Experimental vegetable production is greatly influenced by many environmental factorsThere is urgent need to supervise its air temperature and humidity, soil temperature and humidity in the facilities information such...
详细信息
ISBN:
(纸本)9783319483535
Experimental vegetable production is greatly influenced by many environmental factorsThere is urgent need to supervise its air temperature and humidity, soil temperature and humidity in the facilities information such as realtime monitoring, and timely early warning and control, in case of irreparable damageThis paper adopts the IOT technology to design and develop mobile client system which is used to make warnings and protect vegetables in order to realize real-time monitoring in the process of vegetable production in the aspects of timely warning of environmental information and control.
A class of autonomous underwater vehicle(AUV) heading control problem is addressed in this paper based on Mamdani Fuzzy Inference(MFI). Firstly, empirical knowledge of heading control for ship from experienced captain...
详细信息
ISBN:
(纸本)9781510806481
A class of autonomous underwater vehicle(AUV) heading control problem is addressed in this paper based on Mamdani Fuzzy Inference(MFI). Firstly, empirical knowledge of heading control for ship from experienced captain is fuzzed into fuzzy control rules, which can be identified by computer, using fuzzy set theory. Secondly, output of the controller is derived by calculating the excitation of system input to the control rules, combing with the application of multi-input-multi-rule MFI. Thirdly, robust adaptive heading controller for AUV is designed incorporating the distributing characteristics of Gaussian membership function, in order to overcome randomness and uncertainty of the external environment disturbances on AUV. At last, simulation experiment is carried out to verify the effectiveness and superiority of the controller designed.
Data provenance is the basic metadata for process analysis in process aware system and plays an important role in collaboration design process for process auditing and process improvement,but data collaboration and it...
详细信息
Data provenance is the basic metadata for process analysis in process aware system and plays an important role in collaboration design process for process auditing and process improvement,but data collaboration and iterative processin theexecutionof collaboration design process impede the integrity of provenance tracking based on data *** paper proposes a collaborative design provenance model based on OPM,which can support provenance tracking in the execution of multiple related collaboration design *** this model,it descripts the basic characteristic of the execution of collaboration design process,supports the description of iterative process by execution path expansion,and supports the descriptions of different data collaboration patternsbetween different design *** on this model,we finally provide the global data provenance directed graph by the mechanism of data provenance sharing and combination that can insure the integrity of provenance tracking of collaboration design process.
Quality of service (QoS) is an essential aspect of any large storage system. In cloud computing, all tenants’ data and software are stored in the clouds and therefore the data access control and QoS assurance is the ...
详细信息
Detecting and forecasting civil unrest events (protests, strikes, etc.) is of key interest to social scientists and policy makers because these events can lead to significant societal and cultural changes. We analyze ...
详细信息
Detecting and forecasting civil unrest events (protests, strikes, etc.) is of key interest to social scientists and policy makers because these events can lead to significant societal and cultural changes. We analyze protest dynamics in six countries of Latin America on a daily level, from November 2012 through August 2014, using multiple data sources that capture social, political and economic contexts within which civil unrest occurs. We use logistic regression models with Lasso to select a sparse feature set from our diverse datasets, in order to predict the probability of occurrence of civil unrest events in these countries. The models contain predictors extracted from social media sites (Twitter and blogs) and news sources, in addition to volume of requests to Tor, a widely-used anonymity network. Two political event databases and country-specific exchange rates are also used. Our forecasting models are evaluated using a Gold Standard Report (GSR), which is compiled by an independent group of social scientists and experts on Latin America. The experimental results, measured by F1-scores, are in the range 0.68 to 0.95, and demonstrate the efficacy of using a multi-source approach for predicting civil unrest. Case studies illustrate the insights into unrest events that are obtained with our methods.
Unidirectional proportional pump-controlled asymmetric cylinder systems are widely used on industry machines,but the analysis and synthesis of such systems is very hard due to the nonlinearity caused by the different ...
详细信息
Unidirectional proportional pump-controlled asymmetric cylinder systems are widely used on industry machines,but the analysis and synthesis of such systems is very hard due to the nonlinearity caused by the different working areas of cylinder piston. The one-way flow control ability of the unidirectional proportional pump makes the problem more complex. To realize the nonovershooting position control and simplify the system analysis and synthesis, this paper presented a third order mathematic model to depict the dynamic behavior of the unidirectional proportional pump-controlled asymmetric cylinder. A specially designed proportional controller is used to guarantee that the step response of the system is nonovershooting, and that the system performance can be analyzed with the classic linear control theory. Based on the condition of stability, the index of stable error and the condition of the third order system ' s nonovershooting step response, a numerical algorithm for nonovershooting proportional gain determining is given. The experiments are carried out, and the results show that the proposed method is valid.
Equipment includes planter, field management equipment and harvester for controlled traffic farming system is elaborated in the paper. And the analysis results shows that main problems of equipment for controlled traf...
详细信息
ISBN:
(纸本)9783319483566
Equipment includes planter, field management equipment and harvester for controlled traffic farming system is elaborated in the paper. And the analysis results shows that main problems of equipment for controlled traffic farming system contains poor ability to navigate, uneven and bent wheel *** solve the problem, the thought that precision agriculture is introduced into equipment for controlled traffic farming system is put forward. For this purpose,the key technology of precision agriculture is introduced, and the feasibility of combination of precision agriculture and controlled traffic farming system is discussed, which provides theoretical support for the development of equipment for controlled traffic farming system.
service Network (SN) is a feasible approach to deal with mass personalized customer requirements in a cost-effective way. The SN philosophy has been widely applied in various service domains, such as e-Business, onlin...
详细信息
ISBN:
(纸本)9781479943326
service Network (SN) is a feasible approach to deal with mass personalized customer requirements in a cost-effective way. The SN philosophy has been widely applied in various service domains, such as e-Business, online travel services, bioinformatics, etc. Being a persistent service infrastructure, SN requires a run-time environment which enables its deployment, customization and execution. This paper shows an architecture design for such kind of environment. The conceptual model of SN is firstly introduced, and then the high-level system architecture is put forward, including a deployment engine (SDE), a customization engine (SCE), an execution engine (SEE), and a set of repositories storing necessary data during the lifecycle of an SN. Particularly, three mechanisms facilitating the execution of a customized SN are proposed, i.e., BPEL-based, Rule-based and Event-based ones, and a brief comparison between them is conducted. The proposed architecture enables the deployment and execution of SN across boundaries of different clouds where the constituent services of the SN are deployed and executed.
Ubiquitous environments present a dynamic network topology which implies frequent context changes which can affect the availability of the services deployed in the system. In order to obtain the full potential that th...
详细信息
In this paper we study the question of centralisation in bitcoin digital currency. In theory bitcoin has been designed to be a totally decentralized distributed system. Satoshi Nakamoto has very clearly postulated tha...
详细信息
In this paper we study the question of centralisation in bitcoin digital currency. In theory bitcoin has been designed to be a totally decentralized distributed system. Satoshi Nakamoto has very clearly postulated that each node should be collecting recent transactions and trying to create new blocks (Satoshi08). In bitcoin transactions are aggregated in block in order to authenticate them and form an official ledger and history of bitcoin transactions. In practice as soon as expensive ASIC bitcoin miners have replaced general-purpose hardware, production of bitcoins and the validation of transactions has concentrated in the hands of a smaller group of people. Then at some moment in early 2012 an important decision was taken: the Stratum protocol was designed (Palatinus12) which took a deliberate decision to move the power of selecting which transactions are included in blocks from miners to pool managers. The growing difficulty of mining and large standard deviation in this process (Rosenfeld13; CourtoisBahack14) made that majority of miners naturally shifted to pooled mining. At this moment bitcoin ceased being a decentralized democratic system. In this paper we survey the question of a 51% attacks and show that there is a large variety of plausible attack scenarios. In particular we study one particularly subversive attack scenario which depends on non-trivial internal details of the bitcoin hashing process. How does it compare with the current mining practices? We have study the Stratum protocol in four popular real-life mining configurations. Our analysis shows that pools could very easily cheat the majority of people. However the most subversive versions of the attack are NOT facilitated and could potentially be detected.
暂无评论