A measurement technique about coordinate of space points based on digital close range photogrammetry was investigated. Two kinds of reference points were placed on the object surface to determinate their spatial posit...
详细信息
A measurement technique about coordinate of space points based on digital close range photogrammetry was investigated. Two kinds of reference points were placed on the object surface to determinate their spatial position by identifying and detecting. Several key techniques, including code and decode, calibration of the camera, camera orientating technique, high precise image processing algorithm were also studied. The precision of the algorithm was tested and a sample was provided. The result indicated that the testing scope is enlarged and the demand for the measurement of 3D object, especially of the big object is satisfied.
Geometric constraint problem can be transformed to an optimization problem which the objective function and constraints are non-convex functions. In this paper an evolutionary algorithm based on ant colony optimizatio...
详细信息
Geometric constraint problem can be transformed to an optimization problem which the objective function and constraints are non-convex functions. In this paper an evolutionary algorithm based on ant colony optimization algorithm and the immune system model is proposed to provide solution to the geometric constraints problem. In the new algorithm, affinity calculation process and pheromone trail lying is embedded to maintain diversity and carry out the global search and the local search in many directions rather than one direction around the same individual simultaneously. This new algorithm different with current optimization methods in that it gets the good solution by excluding bad solutions. The experimental results reported here will shed more light into how affects the hybrid algorithm's search power in solving geometric constraint problem.
Internet is a complex network with the characteristic of self-organized criticality. The cascading dynamics of Internet are presented and two reasons are pointed out, which may cause cascading failures. Different from...
详细信息
Internet is a complex network with the characteristic of self-organized criticality. The cascading dynamics of Internet are presented and two reasons are pointed out, which may cause cascading failures. Different from betweenness centrality, a congestion function to represent the extent of congestion is proposed. By introducing the concept of "delay time", the correlation between permanent removing and non-removing is built. And a new evaluation function of network efficiency based on congestion function is given in order to measure the damage of cascading failures. Moreover some effects of network structure and size, delay time on congestion propagation are also investigated, and cascading process composed of three phases and some factors affecting cascade propagation are uncovered.
A framework of hiberarchy trusted network basedon the grade division was put forward,and thepartition rules of trusted attributes as well as themethods of grade division were explained in ***,the potential application...
详细信息
A framework of hiberarchy trusted network basedon the grade division was put forward,and thepartition rules of trusted attributes as well as themethods of grade division were explained in ***,the potential applications of this frameworkin trusted network were discussed,and the accessprocedure of terminals in hiberarchy trusted networkwas given based on the existing research *** show that by the proposed framework,notonly the safety and reliability of network can beensured,but also the flexibility of ways to accessnetwork is strengthened,and that the framework canprovide supports for interoperability of differentequipment suppliers.
Military task programming is an important foundation in military warfare simulations. Presently, scenarios in joint military warfare are built not so good to meet the requirement of aggregate-level warfare simulations...
详细信息
Military task programming is an important foundation in military warfare simulations. Presently, scenarios in joint military warfare are built not so good to meet the requirement of aggregate-level warfare simulations and the requirement of intelligent decision in real time simulations. A method based on FSM model of aggregate-level military warfare decision-making and vehicle-level action decision-making is proposed in this paper. The programming process of joint military warfare with decision-making functions can be realized through the programming of these two levels, and the dynamic decision-making and execution of mission can be completed successfully.
This paper demonstrates the necessity of the use of PSC-CEA for dynamic policy triggering in the process of mobile IP switching; in the mean time, according to the characteristics of policy based network management, p...
详细信息
This paper demonstrates the necessity of the use of PSC-CEA for dynamic policy triggering in the process of mobile IP switching; in the mean time, according to the characteristics of policy based network management, propose a dynamic policy trigger model, and designs a mechanism which is used to update dynamic policy according to known information, experience and knowledge to satisfy the QoS of mobile services and use current network resource sufficiently.
In the paper, for many-objective optimization problems, the authors pointed out that the Pareto Optimality is unfair, unreasonable and imperfect for Many-objective Optimization Problems (MOPs) underlying the hypothesi...
详细信息
In the paper, for many-objective optimization problems, the authors pointed out that the Pareto Optimality is unfair, unreasonable and imperfect for Many-objective Optimization Problems (MOPs) underlying the hypothesis that all objectives have equal importance and propose a new evolutionary decision theory. The key contribution is the discovery of the new definition of optimality called E-optimality for MOP that is based on a new conception, so called E-dominance, which not only considers the difference of the number of superior and inferior objectives between two feasible solutions, but also considers the values of improved objective functions underlying the hypothesis that all objectives in the problem have equal importance. Two new evolutionary algorithms for E-optimal solutions are proposed. Because the new relation < E of E-dominance is not transitive, so a new way must be found for consideration of convergence properties of algorithms. A Boolean function better used as a select strategy is defined. The convergence theorems of the new evolutionary algorithms are proved. Some numerical experiments show that the new evolutionary decision theory is better than Pareto decision theory for many-objective function optimization problems.
The solid phase FTIR spectra of (z)-4-(2-(acryloyloxy)ethoxy)-4-oxobut2- enoic acid (cis-AEOEA) and its polymers have been recorded in the regions 3500-500 cm-1, respectively. The IR spectra of cis-AEOEA was interpret...
详细信息
The solid phase FTIR spectra of (z)-4-(2-(acryloyloxy)ethoxy)-4-oxobut2- enoic acid (cis-AEOEA) and its polymers have been recorded in the regions 3500-500 cm-1, respectively. The IR spectra of cis-AEOEA was interpreted with the aid of normal coordinated analysis following full structure optimization and force field calculation based on density functional theory (DFT). Standard scaling factor was used to afford better correspondence between the calculated and experimental wavenumbers for the separation and unambiguous identification of observed IR spectra of cis-AEOEA, especially for C = C double bonds. The characteristic absorption bands of C = C are used for identifying the kind of C = C double bonds in cis-AEOEA's polymers.
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol...
详细信息
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then, its security was analyzed from the angle of technical realization and formal analysis to verify whether the original safety goals were achieved. Especially, formal analysis was mostly done. Finally, system testing was also carried out and the results were analyzed to verify function and performance of the new protocol.
暂无评论