The permanent magnet synchronous motor (PMSM) has some advantages such as big power density and reliability, and been widely used in vehicle driving and other industrial area. The space vector pulse width modulation (...
详细信息
The permanent magnet synchronous motor (PMSM) has some advantages such as big power density and reliability, and been widely used in vehicle driving and other industrial area. The space vector pulse width modulation (SVPWM) is the main technology in PMSM driving control. The motor information contains rotor magnet field position, motor speed, and stator current and so on. Speed and reliability of its transmission is not only the base of SVPWM calculation in the control system, but also the guarantee for users to adjust the motor control command in time. The research on choice and design for PMSM driving system data transmission and communication bus is important.
Risk analysis and assessment is essentially a synthesis and amalgamation of the empirical and normative,the quantitative and qualitative,and the objective and subjective *** order to deal with quantitative and qualita...
详细信息
Risk analysis and assessment is essentially a synthesis and amalgamation of the empirical and normative,the quantitative and qualitative,and the objective and subjective *** order to deal with quantitative and qualitative data,empirical and subjective knowledge,and incomplete,ignorant,fuzzy,vague information in risk analysis and assessment,a novel risk analysis method is proposed in this paper,which refers to evidential risk *** proposed method represents risk by the fuzzy belief structure,aggregates the multiple decision maker opinions using the evidential reasoning approach,and makes risk decision support using belief *** evidential risk analysis process and algorithm is illuminated step by ***,a case study of bridge risk assessment is explored to show validity and applicability of the proposed method.
Two pairs of operators are defined in degree induced covering rough set and their properties are *** them,two pairs of inequalities well known in the degree induced covering rough set theory can now be modified to bec...
详细信息
Two pairs of operators are defined in degree induced covering rough set and their properties are *** them,two pairs of inequalities well known in the degree induced covering rough set theory can now be modified to become equalities respectively.
This paper proposed a Multi-Agent simulation framework for such organizations in order to analyze how organization behavior impacts the project *** on information processing view of organizations,the paper grouped the...
详细信息
This paper proposed a Multi-Agent simulation framework for such organizations in order to analyze how organization behavior impacts the project *** on information processing view of organizations,the paper grouped the interdependent activities among the different sub-teams or actors in organization and explicitly models these *** a Multi-Agent simulation framework was established for mapping from the real organization into the simulated *** elements of the model were agents,which could perform interdependent activities,and they were organized as Multi-Agent framework through information *** information processing selection-mechanism and operation-mechanism were developed to simulate those organizations by the Multi-Agent *** Multi-Agent simulation framework has been tested internally,and evaluated externally.
In-depth analysis and research are made on the aspects of overall objective of system construction, system framework design, database construction and acquisition, system function realization and establishment of fore...
详细信息
In-depth analysis and research are made on the aspects of overall objective of system construction, system framework design, database construction and acquisition, system function realization and establishment of foreign service network based on systems engineering, information engineering technology, applied mathematics and theories and methods for safety prediction and assessment. At the same time, the overall goal of system construction is put forward, the overall building framework of system development is structured, the classification and composition of the database contents are given, further more, targeting to system management, database construction, safety evaluation, safety measures and establishment of foreign service network, a specific analysis is given to the realization of system functions, and the operation safety assessment of highway tunnel and the management system's function design and development thinking are forwarded.
In recent years, efficiency plays more and more important role in the work, improve enterprises39; information entry efficiency has become a problem in front of the enterprise. Aiming at the process of enterprise do...
详细信息
In recent years, efficiency plays more and more important role in the work, improve enterprises' information entry efficiency has become a problem in front of the enterprise. Aiming at the process of enterprise downtime equipment information entry, this paper gives a detailed intruduction of the structure and fuction of the Fast Entry System for Equipment Downtime information, as well as designing the comprehensive downtime information to improve the efficiency of entring. On the basis of enterprise needs, the system based *** MVC framework was designed and built on the visual studio 2010 development platform with SQL server 2008 express database in this paper. We describe the overall design of the system model, and explain how to use MVC framework in the system. This system has improved the entering process specification, correctness and efficiency greatly. That is to say, the system, having been put into practice in a manufacturing company in Shan Dong province, saves time and labor to a great extent.
Criterion for choosing chaos map to drive image bit permutation based on chaos permutation information entropy is proposed. An algorithm for image bit permutation is designed based on the fact that the output trajecto...
详细信息
Criterion for choosing chaos map to drive image bit permutation based on chaos permutation information entropy is proposed. An algorithm for image bit permutation is designed based on the fact that the output trajectory of chaotic system is very unpredictable. Image smallest granularity scrambling, namely, bit space maximum scrambling is implemented by applying the chaos that has been selected. Image substitution algorithm according to the principle of chaos map stretch and fold is designed to finish image encryption transformation to enhance the ability to resist attack. The algorithm's key space and resistance to differential attack, and the digital characteristics of cipher-image have been analyzed. Theoretical analyses and computer simulations both confirmed that the proposed algorithm is better than Ye's and Huang's algorithms in the ability of scrambling, decorrelation and anti-differential attack, can protect digital image effectively.
Malicious code has been generally accepted as one of the top security threats to computerinformation systems around the world for several years. Malicious code is changing more rapidly;it has become modular in design...
详细信息
Malicious code has been generally accepted as one of the top security threats to computerinformation systems around the world for several years. Malicious code is changing more rapidly;it has become modular in design and propagates using new and novel methods. The roorkit techniques that malicious code uses to hide itself in the operating system kernel make the traditional antivirus difficult to extract its signature,not to mention detect it. Inspired by the biological immune system,we proposed a novel immune-inspired method for malicious code extraction and detection---IMCD. The IMCD extracts the I/O Request Packets (IRPs) sequence produced by the process running in kernel mode as antigen,defines the normal benign programs as self programs,and defines the malicious codes as nonself programs. By the process behavior monitoring and the family gene analysis,the method can monitor the evolution of malicious code. The method generates the immature antibodies by vaccination,produces mature antibodies by clonal selection and gene evolution,and then learns and evolutionary identifies the unknown malicious codes by the mature antibodies. Theoretical analysis and experiments show that the proposed method for unknown malicious code detection has high detection rate,low false-positive rate,and low omission rate.
We investigate a new method for customer-product matrix dimensionality reduction that is applicable to collaborative filtering systems. The method-referred to as Randomized Singular Value Decomposition (RSVD)-is a com...
详细信息
We investigate a new method for customer-product matrix dimensionality reduction that is applicable to collaborative filtering systems. The method-referred to as Randomized Singular Value Decomposition (RSVD)-is a combination of RI-based pre-processing and SVD-based vector space optimization. In contrast to the random indexing algorithms presented in the literature, such as RI and RRI, RSVD may be used to provide results arbitrarily similar to these obtained when using SVD. RSVD has been compared experimentally to SVD and to the two most widely-referenced RI methods-the basic RI and RRI. It has been shown that RSVD improves both the recommendation accuracy and computational complexity.
In this paper, a multi-objective DE algorithm based on escalating strategy will be proposed. The main idea of this escalating strategy is to re-generate the whole evolutionary population with some technology, which re...
详细信息
In this paper, a multi-objective DE algorithm based on escalating strategy will be proposed. The main idea of this escalating strategy is to re-generate the whole evolutionary population with some technology, which results in a new population significantly indifferent from the old one while inheriting the evolutionary information from the history. By this way, the performance on global convergence can be enhanced, and premature can be avoided simultaneously. A neighborhood search procedure is imposed on some selected Pareto solutions to accelerate the evolution process for reaching a global Pareto set with well distribution. Some typical multi-objective optimization test problems are taken to solve with escalation DE and non-escalation DE respectively to verify the effectiveness of the new algorithm. The details about how to select appropriate escalating parameters and their effect on the performance of EMDE are also investigated to show that the EMDE with random flexible factor has some advantage over than that of fixed flexible factor.
暂无评论