In consideration of highway passenger transportation system is a Grey system of incomplete information;this paper constructs a Grey model and a cubicexponential-smoothing model at first. In order to avoid the shortcom...
详细信息
In consideration of highway passenger transportation system is a Grey system of incomplete information;this paper constructs a Grey model and a cubicexponential-smoothing model at first. In order to avoid the shortcomings of a single model, it constructs a cubicexponential-smoothing combination model based on Grey system theory by using the optimal weighted principle. Compared with the single model, the prediction accuracy of the cubic-exponential-smoothing combination model is higher, and the predicted results are much more reliable. So it is better suitable for highway passenger traffic volume prediction. At last, this paper gives the prediction of the National highway passenger traffic volume in the first five months of 2014.
Artificial neural network(ANN)-based inverse reconstruction method is introduced to determine the optical properties of turbid *** demonstrated the use of neural network trained with data generated by experiments with...
详细信息
Artificial neural network(ANN)-based inverse reconstruction method is introduced to determine the optical properties of turbid *** demonstrated the use of neural network trained with data generated by experiments with tissue phantoms to derive the optical properties from spatially resolved diffuse reflectance measurements The results reconstructed by the back-propagation neural network(BPNN) and the Radial Basis Function Neural Network(RBFNN) were *** was found that the method of BPNN was more suitable to obtain the optical *** experimental system which incorporated a laser source and a CCD camera was used to measure the spatially resolved steady-state diffuse reflectance of biological tissue at *** optical properties of biological tissue were reconstructed by the BPNN which was trained by experimental *** was found that our results were in good agreement with their reference values.
It is necessary to acquire the relationship between the turbine power output and condenser pressure under the certain steam load since the condenser pressure has a great influence on the turbine power *** paper first ...
详细信息
It is necessary to acquire the relationship between the turbine power output and condenser pressure under the certain steam load since the condenser pressure has a great influence on the turbine power *** paper first analyzes the varying parameters of the regenerative extraction cycle system caused by condenser pressure adjustment,and then sets up their calculating models through mechanism analysis and formula *** this basis,this paper attains the change of turbine power output caused by condenser pressure adjustment through the power expression.
Because the traditional virtual machine deployment algorithm is usually a schedule task order according to CPU usage, and without considering the physical machine's own task scheduling mechanism. This mechanism ca...
详细信息
ISBN:
(纸本)9781784660543
Because the traditional virtual machine deployment algorithm is usually a schedule task order according to CPU usage, and without considering the physical machine's own task scheduling mechanism. This mechanism caused the physical machine's load imbalance phenomenon. The mission of the virtual machine cannot be effectively completed within the shortest time at the same time. This paper proposes a task scheduling method based on an online algorithm to solve this problem. This algorithm is mainly based on a greedy strategy, using the online algorithm, jump tables based on the Sherwood algorithm and task schedule algorithm. The mechanism considers the characteristics of the task, which will be divided into four types of tasks. It achieves matching task properties and physical machines to improve deployment efficiency. Experiments proved the feasibility and effectiveness of the algorithm. Compared with traditional algorithms, this task scheduling mechanism not only meets the needs of users but also improves the performance of the system.
In this paper, a Hadoop-based cloud storage system is designed for massive visual images, which serves for disaster monitoring and early-warning. The system receives massive visual images from cameras, and then analyz...
详细信息
ISBN:
(纸本)9781784660468
In this paper, a Hadoop-based cloud storage system is designed for massive visual images, which serves for disaster monitoring and early-warning. The system receives massive visual images from cameras, and then analyzes the images to detect whether disasters happen by image processing algorithms. However, as time goes on, the traditional server model has been difficult to meet the demand of increasing visual images;therefore a Hadoop-based cloud storage system is designed. This paper mainly discusses the overall architecture of the cloud storage system and how to store and manage the massive visual images in Hadoop distributed file system(HDFS). And a solution is given to solve the problems how to store small image files in HDFS, and how to design the database in Hadoop database(HBase). Finally, experiments are conducted to compare the query performance between the HBase and the traditional relational database management system microsoft SQL server.
The issue on the security of production in coal mine is not only associated to the outlook of the industry,but also an important task in the construction of the harmonious *** this paper,we firstly analyzed the govern...
详细信息
ISBN:
(纸本)9781138026445
The issue on the security of production in coal mine is not only associated to the outlook of the industry,but also an important task in the construction of the harmonious *** this paper,we firstly analyzed the government's function in the insurance of the security of production in coal mine,then we analyzed the government's game action in the risk compensation of the safe production of coal mine with utility theory and game theory,discussed the insurance model of the coal mine production security under three different conditions that government subsidizes insurance company,the miner owner and simultaneously for insurance company and the miner owner and put forward the risk prevention strategy that insurance participate in main part in coal mine production security.
The phase structure and electrochemical properties of LaMgNiM(M=Ni,Co,Mn) alloys were investigated in *** XRD analysis revealed that the main phases in the alloys are LaNiand LaMgNi phases(CeCo+PrCo structure).When ...
详细信息
The phase structure and electrochemical properties of LaMgNiM(M=Ni,Co,Mn) alloys were investigated in *** XRD analysis revealed that the main phases in the alloys are LaNiand LaMgNi phases(CeCo+PrCo structure).When the Ni element in the alloy was substituted by Mn or Co,the abundant of LaMgNi phase increased,and especially in the LaMgNiMn alloy,that increased to 70.7%.The electrochemical measurement showed that the activation of LaMgNi7)M(M=Ni,Co,Mn) alloy electrodes were improved,and it only needed 1-2 ***'s more,with the elements substitution for Ni,the maximum discharge capacity gradually increased to386.10 mA·h/g(Co) and 375.18 mAh/g(Mn),but high-rate dischargeability(HRD) decreased somewhat(Co,HRD=86.2%).It is found that the HRD was mainly controlled by the electrocatalytic activity on the alloy electrode surface,and the decline of cyclic stability was due to the appearance of AB type phase with larger hydrogen storage capacity,which lead to bigger volume expansion or intercrystalline stress,then easier pulverization during charging/*** addition,the cyclic stability(S100) was improved with Co substitution,and worsened with Mn substitution,because Mn element was easily corroded and Co improved the ability of Corrosion resistance.
Radio frequency identification(RFID) technology is expected to play an important role for object identification as a ubiquitous infrastructure and will be widely used in the area of "Internet of Things"How...
详细信息
Radio frequency identification(RFID) technology is expected to play an important role for object identification as a ubiquitous infrastructure and will be widely used in the area of "Internet of Things"However, low-cost RFID tags are highly computational and resource limitedTo solve the security and privacy of such tags, traditional cryptographic algorithms such as hash functions can not be usedIn this paper, we present a light-weight and synchronization-based communication protocol for RFID devicesWe focus on the ISO 18000-6C RFID tag which supports only simple cryptographic primitives like Pseudo-random Number Generator and Cyclic Redundancy Code(CRC)Our protocol is secure in sense that it prevents cloned tags and malicious readers from abusing legitimate tagsCompared with other methods from security and performance analysis, the provided scheme is efficient and light-weight.(Abstract)
Complex problems in various disciplines like biology, medicine, humanities, management studies and so on gives various research dimensions in soft computing. Risk classification is one of the thrust area in the field ...
详细信息
Complex problems in various disciplines like biology, medicine, humanities, management studies and so on gives various research dimensions in soft computing. Risk classification is one of the thrust area in the field of medicine. This research work aims in risk classification of coronary artery heart disease in female diabetic patients using fuzzy logic. Fuzzy logic which is a component of soft computing is used for classification. Female patients those are having diabetes mellitus (DM) have a high occurrence of coronary artery heart disease (CAHD), since diabetes is implicated in the formation of atherosclerotic plaque. The input parameters are plasma glucose concentration, diastolic blood pressure, body mass index and age are taken as input parameters for designing Mamdani type fuzzy inference system. 25 numbers of rules are given for the risk prediction. The risk of CAHD is predicted as low, intermediate and high. The implementation is carried out through MATLAB 2012a. The PIMA women diabetes dataset is taken for simulation. The performance of the proposed risk classifier is measured in terms of classification accuracy, sensitivity and specificity. Also the outputs are demonstrated by rule viewer and surface viewer.
Prior studies show that active-motion early after a fracture surgery can effectively reduce the tissue ***,due to the postoperative pain and unawareness of the postoperative limitations,a patient prefers to take medic...
详细信息
Prior studies show that active-motion early after a fracture surgery can effectively reduce the tissue ***,due to the postoperative pain and unawareness of the postoperative limitations,a patient prefers to take medication to alleviate pain while complicated rehabilitation exercises can only be implemented under the limited intervention of a therapist,resulting in the patient's lack of interactive feedback on a daily basis and a failure of self-motions to miss the timing of *** study is intended to develop a lower limb fracture postoperative-guided interactive rehabilitation training system for the hip,knee and ankle joints,and establish a method of motion analysis and a method of motion performance assessment in conjunction with the wireless sensor technology and animation techniques,providing an objective assessment from the caregiver and learning the patient's rehabilitation status with a simple and easy recording ***,with the design of interactive feedback,the improved postoperative rehabilitations are tried to increase the participant's interest in self-management of health and facilitate to keep tracking the rehabilitation *** medical evidences show that a guided rehabilitation system can enhance the patient's motive and willingness to be committed to a rehabilitation training as well as increase Quality and Amount of the exercise activity during the training process.
暂无评论