Search all articles

+ Advanced search
Search articles within:
71369 articles
Yin xia Ran
We studied the Diophantine equation x2+4n=y9. By using the elementary method and algebaic number theroy, we obtain the following concusions: (i) Let X be an odd number, one necessary condition which the equation has integer solutions is that 28n-1/3 contains some square factors. (ii) Let X be an even...
Zhi jie Tang, Ping long Liu, Jia li Shen, Jun Luo
Wind energy is a kind of inexhaustible and clean renewable energy. Wind power system has some characters of simple structure, convenient maintenance and easy management, which gets a lot of attention. This paper analyses the composition and the principle of wind power system. Based on variable speed...
Bing lin Xu, Zhan huai Li
Anomalies, outlier and fault means that the received data do not fit the common pattern, and may often be occur in spacecraft missions because of the high complexity and rugged operating environment of spacecraft. In order to reveal the potential faults or anomalies many methods and technology have been...
Ling ling Feng, Guo qing Qi
An algorithm for extracting information from meteorological facsimile maps and transform the map into vector format is proposed. The algorithm contains two parts. The first one is annotation information extraction method based on the regular pattern of position and angle, the second part is isobars vectorization...
Hui Wang, Zuo yu Guan, Li jun Yu, Bo bo Zhang
The UAV guidance in combating airspace need to make UAV close to the target and complete air strikes, which need to receive all necessary data and information and use these parameters to achieve the UAV guidance. For processing the problems that are irregular and complex, this paper presents a new guidance...
Zhong Han, Guicheng Zhang, Lixing Yuan, Shengdun Zhao
It is a difficult and valuable research to automatically generate the system model according to some rulers desired. So, a new auto-modeling method for industrial systems is presented. In the research, the industrial system is divided into many individual units, and some mathematical expressions are...
Ling bin Yan, Li rong Yu, Wei jia Lu, Hai feng Xu, Yuan sheng Tang
For the decoding of a binary linear block code of Hamming distance of d over AWGN channels, a soft-decision decoder is said to be bounded-distance (BD) decoding if its squared error-correction radius is equal to d. A Chase-like algorithm outputs the best (most likely) codeword in a list of candidates...
Xue jian Zhao, Xiao jun Wang, Bin Xu
The RA (Range Assignment) strategy is an art of setting nodes’ transmitting ranges to generate a network with desired properties and at the same time reducing node energy consumption and/or increasing network capacity. In this paper, a distributed RA strategy RRAS (Robust Range Assignment Strategy) is...
Lian zhong Liu, Wu Zhang, Shuang bao Shu, Xiu Jin
The paper proposes an image recognition method of wheat disease. Image background is first removed by image segmentation using green feature of wheat leaf to obtain only disease pixels from original leaf image. Then disease features are calculated through 3 schemes: 1) mean values of R, G, B; 2) normalized...
Hong hao Zhao, Fan bo Meng, Qing qi Zhao, Wei zhe Ma, Ri min Jiang, Xiao guang Bian
This paper analysis overload control characteristics of the application server in the next generation electric communication network, as well as the application server overload detection requirements, propose an energy efficiency overload control algorithm based on particle swarm. First of all, we consider...
Zhen Wang, Xiao dong He, Bin Tang
In this paper, we propose an imaging algorithm of missile-borne SAR in diving and squint mode. The diving acceleration, vertical speed, and squint angle caused a large range cell migration (RCM). The algorithm divides the RCM correction (RCMC) into two steps. Firstly, correcting the main part of range...
Yan Zhang, Dan jv Lv, Ying Lin
Environmental audio classification has been the focus in the field of speech recognition. The paper proposes using ensemble learning to perform environmental audio classification. Ensemble learning is to train multiple component learners and combine their predictions to enhance the accuracy of classification....
Nicolas Favarcq, Pierre Palluau, Olivier Sentier, Jia Wang
Since 10 years, aerospace industry is facing an unprecedented cycle time reduction driven by high competition between Aircraft manufacturers. To safely sustain such optimizations, virtual test is becoming essential in avionic development cycle. Modern aircraft validation techniques rely heavily on virtual...
Ayoub Mohamed H. Elyasir, Kalaiarasi Sonai Muthu Anbananthen
Bag of Words (BoW) and Word Sense Disambiguation (WSD) are the main approaches utilized in almost every data mining project for classification and data processing. The two approaches are extensively used in constructing various classifiers including supervised, unsupervised and semi-supervised classifiers....
Qin xuan Gu, Ming chuan Yu, Yu Guan
In this study, we examine the roles of job satisfaction and proactive personality in the relationship between the four Big Five traits and creativity. Regression analysis is used to test the hypotheses in a sample of 162 respondents. The results show that extraversion and agreeable are positively related...
Nu er lan Mu han, Yong Qin, Qing hua Zhang, Yan fang Yang, Zun dong Zhang
Genetic algorithm is used to calibrate four driving behavior parameters and a set of calibration procedure is put forward based on VISSIM. Using the approach maximum queue length and travel time as the evaluation indexes and applying the calibration method to a single signalized intersection of Yizhuang...
Cheng xue Qian, Xing wei Song, Yun Huang, Xue jia Lai
In this paper, we present a novel user-friendly graphical password scheme resistant against "watching" attacks. Snapshot, remote monitoring, and shoulder-surfing have in common that all these attacks act as if one could directly watch the users' behavior on the screen, resulting in an insecure use of...
Chengzhi Li, Ping Zhang
Equity auction has advantages in revealing the real equity prices and allocating resources efficiently, and is an important way of venture capital exit. Outside investors can establish link relationship between each other and thus form a social network. This article establishes an equity affiliated value...