首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The research examines the design and operation of the electrical system of the roller tuna longline, based on the fishing machine developed by Ningbo Jessn Ocean Exploitation Co., Ltd. The findings indicate that, with the help of transducer probe installed at casting wheel, the total shooting length and shooting velocity would be authentically showed in the electronic monitor. Besides, safe and efficient fishing would be achieved by the application of the control panel, interphone system and monitoring system together.  相似文献   

2.
Market watchers are splashing criticisms and suspicions over the trusted computing, declaring that it will be many years before large numbers of companies and individuals benefit from this technology. This paper investigates a majority of TCG (Trusted Computing Group) members, classifies their products as TPM chips, TCG enabled hardware and software. The data are collected from both literature and websites. It indicates that the trusted computing technology in China is considerable on chips and hardware. As for TCG enabled software, there still have many obstacles for Chinese to combat.  相似文献   

3.
A method of spam detection, based on cognitive pattern recognition, had been proposed. The connection between Email category and cognition of Email user interest within life and work, had been analyzed. Under the guidance of cognitive pattern recognition theory, the mechanism of spam detection, based on intelligent cognition of Email user interest within life and work, had been discussed. Then the spam detection algorithm and its concrete implementation was given. Experimental results demonstrate that the spare detection algorithm has a good learning ability, scalability, and a good ability to achieve high recognition accuracyn  相似文献   

4.
New conditions are derived for the l2-stability of time-varying linear and nonlinear discrete-time multiple-input multipleoutput (MIMO) systems, having a linear time time-invariant block with the transfer function F(z), in negative feedback with a matrix of periodic/aperiodic gains A(k), k = 0,1, 2,... and a vector of certain classes of non-monotone/monotone nonlinearities φp(-), without restrictions on their slopes and also not requiring path-independence of their line integrals. The stability conditions, which are derived in the frequency domain, have the following features: i) They involve the positive definiteness of the real part (as evaluated on |z| = 1) of the product of Г (z) and a matrix multiplier function of z. ii) For periodic A(k), one class of multiplier functions can be chosen so as to impose no constraint on the rate of variations A(k), but for aperiodic A(k), which allows a more general multiplier function, constraints are imposed on certain global averages of the generalized eigenvalues of (A(k + 1),A(k)), k = 1, 2 iii) They are distinct from and less restrictive than recent results in the literature.  相似文献   

5.
Various redundancy tactics can be modeled at the design stage of safety-critical systems thereby providing a set of fault-tolerance guidelines for subsequent development activities. However, existing approaches usually interweave redundancy tactics into the functional models making them complex and cluttered; the maintenance of such models is time-consuming and error-prone. To address this problem, we provide a modeling approach to separate the redundancy tactics from the base functional models using aspect-oriented modeling. More specifically, the conceptual models of the redundancy tactics and their semantic constraints are first defined for deriving the relevant aspects. Subsequently, a UML profile is proposed to specify the tactic aspects followed by mapping these concepts to the corresponding concepts of aspect-oriented modeling based on pre-defined principles. In accordance with our proposed profile, reuse directives are applied to handle the overlap of structural features between redundancy tactics and other kinds of tactic. Based on our tactic aspects and their configured attributes, a weaving algorithm is proposed to associate the tactic aspects with the base functional models. The proposed approach is compared with a traditional tactic modeling approach using two safety-critical systems, revealing that: 1) our approach significantly reduces the number of extra model elements needed in the tactic design stage; 2) our approach can largely avoid the impact of changing of the base functional model as the model evolves.  相似文献   

6.
By combining training content with Game AI, Game Style Training can provide a rich, interactive and engaging educational substance. It supports experiential learning-bydoing. And it can contribute to promote interest and motivation of trainees. In this paper, a Context-Awareness Approach (CAA) is put forward for earthquake rescue training by applying the concept of ambient intelligence. The CAA takes advantage of player profile to monitor player states, utilizes time sensor and location sensor to supervise environment changes. And then, a Reinforcement Learning model based on MAS is designed to update game AI system.  相似文献   

7.
This paper proposes a new different spectral density from power spectrum density of second order processes, thus we can get a new concept of stable white noise based on covariation function and covariation spectrum density. And a new technique is suggested for the estimation of the parameters of polynomial autoregressive (PAR) nonlinear colored noise processes with stable white noise excitations. Simultaneously, a simple whitening method is employed for polynomial autoregressive nonlinear stable colored noise.  相似文献   

8.
Due to severely constrained energy, storage capacity and computing power for nodes in wireless sensor network, the routing protocols have become a hot research topic. Directed diffusion is a communication paradigm for information dissemination in sensor networks based on data-centric routing. An energy efficient hybrid adaptive clustering for directed diffusion is presented in the paper. The main goal is to curb the interests flooding overhead by clustering. Hybrid of active and passive clustering creation is used to make tradeoff between maintenance cost and delay. The adaptive turning off the radio of redundant nodes and rotation of cluster heads is used to save energy. The ns-2 simulating results show that the protocol has good performances in energy consuming, delivery ratio and delay without leading to too much overhead comparing with existing directed diffusion protocols.  相似文献   

9.
The Internet technology has already changed the Information Society in profound ways, and will continue to do so. Nowadays many people foresee that there is a similar trajectory for the next generation of Internet - Grid Technology. As an emerging computational and networking infrastructure, Grid Computing is designed to provide pervasive, uniform and reliable access to data, computational and human resources distributed in a dynamic, heterogeneous environment. On the other hand, the development of Geographic Information System (GIS) has been highly influenced by the evolution of information technology such as the Internet, telecommunications, software and various types of computing technology. In particular, in the distributed GIS domain, the development However, due to the closed and centralized has made significant impact in the past decade. legacy of the architecture and the lack of interoperability, modularity, and flexibility, current distributed GIS still cannot fully accommodate the distributed, dynamic, heterogeneous and speedy development in network and computing environments. Hence, the development of a high performance distributed GIS system is still a challenging task.
So, the development of Grid computing technology undoubtedly provides a unique opportunity for distributed GIS, and a Grid Computing based GIS paradigm becomes inevitable. This paper proposes a new computing platform based distributed GIS framework - the Grid Geographic Information System (G^2IS).  相似文献   

10.
Recently there have been researches about new efficient nonlinear filtering techniques in which the nonlinear filters generalize elegantly to nonlinear systems without the burdensome lineafization steps. Thus, truncation errors due to linearization can be compensated. These filters include the unscented Kalman filter (UKF), the central difference filter (CDF) and the divided difference filter (DDF), and they are also called Sigma Point Filters (SPFs) in a unified way. For higher order approximation of the nonlinear function. Ito and Xiong introduced an algorithm called the Gauss Hermite Filter, which is revisited in [5]. The Gauss Hermite Filter gives better approximation at the expense of higher computation burden, although it's less than the particle filter. The Gauss Hermite Filter is used as introduced in [5] with additional pruning step by adding threshold for the weights to reduce the quadrature points.  相似文献   

11.
Distinguishing with traditional tooth profile of spiral bevel and hypoid gear, it proposed a new tooth profile namely the spherical involute. Firstly, a new theory of forming the spherical involute tooth profile was proposed. Then, this theory was applied to complete parametric derivation of each part of its tooth profile. For enhancing the precision, the SWEEP method used for formation of each part of tooth surface and G1 stitching schema for obtaining a unified tooth surface are put forward and made the application in the accurate modeling. Lastly, owing to the higher accuracy of tooth surface of outputted model, it gave some optimization approaches. Given numerical example about the model can show that this designed gear with spherical involute tooth profile can achieve fast and accurate parametric modeling and provide a foundation for tooth contact analysis (TCA) in digitized design and manufacture.  相似文献   

12.
In MISO-OFDM system, ICI which is caused by frequency offset and phase noise breaks down orthogonality between sub-carriers and degrades system performance. In this paper, to compensate integrated effect of frequency offset and phase noise, several ICI self-cancellation methods are proposed; and CPE, ICI and CIR are derived theoretically in MISO-OFDM system. As results, by choosing several ICI self-cancellation methods appropriately, considerable performance improvement can be achieved in the MISO-OFDM system which affected by frequency offset and phase noise.  相似文献   

13.
For virtually realizing the graphic realism display of DXF machine parts, in AutoCAD2007 graphic drawing environment, an interactive experimental method was taken to realize the display of graphic in DXF, which was taken as the data-exchanged interface and source. Based on depth analysis of DXF data structure, take one drawing of DXF lathe turning rotational part asthe test piece. By VC++6.0 programming, part's geometry information could be obtained. Through data processing, 3D data of the test piece could be generated, which is based on 2D data of DXF test piece. Then, OpenGL graphic processing technologies (light, material, texture, map, et al.) were applied on the 3D display of test piece from DXF files or program modules. Finally based on the test report, results of the system functions were shared to prove the realization of system design, and the feasibility of algorithms used. In the developed software, Machine Designers could get a full view of machine parts, and do some proper modifications. The study content and results of our work have some theory and practical significance on the application of program design in the practical projects.  相似文献   

14.
This paper puts forward a text-circled semantic schema by which a special flow chart of cognitive alteration and processing breakdown in Machine Translation (MT) system is clearly presented. Based on the theoretical analysis of textual Garden Path Phenomenon (GPP), we devise a formula to measure the dramatically changeable value of textual GPP. The data-provided evidence in A Farewell to Arms shows the textual GPP can motivate the development of plots and adjust the analyst's original horizon of expectation. Despite the limitation of incompatible, subjective and sample-restricted features involved in the theoretical framework and formula, this computational analysis makes MT system pay more attention to text-circled cognitive alteration rather than only highlight the lexical or syntactic translation, and as a result aims to make the effectiveness of machine translation of the literary text improved.  相似文献   

15.
16.
Providing each node with one or more multi-channel radios offers a promising avenue for enhancing the network capacity by simultaneously exploiting multiple non-overlapping channels through different radio interfaces and mitigating interferences through proper channel assignment. However, it is quite challenging to effectively utilize multiple channels and/or multiple radios to maximize throughput capacity. The National Natural Science Foundation of China(NSFC) Project61128005 conducted comprehensive algorithmic-theoretic and queuing-theoretic studies of maximizing wireless networking capacity in multi-channel multi-radio(MC-MR) wireless networks under the protocol interference model and fundamentally advanced the state of the art. In addition, under the notoriously hard physical interference model, this project has taken initial algorithmic studies on maximizing the network capacity, with or without power control. We expect the new techniques and tools developed in this project will have wide applications in capacity planning, resource allocation and sharing, and protocol design for wireless networks, and will serve as the basis for future algorithm developments in wireless networks with advanced features, such as multi-input multi-output(MIMO) wireless networks.  相似文献   

17.
Selective laser melting (SLM) is one of the most popular additive manufacturing (AM) technologies for metal parts. Slicing result, especially for the different dimensional slicing geometry and its topology, plays an important role because of the thermodynamic behavior of metal powders. To get correct geometry and reliable topology, a slicing strategy for SLM is proposed. The unavoidable numerical error caused by sampling and geometric transformation is suppressed firstly, according to shifting the z-coordinate of a vertex with a small value such the shifted vertex is on a slicing plane. The result of vertex-shifting makes it possible to identify different geometric features such as skin surfaces, overhang surfaces, extreme edges and volumetric solid. Second, from geometric primitives a hierarchy of axis-aligned bounding boxes (AABBs) is constructed and used to speed up intersection of slicing planes against sets of triangles. All intersecting segments are given different signs to depict their geometric or topological information. Based the different signs, the different dimensional geometry that is eventually represented by simple and anticlockwise oriented polygons, are identified. Finally, the polygons are classified and nested in a multi-tree data structure set to produce correct topological relations. The result of digital and physical experiments shows the proposed slicing strategy is feasible and robust.  相似文献   

18.
19.
An integrated tetrahedrization algorithm in 3D domain which combines the Delaunay tetrahedral method with un-Delaunay tetrahedral method is described. The algorithm was developed by constructing Delaunay Tetrahedrons from a scattered point set, recovering boundaries using Delaunay and un-Delaunay method, inserting additional nodes in unsuitable tetrahedrons, optimizing tetrahedrons and smoothing the tetrahedral mesh with the 2D-3D Laplacian method. The algorithm has been applied to the injection molding CAE preprocessing.  相似文献   

20.
analysis on researching find wide The primary origin of algebraic numbers is the finite field Zp[i], which is derived from Gauss' on arithmetic of Z[i]. Primitive element theories application in cryptography. Some theon'es is discussed on how to determine numbering methods in. finite field primitive element and the Zp[i] generated by Gauss integral domain Z[i]. The research result will be of important value in secret communication.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号