首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
The research examines the design and operation of the electrical system of the roller tuna longline, based on the fishing machine developed by Ningbo Jessn Ocean Exploitation Co., Ltd. The findings indicate that, with the help of transducer probe installed at casting wheel, the total shooting length and shooting velocity would be authentically showed in the electronic monitor. Besides, safe and efficient fishing would be achieved by the application of the control panel, interphone system and monitoring system together.  相似文献   

2.
Market watchers are splashing criticisms and suspicions over the trusted computing, declaring that it will be many years before large numbers of companies and individuals benefit from this technology. This paper investigates a majority of TCG (Trusted Computing Group) members, classifies their products as TPM chips, TCG enabled hardware and software. The data are collected from both literature and websites. It indicates that the trusted computing technology in China is considerable on chips and hardware. As for TCG enabled software, there still have many obstacles for Chinese to combat.  相似文献   

3.
A method of spam detection, based on cognitive pattern recognition, had been proposed. The connection between Email category and cognition of Email user interest within life and work, had been analyzed. Under the guidance of cognitive pattern recognition theory, the mechanism of spam detection, based on intelligent cognition of Email user interest within life and work, had been discussed. Then the spam detection algorithm and its concrete implementation was given. Experimental results demonstrate that the spare detection algorithm has a good learning ability, scalability, and a good ability to achieve high recognition accuracyn  相似文献   

4.
New conditions are derived for the l2-stability of time-varying linear and nonlinear discrete-time multiple-input multipleoutput (MIMO) systems, having a linear time time-invariant block with the transfer function F(z), in negative feedback with a matrix of periodic/aperiodic gains A(k), k = 0,1, 2,... and a vector of certain classes of non-monotone/monotone nonlinearities φp(-), without restrictions on their slopes and also not requiring path-independence of their line integrals. The stability conditions, which are derived in the frequency domain, have the following features: i) They involve the positive definiteness of the real part (as evaluated on |z| = 1) of the product of Г (z) and a matrix multiplier function of z. ii) For periodic A(k), one class of multiplier functions can be chosen so as to impose no constraint on the rate of variations A(k), but for aperiodic A(k), which allows a more general multiplier function, constraints are imposed on certain global averages of the generalized eigenvalues of (A(k + 1),A(k)), k = 1, 2 iii) They are distinct from and less restrictive than recent results in the literature.  相似文献   

5.
Various redundancy tactics can be modeled at the design stage of safety-critical systems thereby providing a set of fault-tolerance guidelines for subsequent development activities. However, existing approaches usually interweave redundancy tactics into the functional models making them complex and cluttered; the maintenance of such models is time-consuming and error-prone. To address this problem, we provide a modeling approach to separate the redundancy tactics from the base functional models using aspect-oriented modeling. More specifically, the conceptual models of the redundancy tactics and their semantic constraints are first defined for deriving the relevant aspects. Subsequently, a UML profile is proposed to specify the tactic aspects followed by mapping these concepts to the corresponding concepts of aspect-oriented modeling based on pre-defined principles. In accordance with our proposed profile, reuse directives are applied to handle the overlap of structural features between redundancy tactics and other kinds of tactic. Based on our tactic aspects and their configured attributes, a weaving algorithm is proposed to associate the tactic aspects with the base functional models. The proposed approach is compared with a traditional tactic modeling approach using two safety-critical systems, revealing that: 1) our approach significantly reduces the number of extra model elements needed in the tactic design stage; 2) our approach can largely avoid the impact of changing of the base functional model as the model evolves.  相似文献   

6.
By combining training content with Game AI, Game Style Training can provide a rich, interactive and engaging educational substance. It supports experiential learning-bydoing. And it can contribute to promote interest and motivation of trainees. In this paper, a Context-Awareness Approach (CAA) is put forward for earthquake rescue training by applying the concept of ambient intelligence. The CAA takes advantage of player profile to monitor player states, utilizes time sensor and location sensor to supervise environment changes. And then, a Reinforcement Learning model based on MAS is designed to update game AI system.  相似文献   

7.
This paper proposes a new different spectral density from power spectrum density of second order processes, thus we can get a new concept of stable white noise based on covariation function and covariation spectrum density. And a new technique is suggested for the estimation of the parameters of polynomial autoregressive (PAR) nonlinear colored noise processes with stable white noise excitations. Simultaneously, a simple whitening method is employed for polynomial autoregressive nonlinear stable colored noise.  相似文献   

8.
Thediaphragmofsteam turbine isoneofthemainpartsofthepassageunitfor air flowing.For studying its working conditionand performance, the three-dimensionalfinite element model(FEM)with thesoftware ANSYS10.0 isestablished according to theactualworking parameters. With the model, the deformation resultsand stress field resultsare analyzed andthe maximum displacement and stress value are calculated, meanwhile,theircorrespondingpositions are found. It provides a good foundationfor solving the problem inproduction.  相似文献   

9.
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption scheme.In our scheme,new users can join dynamically without modification of other users’decryption keys.Either the ciphertext or the decryption key is of constant-size.Backward secrecy is achieved in DNA-DBE:if new users join the system dynamically,they will not be able to retrieve past data.The security of our scheme relies on hard biological problems,which are immune to attacks of new computing technologies in the future.There exists a special feature in DNA–based cryptosystems,i.e.the set of encryption keys and the set of decryption keys have a many-to-many relationship.The implementation of more complicated DNA cryptosystems taking advantage of this special feature has been previously left as an open problem.Our DNA-DBE system is a solution to this open problem,which is also the first exploration of DNA based group-oriented encryption system.  相似文献   

10.
Repetitious simulation after modifying parameters of multi-domain physical system based on Modelica often appears in model experiment and optimization design. At present, the solvers based on Modelica need calculate all the coupled blocks during every simulation run after updating parameters. Based on discussing scale decomposition methods of simulation model, subdivision solving strategy and minimum solving strategy are put forward to improve the efficiency of repetitious simulation, by which the numerical solution of the simulation model can be achieved by only calculating the solving sequence influenced by altered parameters. A simplified model of aircraft is used to demonstrate the efficiency of the strategies presented.  相似文献   

11.
Due to severely constrained energy, storage capacity and computing power for nodes in wireless sensor network, the routing protocols have become a hot research topic. Directed diffusion is a communication paradigm for information dissemination in sensor networks based on data-centric routing. An energy efficient hybrid adaptive clustering for directed diffusion is presented in the paper. The main goal is to curb the interests flooding overhead by clustering. Hybrid of active and passive clustering creation is used to make tradeoff between maintenance cost and delay. The adaptive turning off the radio of redundant nodes and rotation of cluster heads is used to save energy. The ns-2 simulating results show that the protocol has good performances in energy consuming, delivery ratio and delay without leading to too much overhead comparing with existing directed diffusion protocols.  相似文献   

12.
Processing breakdown involved in garden path phenomenon is a special phenomenon in which the processor has to backtrack on the early understanding and create another path out to process data successfully and perfectly. From the semantic viewpoint of Natural Language Expert System, this paper puts forward a particular schema by which processing procedure of breakdown can be shown clearly and raises a special matching pattern to demonstrate the activity of noun-verb category. According to the analysis of interactive presentation of same word in which noun and verb definitions are involved, it is verified that Natural Language Expert System, only when its semantic database is activated, can clear the misunderstanding of syntactic sentences in which processing breakdown appears.  相似文献   

13.
The traditional strategy of 3D model reconstruction mainly concentrates on orthographic projections or engineering drawings. But there are some shortcomings. Such as, only few kinds of solids can be reconstructed, the high complexity of time and less information about the 3D model. The research is extended and process card is treated as part of the 3D reconstruction. A set of process data is a superset of 2D engineering drawings set. The set comprises process drawings and process steps, and shows a sequencing and asymptotic course that a part is made from roughcast blank to final product. According to these characteristics, the object to be reconstructed is translated from the complicated engineering drawings into a series of much simpler process drawings. With the plentiful process information added for reconstruction, the disturbances such as irrelevant graph, symbol and label, etc. can be avoided. And more, the form change of both neighbor process drawings is so little that the engineering drawings interpretation has no difficulty; in addition, the abnormal solution and multi-solution can be avoided during reconstruction, and the problems of being applicable to more objects is solved ultimately. Therefore, the utility method for 3D reconstruction model will be possible. On the other hand, the feature information in process cards is provided for reconstruction model. Focusing on process cards, the feasibility and requirements of Working Procedure Model reconstruction is analyzed, and the method to apply and implement the Natural Language Understanding into the 3D reconstruction is studied. The method of asymptotic approximation product was proposed, by which a 3D process model can be constructed automatically and intelligently. The process model not only includes the information about parts characters, but also can deliver the information of design, process and engineering to the downstream applications.  相似文献   

14.
Recently there have been researches about new efficient nonlinear filtering techniques in which the nonlinear filters generalize elegantly to nonlinear systems without the burdensome lineafization steps. Thus, truncation errors due to linearization can be compensated. These filters include the unscented Kalman filter (UKF), the central difference filter (CDF) and the divided difference filter (DDF), and they are also called Sigma Point Filters (SPFs) in a unified way. For higher order approximation of the nonlinear function. Ito and Xiong introduced an algorithm called the Gauss Hermite Filter, which is revisited in [5]. The Gauss Hermite Filter gives better approximation at the expense of higher computation burden, although it's less than the particle filter. The Gauss Hermite Filter is used as introduced in [5] with additional pruning step by adding threshold for the weights to reduce the quadrature points.  相似文献   

15.
Distinguishing with traditional tooth profile of spiral bevel and hypoid gear, it proposed a new tooth profile namely the spherical involute. Firstly, a new theory of forming the spherical involute tooth profile was proposed. Then, this theory was applied to complete parametric derivation of each part of its tooth profile. For enhancing the precision, the SWEEP method used for formation of each part of tooth surface and G1 stitching schema for obtaining a unified tooth surface are put forward and made the application in the accurate modeling. Lastly, owing to the higher accuracy of tooth surface of outputted model, it gave some optimization approaches. Given numerical example about the model can show that this designed gear with spherical involute tooth profile can achieve fast and accurate parametric modeling and provide a foundation for tooth contact analysis (TCA) in digitized design and manufacture.  相似文献   

16.
In MISO-OFDM system, ICI which is caused by frequency offset and phase noise breaks down orthogonality between sub-carriers and degrades system performance. In this paper, to compensate integrated effect of frequency offset and phase noise, several ICI self-cancellation methods are proposed; and CPE, ICI and CIR are derived theoretically in MISO-OFDM system. As results, by choosing several ICI self-cancellation methods appropriately, considerable performance improvement can be achieved in the MISO-OFDM system which affected by frequency offset and phase noise.  相似文献   

17.
The Internet technology has already changed the Information Society in profound ways, and will continue to do so. Nowadays many people foresee that there is a similar trajectory for the next generation of Internet - Grid Technology. As an emerging computational and networking infrastructure, Grid Computing is designed to provide pervasive, uniform and reliable access to data, computational and human resources distributed in a dynamic, heterogeneous environment. On the other hand, the development of Geographic Information System (GIS) has been highly influenced by the evolution of information technology such as the Internet, telecommunications, software and various types of computing technology. In particular, in the distributed GIS domain, the development However, due to the closed and centralized has made significant impact in the past decade. legacy of the architecture and the lack of interoperability, modularity, and flexibility, current distributed GIS still cannot fully accommodate the distributed, dynamic, heterogeneous and speedy development in network and computing environments. Hence, the development of a high performance distributed GIS system is still a challenging task.
So, the development of Grid computing technology undoubtedly provides a unique opportunity for distributed GIS, and a Grid Computing based GIS paradigm becomes inevitable. This paper proposes a new computing platform based distributed GIS framework - the Grid Geographic Information System (G^2IS).  相似文献   

18.
An integrated tetrahedrization algorithm in 3D domain which combines the Delaunay tetrahedral method with un-Delaunay tetrahedral method is described. The algorithm was developed by constructing Delaunay Tetrahedrons from a scattered point set, recovering boundaries using Delaunay and un-Delaunay method, inserting additional nodes in unsuitable tetrahedrons, optimizing tetrahedrons and smoothing the tetrahedral mesh with the 2D-3D Laplacian method. The algorithm has been applied to the injection molding CAE preprocessing.  相似文献   

19.
analysis on researching find wide The primary origin of algebraic numbers is the finite field Zp[i], which is derived from Gauss' on arithmetic of Z[i]. Primitive element theories application in cryptography. Some theon'es is discussed on how to determine numbering methods in. finite field primitive element and the Zp[i] generated by Gauss integral domain Z[i]. The research result will be of important value in secret communication.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号