouxiang Xu, Defen Zhang, Junqiang Liu
We take the overall architecture of internetware on-line evolution model as basic, and study on trust metric model of the software in internetware system. In view of the not accurate results from the rough and existing trust metric model granularity, this paper proposed a multi service and hierarchical...
Weiran Tao
As the improvement of people's living standard, the content of trace elements in food more and more attract the attention from people. In this paper, I integrate all the analysis situation from Catalytic Kinetic Spectrophotometry to trace elements in the food over the past ten years. Through the NH3-NH4Cl,...
Yiren Huang, Zhengzhou Wang
Flame retardant and mechanical properties of ammonium polyphosphate (APP), melamine phosphate (MP) and their combination with dipentaerythritol (DPER) in styrene-butadiene-styrene rubber (SBS) were studied. The results indicate that MP is more effective in raising limiting oxygen index (LOI) in SBS than...
Wei Wang, Shan Xiong, Yong Zhang
Dynamic reasonable and objective evaluation for the development status of high-tech zone will grasp the development trend of high-tech zone accurately and have a very positive effect on promoting adjustment policies. Through the use of AHP, building a high-tech zone evaluation system from the perspective...
Shao-gan Shu, Xiao-song LI
Equipment procurement had the characteristics of long life cycle, high cost and high technical requirements and the budget may change. So the problem of how to select equipment vendors under the condition comes on. To improve the efficiency and reducing risk, a model of equipment vendor selections under...
Jun Zou
At present, theoretical studies on collaboration evaluation of supply logistics based on Supply-Chain were very few, while almost no researches were on its index system. The paper took supply logistics system based on Supply-Hub as research object, built up a framework of performance evaluation system,...
Lin Zhu
the traditional design of campus network adopts BP neural network to build the model for evaluating network information of network model, since the information exchange reflected in campus network is between individual and individual, randomness and model property factors of network information are prominent,...
Xiao dong Xie, Jinping Zou, Xi Huang
The massive data query methods in database is studied to improve accuracy of query. In the process of data querying in the database, once the data volume is overflow and thetype of data becomes complex, the query requires a lot of restrictions, resulting in time-consuming and low query accuracy rate...
Hongwang Li
During rationality evaluation process for college budget expenditure performance, when traditional algorithm is adopted to evaluate, the accuracy and practicability of expenditure cannot be considered at the same time, thus, assessment results have poor accuracy. For this, a rationality evaluation method...
Chen Wang
During the study process of mining methods for data of potential risk in large cloud computing network, when mining data of risk with traditional methods, principal element features and context features of data have significant fluctuations, which results in inaccurate data mining results. For this,...
Weihai Song, Jie Tong, Dongfang Wang
This article firstly has an overview of Surface acoustic wave (SAW) sensor technology, including its history, principle, compare of resonate type and delay-line type. SAW technology is also compared with other temperature sensor technologies. To meet the temperature detecting requirement, we have developed...
Zhaoxia Han
Rapid development of economy speeds up the pace of China's urbanization. The gradual increasing of structures increases energy consumption. In order to adapt to the development of our country's economic society, the attention to environment protection is strengthened in our country. The energy consumption...
Shuwen Chen
In the process of designing college student course examination performance assessment system, with the current algorithm to design examination performance assessment system, only based on the theoretical view to assess the quality of qualitative course examination scores, results in the passive situation...
Qinhua Lin
During the study process of mobile terminal three-dimensional reconstruction program development based on Android, due to the adoption of the current algorithm for 3D image reconstruction program development, the definition of established model is low, leading to the problem of poor fidelity for 3D image...
Jian Huang, Qian Zhao, GuoMing Li
After analyzing the interface work principle of the lattice font supported by QT and UCDOS font feature,It is found that the open source QT is lack of the lattice font more than 16*16 size. For this shortcoming, the UCDOS font is combined with the QT seamlessly. Thus, the QT can use any font in the UCDOS...
Hailong Xiao, Chunyu Liu, Yongsheng Zhang
Electricity communication transmission network is the key support network of the power grid. Its security has direct significance to the stable operation of the power system. The article brings out a re-definition of risk. According to the threat of natural disasters, equipment and human resources in...
Zhuo Zhen, Chaoying Liu, Xueling Song
In order to truly reflect the object situation of catch and place of the three-DOF parallel manipulator based on machine vision, and on the basis of the modeling of the trajectory and mechanical structure, this paper mainly focuses on the analysis on the manipulator system by using the co-simulation...
Chunyu Liu, Jinyu Luo, Yongsheng Zhang, Jie Zhang
By studying the SDH equipment of EPCTN, and the principles and methods of building the index system, combining with the actual situation of electric power communication operation, this paper establishes the index system of EPCTN risk assessment which includes target layer, rule layer, and index layer....
Jie Hu, Wei Li, Shaojun Zuo
This paper presents an approach for the estimation of two-directional (2D)direction-of-arrival (DOA) using Acoustic Vector Sensor array based on greedy block coordinate descent(GBCD) algorithm, which can achieve faster convergence rate and better estimation accuracy. Moreover, a weighted form of block...
Liangming Zhu, Yanjie Cao, Weibo Li
This paper introduces the composition and working principle of, electromagnetic emission interceptors, establishes the three-dimensional model of transmitter coil, analyzes magnetic - structure coupling of the transmitter coil, gives the transmitter coil magnetic field and stress field distribution and...
Guangqian Zhang, Enshui Yu
Personalized recommendation technique is an important technology to solve information overloaded in e-commerce. But recently new commodities are emerging constantly, so it is required to recommend commodities that consumers aren’t familiar with but interested in. Consequently our study proposes a method...
Haitao Lu, Shuo Li
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database; it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which...
Jing Wang
In this paper, we present some results on the relations between the solutions to matrix equations AXA=B and CYC=D, where B and D are Hermitian matrices.
Karl Mabiala Dondia, Jing Ma, Feng Tao
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is due to the “plug-and-play” nature of the technology and the mobility. The lack of physical containment due to the...
Yunhong Li
In this paper, we investigate a coupled system with integral boundary conditions of nonlinear fractional differential equations. Using Leggett-Williams theorem, the existence of solutions is obtained. An example is given to illustrate our result.
Yun-ting Zhou, Mao-lin Deng, Feng-zhu Ji, Xiao-gang He, Qi-jie Tang
Since computer network has become the basis of the information society, network topology has also become an important part of network management. The theory foundation of the network topology algorithm based on SNMP has been introduced in this paper, and the algorithms of network topology discovery based...
Feng-zhu Ji, Yun-ting Zhou, Qi-jie Tang, Fang-xiang Hu, Shao-feng Ma
In order to solve the problem of methodology subjectivity, long modeling time and low classification accuracy in the information security risk assessment, a network security situation assessment model based on FAHP has been proposed in this paper. Via building a network security index system, using the...
Jie Zhao, Zhi Cao
Computational methods for predicting the new drug-target interactions are more efficient that those experimental methods. Many machine learning based methods have been proposed but most of them suffer from false negative problem. In this paper we extend the original label matrix and adopt weighted lose...
Shuguo Wang, Haitao Cao
In this paper, synchronization analysis is investigated for an complex networks with time delay. It is assumed the nodes in the network to be nonidentical. In order to achieve cluster synchronization, this paper uses an adaptive controller on each node, by utilizing the Lyapunov stability theory, a new...
Yixuan Han
In this paper, an effective model is constructed to discuss the sustainability of a country. We define Coordination Coefficient (CC) to measure the sustainability of a country or a policy and use the value of CC to define how and when a country is sustainable or unsustainable. To consider all the possible...
Changhua Liu, Xiaole Xu
A fast set partitioning in hierarchical tree (SPIHT) algorithm based on the end scan threshold is proposed in this paper. Because the coding process of the SPIHT needs repeat scanning and sorting, so it takes a lot of extra time and storage space. In order to save the time and space overhead, the end...
Mianshui Yu, Xiaomeng Xie
Palmprint recognition is an emerging biometric technology that identifies a person based on the hand image. In this paper, a novel palmprint identification method based on Gabor wavelets and Local Direction Pattern (LDP) techniques has been proposed. The Gabor response images at different scales and...
Jianping Chai, Xingyi Pan, Fulian Yin, Juanfang Chai
For problems, such as the low accuracy and easily polluted data of the traditional sampling ratings index calculation method, we conduct research on the ratings of big data. Firstly, we argue the effect of the amount of data on the accuracy of the ratings, and do experiments using real data. By sampling...
Jing Lin
The decision tree is an important data mining method for classification. Granular computing has been applied to the decision tree, then a new decision tree based on the classification preference ratio of attribute is proposed. This decision tree is a hierarchical granularity tree. In information systems,...
Zheng-yu Zhao, Yuan-wen Cai, Yi-bin Zhao, Yan Li
The demand of earth observation data is increasing currently and the demand of observation data accuracy, real-time, and continuity is improving continually. Aiming at this problem, the small satellite formation scheme for earth observation task is researched. The significance of the small satellite...
Jian-biao Chen, Hua-yan Sun, Yong-hui Zheng
Ideal result of target recognition can’t be obtained just with single attribute. In order to improve the performance of target recognition and reflect the physical attributes of the target, some attributes are extracted from the high range resolution profile of the unknown target to form an multi-attribute...
Yan Su, Ya-Ping Huang
Based on the smooth test for uniformity on the surface of a unit sphere , a new test for multivariate normality is presented. The test statistic does not depend on the parameters in the multivariate normal distribution. We obtain the asymptotic null distribution of the test statistic. The test procedure...
Yi-bin Zhao, Zheng-yu Zhao, Xiao-chen Xing, Guo-feng Xu
In order to make more effective decision level analysis on the testing information of rocket launchers, this paper analyzes the existing disadvantages of evidence theory, draws into the concept of weight coefficient integrated with existing improved method, proposes new improvement of the combination...
Weimin Yang, Yanna Zhang, Shujiang Li, Caixia Shi
Using commercial software CFD (Computational Fluid Dynamics) analysis of fluid to simulate the H-Boat. Based on the numerical methods, use the VOF (volume of fluid) method to simulate the free surface, and use RNG (Renormalization-group) model to close RANS (Reynolds Average Navier-Stokes) equations...
Peng Li, MinXuan Zhang, ZhenYu Zhao, Quan Deng
This paper designs a novel 3D SRAM soft error analysis platform. It is used for studying the soft error characteristic of 3D SRAM stacked by multi dies and guiding the radiation hardened design for 3D SRAM. This platform integrates simulation tools including Geant4, TCAD and Nanosim, data recording and...
Haifeng Chen, Liang Xiao, Jingbai Tian
A distributed environment, medical decision-making process is becoming increasingly complex, and it usually needs more medical roles to complete the diagnosis and treatment of one complex disease. However, these medical roles typically distribute in different work environments, so the organization and...
Quan Deng, Min-Xuan Zhang, Zhen-Yu Zhao, Peng Li
As the technology of three dimension integrated circuit (3D IC) develop quickly, through silicon via (TSV) plays a basic and important role. In consideration of real working environment, factors as temperature and working voltage are studied by TCAD simulator. And the contribution of physical sizes and...
Zhixun Zhao, Lin Ni, Shaoqing Li, Yubo Shi
Recently Hardware Trojan has been widely studied for its threat to IC security. The method based on power side-channel information is an effective one in various Hardware Trojan detection methods proposed at present. However, there is a problem that Hardware Trojan power is difficult to be distinguished...
DongYang Li, Yue Zhou
Deep convolutional neural networks (CNNs) have recently shown impressive performance as generic representation for recognition. However, the feature extracted f¬rom global CNNs lack geometric invariance, which limits their robustness for classification and detection of highly variable objects .To improve...