The sub-module voltage sharing of modular multi-level converters is beneficial to reducing switching losses and eliminating DC side circulations, which has attracted the attention of experts and scholars at home and a...
详细信息
The sub-module voltage sharing of modular multi-level converters is beneficial to reducing switching losses and eliminating DC side circulations, which has attracted the attention of experts and scholars at home and abroad. Based on the quick selection sorting algorithm, this paper studies the grouping sorting of Modular Multilevel Converter (MMC). Firstly, on the basis of quick selection sort, an improved selection sort is designed to optimize the time complexity. Secondly, simulation experiments are carried out on SIMULINK to demonstrate the feasibility of improving quick selection sort algorithm and the principle grouping double voltage limit.
In order to solve problem of huge manpower demand in the construction industry and heavy drawing work, a construction primitive extraction system was designed. This system relieved pressure of the artificial building ...
详细信息
In order to solve problem of huge manpower demand in the construction industry and heavy drawing work, a construction primitive extraction system was designed. This system relieved pressure of the artificial building review and improved the reviewing efficiency of the reviewing experts. The system uses a Convolutional Neural Network (CNN) to extract drawing primitives using the Visual Geometry Group (VGG) network training model. Principal component analysis algorithm improves feature comparison efficiency by reducing the dimension of the matrix. Experiments show that the practicability of the system can meet the requirements of general construction primitive extraction.
Scheduling algorithm is an important step in cloud computing, which determines the effectiveness of the system. Focus on the business requirement of mimic common operating environment (MCOE), especially the incomplete...
详细信息
Scheduling algorithm is an important step in cloud computing, which determines the effectiveness of the system. Focus on the business requirement of mimic common operating environment (MCOE), especially the incomplete consideration of load balancing and heterogeneous in traditional scheduling algorithms, this paper presents an entropy weight clustering scheduling (EWCS) algorithm, which combines the dynamic heterogeneous redundancy (DHR) architecture of mimetic defense theory and K-Means clustering of machine learning to complete the nodes selection on the cloud platform. This algorithm consists of four steps: risk value screening, load balancing, entropy weight calculation and clustering optimization. The simulation results show that the algorithm is reasonable and can serve MCOE well. It is also an effective attempt to apply machine learning method to scheduling problem.
Attracted by low-cost and high-quality service of cloud computing, more and more organizations and users outsource their data into the cloud server. In order to protect data privacy, the sensitive data has to be encry...
详细信息
Attracted by low-cost and high-quality service of cloud computing, more and more organizations and users outsource their data into the cloud server. In order to protect data privacy, the sensitive data has to be encrypted which brings great challenges to effective data utilization. In this paper, we describe our schemes for the problem of searching on encrypted data based on Bloom Filter. The proposed schemes have a number of crucial advantages: The untrusted server cannot learn anything about the plaintext when only given the ciphertext in our solution. The schemes provide query isolation for searches, meaning that the untrusted server cannot learn anything more about the plaintext than the search result. The proposed scheme not only enhances system usability, but also reduces computation in user side.
This paper aims at the problem of dynamic target path planning for vehicles in urban. Firstly,design an urban real-time dynamic path planning model(UR-MODE) based on the Storm framework; then, proposes an improved par...
详细信息
This paper aims at the problem of dynamic target path planning for vehicles in urban. Firstly,design an urban real-time dynamic path planning model(UR-MODE) based on the Storm framework; then, proposes an improved particle swarm optimization algorithm(Adaptive Partner- particle swarm optimization,AP-PSO) which introduce the adaptive inertia weight and small scale perturbation strategy to ensure the efficiency of our proposed model. Finally,we implement the improved algorithm on the Storm real-time processing system and realize the mass real-time traffic data processing. Compared with the existing path planning algorithms, the experiment proves that the UR-MODE based method can reduce the travel time by 15%-20% on average and increase the traffic resource utilization by 50%.It proves the efficiency of the method.
This paper discusses about the advantage of using asynchronous simulation in the case of interactive simulation in which user can steer and control parameters during a simulation in progress. Asynchronous models allow...
详细信息
This paper discusses about the advantage of using asynchronous simulation in the case of interactive simulation in which user can steer and control parameters during a simulation in progress. Asynchronous models allow to compute each iteration faster to address the issues of performance needed in an highly interactive context, and our hypothesis is that get partial results faster is better than getting synchronized and final results to take a decision, in a interactive simulation context.
Illegal drug use is a long lasting problem on a global scale. Effective control of the use and spread of drugs is significant to prevent the current drug crisis from spreading wildly. To study the characteristics of r...
详细信息
Illegal drug use is a long lasting problem on a global scale. Effective control of the use and spread of drugs is significant to prevent the current drug crisis from spreading wildly. To study the characteristics of recent drug cases and predict the future condition, we established a hazard assessment model (HAM) based on Markov chain theory that links drug cases in different regions to get their interaction, and used the fuzzy comprehensive evaluation method to establish a crisis prediction model (CPM), using three parameters that are the most critical to the development of drugs as the influencing factors.
Many applications spend a large proportion of the execution time to access files. To narrow the increasing gap between computing and I/O performance, several optimization techniques were adopted, such as data prefetch...
详细信息
Many applications spend a large proportion of the execution time to access files. To narrow the increasing gap between computing and I/O performance, several optimization techniques were adopted, such as data prefetching and data layout optimization. However, the effectiveness of these optimization processes heavily depends on the understanding of the I/O behavior. Traditionally, spatial locality and temporal locality are mainly considered for data prefetching and scheduling policy. Whereas for most real-world workloads, the file access pattern is hard to capture. For the goal of deeply and intelligently understanding the I/O access pattern of modern applications, and efficiently optimizing the performance of current file systems, we propose a new mechanism to embed file names to vectors and train a gated recurrent neural network to provide policies for file prefetching and cache replacing.
Search and rescue of maritime distress personnel is a frontier topic of world research. Aiming at the problem of search and rescue for traditional maritime distress personnel, a mathematical model of search and rescue...
详细信息
Search and rescue of maritime distress personnel is a frontier topic of world research. Aiming at the problem of search and rescue for traditional maritime distress personnel, a mathematical model of search and rescue for maritime distress personnel is proposed, which can be carried on unmanned aerial vehicles. A search and rescue system for maritime distress personnel is established by using YOLO (you only look once) real-time target detection algorithm. The system can send UAV(Unmanned Aerial Vehicle) with high-definition camera equipment to search for people in distress after the ship sends out distress and abandoned ship rescue signal, and make a further decision on the image information returned by UAV and YOLO algorithm. The experimental results and feasibility analysis show that the system can process the video image information returned by UAV better, and the information can be used for the decision-making of rescue personnel.
Cloud computing is considered as an on-demand delivery of services in which applications and infrastructure are allocated to users as metered services over networks. Cloud computing services are much cheaper as the us...
详细信息
ISBN:
(数字)9781728163871
ISBN:
(纸本)9781728163888
Cloud computing is considered as an on-demand delivery of services in which applications and infrastructure are allocated to users as metered services over networks. Cloud computing services are much cheaper as the user does not have to setup any computing hardware support. It is an emerging technology that deliver computing services such as online businessapplications and data storage over the Internet. Implementing cloud enables a distributed working environment, where it reduces expenditure of the organization, provides data, information security and so on. As many organizations are adopting cloud computing, attackers exploit the cloud to obtain unauthorized control on the valuable data stored in it. Evolution of traditional computing to cloud has led to many security challenges for both customers and service providers. Different types of services are provided by trusted cloud providers over the Internet by using many technologies, which arises different security threats. This paper discusses about the cloud security issues, threats and related attacks.
暂无评论