Cantilevered beams can serve as a basic model for a number of structures used in various fields of industry, such as airplane wings, turbine blades and robotic manipulator arms. In this paper, the active vibration con...
详细信息
In order to ensure the performance of new products, a performance testing system including the design principle, design of hydraulic system and establishment of the computer data acquisition and processing system is g...
详细信息
ISBN:
(纸本)9783037855034
In order to ensure the performance of new products, a performance testing system including the design principle, design of hydraulic system and establishment of the computer data acquisition and processing system is given, which can be used to simulate the actual working conditions of a variety of hydraulic components and also used for the loading test. According to application, it shows that the performance testing system can work as an effective approach for quality checking for the new produced hydraulic components before they were put into the market.
Precision predicting is a new methodology for precision verification and validation of product. Considering the dimension and geometric deviation of assembled part, the precision predicting model is built by assembly ...
详细信息
ISBN:
(纸本)9783037853252
Precision predicting is a new methodology for precision verification and validation of product. Considering the dimension and geometric deviation of assembled part, the precision predicting model is built by assembly deviation sources explaining and deviation propagation route modeling. The deviation source during assembly process is mainly explained by dimension torsor and deviation torsor that are built in common coordinate system, and the deviation propagation rout is modeled by weighted deviation graph. The weighted deviation graph contains vertexes that refer to functional geometry and mating geometry and edges that refer to dimension and geometric constraint;besides, the edge weight is calculated by tolerance evaluation along specific functional direction. In addition, the process of computer aided adaptive assembly method is introduced, and the proper index for assembly precision and accuracy is discussed.
application of Linear Programming for binary perceptron learning allows reaching theoretical maximum loading of the perceptron that had been predicted by E. Gardner. In the present paper the idea of learning using Lin...
详细信息
In this paper, we consider a space-time and amplify-and-forward(ST-AF) cooperative system which consists of two-antenna source, single-antenna relay and destination. Source transmits Alamouti space-time coding symbols...
详细信息
ISBN:
(纸本)9783037853740
In this paper, we consider a space-time and amplify-and-forward(ST-AF) cooperative system which consists of two-antenna source, single-antenna relay and destination. Source transmits Alamouti space-time coding symbols to destination with cooperation of relay which adopts AF strategy. Closed-form symbol error rate(SER) is derived for the ST-AF system with PSK signals. Moreover, an SER approximation are developed to show the asymptotic performance of the ST-AF cooperative system in medium and high SNR regimes. For comparison, the SER approximation of another cooperative space-time coding(C-STC) scheme is also derived. Theoretical analysis shows that the ST-AF can obtain more diversity gain and achieve higher diversity order than C-STC. Finally, computer simulations validate the theoretical analysis.
The proceedings contain 104 papers. The special focus in this conference is on Network Computing and Information Security. The topics include: on the isomorphism classes of elliptic curves with 2-torsion points;templa...
ISBN:
(纸本)9783642352102
The proceedings contain 104 papers. The special focus in this conference is on Network Computing and Information Security. The topics include: on the isomorphism classes of elliptic curves with 2-torsion points;template-based and second-order differential power analysis attacks on masking;design and implementation of Linux file mandatory access control;design andapplication of fine-grained access control model;intel SYSRET privilege escalation vulnerability analysis;analysis of cloud security and a reliable transmission based on UDP;a survey of passive image forensics;a novel fast ?-adapt slide window elliptic curve cryptography algorithm;application of neural network and cluster analysis in anomaly detection;clustering system call arguments for remote attestation;document selective protection based on third service framework;fine-grain trusted storage and transitivity policy for open network environment;a deep understanding of cloud computing security;study of layers construct for data mining platform based on cloud computing;cloud task and virtual machine allocation strategy in cloud computing environment;GIS application model based on cloud computing;development framework for cloud services;research on distributed file system with hadoop;optimization of green passive optical networks with minimum cost;primary educational resources classification study based on gagne learning classification theory;a special subject database in CALIS project;the design and implementation of automatic drug matching system;asymmetric encryption scheme based on fingerprint topological transformation;a kind of digital signature system based on linear computing;cryptanalysis and improvement of an efficient certificateless signature scheme;robust software watermarking scheme using RC4 and HASH;a novel digital watermarking method based on lifting wavelet transform;a new practical template attack of AES;multi-granule association rule mining based on quantitative concept lattice;brushless
Designing a low cost structured light system which can acquire 3D data in real time with great accuracy is still an ongoing topic among computer vision community as it is hard to achieve all these features together. A...
详细信息
ISBN:
(纸本)9780769548739
Designing a low cost structured light system which can acquire 3D data in real time with great accuracy is still an ongoing topic among computer vision community as it is hard to achieve all these features together. Among various structured light systems, pseudorandom array is the most suitable technique for real time 3D reconstruction as it tends to concentrate the entire coding scheme in a single pattern. But it has the difficulty of decoding the pattern when it loses few pattern symbols. In this paper, we address this problem by introducing an error correcting 3D scanning technique. This technique consists of a two way decoding method which can decode a dual pseudorandom array and a hole-filling algorithm. In the experimental results, we show that our 3D scanning technique largely improves the reconstruction compared to the conventional methods.
Low-Density Parity-Check(LDPC) codes are a class of channel codes based on matrix encoding and iterative decoding. It has low decoding complexity as well as capacity approaching performance. Until now, the best design...
详细信息
The feed water system is one of the most important system for nuclear power plant. Based on an analysis for the working principles of the AP1000 plant main feed water system, a novel fault Petri net model and fault di...
详细信息
ISBN:
(纸本)9783037855027
The feed water system is one of the most important system for nuclear power plant. Based on an analysis for the working principles of the AP1000 plant main feed water system, a novel fault Petri net model and fault diagnosis method are proposed. The main feed water flow low alarm is a serious fault for the feed water system, Petri net theory is adopted to establish the fault model for this fault signal. Through the consequence and account for this model, fault reasons and reasons probability for the main feed water flow low have been obtained. application shows that, the fault Petri net has more advantages than the fault tree in qualitative analysis and quantitative calculation. And this method is a new route for the nuclear plant systems' fault diagnosis.
Pervasive computing is the next thrust area for the researchers, service providers and end users alike but the challenges associated for them are equally grilling. Ad-hoc availability of resources makes it extremely i...
详细信息
暂无评论