Most video contents on the Internet are regularly watched online, but it is also necessary for users to download them to local storage for further processing. Currently, many online video websites provide their ow...
详细信息
Most video contents on the Internet are regularly watched online, but it is also necessary for users to download them to local storage for further processing. Currently, many online video websites provide their own service for website specific video retrieving;it is difficult to build an integrated web retrieving system adapted for all online video website due to different protocols. This paper presents an online video address discovery and retrieving system which supports multiple online video protocols and formats, parallel retrieving task scheduling;vast amounts of unstructured data and video file storage management, it is suitable for integration in high load, large scale enterprise applications to provide video retrieving service.
The mathematical models of electric field of the 300 kA aluminum electrolysis cells were calculated with ANSYS. The result revealed that the potential of the each part of the aluminum electrolysis cell was higher ...
详细信息
The mathematical models of electric field of the 300 kA aluminum electrolysis cells were calculated with ANSYS. The result revealed that the potential of the each part of the aluminum electrolysis cell was higher at the center and lower at the edge, decreasing from top to bottom. Molten aluminum was similar to equipotential areas, and the voltage drop of the electrolyte is largest. The current of the each parts of the aluminum electrolysis cell flowed from the middle to the both sides, from the top to the bottom. The X horizontal currents of the melt were anti-symmetric along the long axis (X axis), the Y horizontal currents of the melt were anti-symmetric along the short axis t (Y axis) . The voltage drop of the cell was measured and compared with the calculated results. The current efficiencies for the anode change patterns achieved in real cells were in excellent agreement with the model instability predictions. So the software ANSYS can well reflects actual status of the electric fields of the cells and can be used to design them.
A main drawback of OFDM systems is the high peak-toaverage Power Ratio (PAPR) which can result in significant distortion when transmitted through power amplifiers. The conventional peak cancellation method (cPCM) i...
详细信息
A main drawback of OFDM systems is the high peak-toaverage Power Ratio (PAPR) which can result in significant distortion when transmitted through power amplifiers. The conventional peak cancellation method (cPCM) is widely used in PAPR reduction, but for OFDM signals, the cPCM is of high complexity. In this paper, a simplified peak cancellation method (sPCM) is proposed for OFDM signals, which obtains a low computational complexity and equivalent performance in PAPR reduction.
Maximum power point tracking CMPPT) is the core technique in photovoltaic power generaton system to improve energy utilization. Major research direciotns of MPPT are focused on model pattern and input-output param...
详细信息
Maximum power point tracking CMPPT) is the core technique in photovoltaic power generaton system to improve energy utilization. Major research direciotns of MPPT are focused on model pattern and input-output paramerters pattern. This paper introduces the superiority and inferiority for MPPT in two kind of patterns. Morever, a new MPPT method in model pattern base on ant colony optimization algorithm(ACO) and an optimized fuzzy tracking method in input-output paramerters pattern are also proposed, which aer proved to tracking the maximum power point (MPP) effectively from experimental results. Finally, combined with advantages of the above tracking methods, a set of integral tracking strategy is put forward to accurately and timely track MPP under different conditions.
On Dec. 10, 2010, the NIST declares the fore five algorithms for SHA-3 competition : Keccak, Skein, JH, Grostl, BLAKE. In this paper, we introduce the five candidates. The news extension. of BLAKE uses the Mode of...
详细信息
On Dec. 10, 2010, the NIST declares the fore five algorithms for SHA-3 competition : Keccak, Skein, JH, Grostl, BLAKE. In this paper, we introduce the five candidates. The news extension. of BLAKE uses the Mode of LAKE. Grostl follows the design principles of *** uses the cycle structure of SPN. Keccak adopts the sealing sponge structure. SKEIN is a one-way function which is extended from the design of Threefish group password. After introducing and comparing the five candidates, we made a list of their respective characteristics.
An adaptive postfiltering algorithm for enhancing the quality of coded music is presented for the AVS-M decoder. The postfilter consists of a long-term postfilter in cascade with a short-term postfilter section an...
详细信息
An adaptive postfiltering algorithm for enhancing the quality of coded music is presented for the AVS-M decoder. The postfilter consists of a long-term postfilter in cascade with a short-term postfilter section and includes spectral tilt compensation and automatic gain control. The long-term module emphasizes periodic harmonics and attenuates the spectral valleys between periodic harmonics. We use the autocorrelations to indicate the degree of the harmonics and only when the harmonic degree beyond a given threshold the long-term module will be adopted. The short-term module, on the other hand, emphasizes music formats and attenuates the spectral valleys between formats. Unlike earlier postfilters which generally introduced a substantial amount of muffing to the output audio signal, our postfilter significantly reduces this effect by minimizing the spectral tilt in its frequency response. As a result, this postfilter achieves noticeable noise reduction while introducing only minimal distortion in the output music of AVS-M.
Using C++, we implement XFile loading based on DirectX, then generate three-dimensional mesh with the information of XFile and render it at last. And with further research on progressive mesh, we achieve controlli...
详细信息
Using C++, we implement XFile loading based on DirectX, then generate three-dimensional mesh with the information of XFile and render it at last. And with further research on progressive mesh, we achieve controlling the precision of the three dimensional mesh.
Digital predistortion, which is used to compensate for the nonlinearity introduced by power amplifiers, plays an important role in the linearization techniques. Saturation distortions caused by high peak-to-averag...
详细信息
Digital predistortion, which is used to compensate for the nonlinearity introduced by power amplifiers, plays an important role in the linearization techniques. Saturation distortions caused by high peak-to-average ratio of input signal, however, cannot be compensated through digital predistortion. As a result, power amplifiers have to operate with back-off and result in relatively low efficiency. In this paper, a new pulse cancellation method of crest factor reduction technique is proposed which can considerably increase power efficiency without power back-off by reducing the high peak-to-average ratio. Simulation results show that using PCM method of CFR prior to DPD can achieve not only a desirable linearization performance, but also a significant increase in power level.
An Attendance Management System (AMS) based on TCP/IP protocol is designed and realized. This paper expounds the principle of the RFID reader device in AMS, its hardware and software design. The reader device take...
详细信息
An Attendance Management System (AMS) based on TCP/IP protocol is designed and realized. This paper expounds the principle of the RFID reader device in AMS, its hardware and software design. The reader device takes ARM LM3S9B90 as the core and Philips's MFRC531 as the transceiver chip of RFID reader. In application, the system works stable and has good real-time performance.
This paper discusses how to use knowledge in machine learning, so that decision-making with knowledgebased machine learning can be obtained. Objectives, anti-objectives and it is support of decisions are formally d...
详细信息
This paper discusses how to use knowledge in machine learning, so that decision-making with knowledgebased machine learning can be obtained. Objectives, anti-objectives and it is support of decisions are formally defined;and the knowledge base, evidence base, sample base and qualified samples for decision problem are discussed in details. This paper discusses the uncertainty in the dicision problem with a method of how to use knowledge for measuring the supports of our objectives form knowledge in our hands. Three functions, namely: the initial evaluation function, sample evaluation function, making the evaluation function are proposed.
暂无评论