237 results
Search Results
102. Effects of household energy consumption on environment and its influence factors in rural and urban areas.
- Author
-
Chun-sheng, Zhao, Shu-wen, Niu, and Xin, Zhang
- Subjects
ENERGY consumption ,HOUSEHOLDS ,CITIES & towns ,POLLUTION control industry ,ENVIRONMENTAL protection ,EMISSIONS (Air pollution) ,BIOMASS energy ,ELECTRIC power ,MATHEMATICAL models - Abstract
Abstract: The aim of this paper is to analyze the current situation and environmental effects of household energy consumption in rural and urban areas. We suggest some measures on reducing emission and protecting environment from pollution. Based on questionnaires survey, we analyzed the quantity and structure of household energy consumption in urban and rural areas, and compared the environmental effects of energy use between urban and rural areas. We used SPIRPAT model to analyze the impact of population and income factors on the ecological footprint of energy use. The results show that there is an unobvious difference of per capita energy consumption between areas. But in terms of energy structure, urban households are dominated by the fossil energy, while rural households are dominated by both of biomass energy and fossil fuels. The emissions of rural households are much larger than those of urban households. However, the difference of social emissions from energy consumption between urban and rural households becomes little. Both population size and income factors have promoting effect on total energy and the ecological footprints of electricity and coal etc. in urban areas, so does on electricity and biomass in rural areas. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
103. Consideration of Smart Grid Operations by Multi-Agent.
- Author
-
Ueda, Yuji and Nagata, Takeshi
- Subjects
SMART power grids ,MULTIAGENT systems ,ELECTRIC power system control ,ELECTRIC power consumption ,MATHEMATICAL models ,PERFORMANCE evaluation - Abstract
Abstract: In this paper, we propose an autonomous Smart Grid operation by using multi-agent approach. The proposed multiagent system consists of five types of agent: single Smart Grid controller agent (SGC), several Load agents (LAGs), several green power generation agents (GPAGs), several gas-turbines agents (GTAGs), and several battery agents (BAGs). In a Smart Grid, LAGs act as consumers or buyers, GPAGs and GTAGs act as producers or sellers, and BAGs act as prosumers or sellers/buyers. In order to verify the performance of the proposed method, it applied to a simple model system with different electrical power rates (peak rate and off-peak rate). From the simulation results, it can be seen the proposed multiagent system could perform the Smart Grid operation efficiently. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
104. A Power System Drawing Assistance System by Using Ruby/Tk.
- Author
-
Takemoto, Naofumi and Nagata, Takeshi
- Subjects
ELECTRIC industries ,ELECTRIC power distribution ,ELECTRIC power system control ,MATHEMATICAL models ,ENERGY conservation ,RELIABILITY in engineering ,SMART power grids - Abstract
Abstract: In recent years the term “Smart Grid” is emerging in the media. The Smart Grid delivers electricity from suppliers to consumers using two-way digital technology to control appliances at consumers homes to save energy, reduce cost and increase reliability and transparency. In order to operate the Smart Grid properly, the power system analysis is necessary. The analysis of the Smart Grid requires the power distribution network models. However the configuration of the Smart Grid is frequently changed. To cope with this situation, a power system drawing assistance system is required. In this paper, we propose a power system drawing assistance system by using Ruby/Tk. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
105. Development of Risk Monitor for Nuclear Power Plant.
- Author
-
Wei, Gao and Qinfang, Zhang
- Subjects
NUCLEAR power plant risk assessment ,RISK assessment ,PROBABILITY theory ,NUCLEAR power plant safety measures ,DATABASES ,DECISION making ,MATHEMATICAL models - Abstract
Abstract: Risk Monitor is a specific application of probability safety analysis (PSA) in nuclear power plant. This paper introduced the concept of risk monitor. According to the requirement of risk monitor, a comprehensive analysis was performed on the system. Based on the analysis, a risk monitor system was developed on browser/server structure with a detail introduction on the design of the system structure, database, interfaces, and functions. Finally, several practical applications were made to the system based on a risk monitor model of one specific plant. The results indicate that this risk monitor system is able to successfully implement all the required functions and is competent for correctly reflecting the plant risk so as to support the plant staff for decision-making. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
106. Test System for Disaggregation Algorithms for use in Smart Meters.
- Author
-
Benyoucef, Dirk, Bier, Thomas, and Klein, Philipp
- Subjects
TEST systems ,ELECTRIC meters ,ALGORITHMS ,MATHEMATICAL models ,ELECTRIC equipment ,DWELLINGS -- Electric equipment ,ELECTRIC power consumption ,ELECTRIC generators ,ELECTRIC potential - Abstract
Abstract: In this paper a test system for verifying disaggregation algorithms is presented. The main part of the test system is a test set generator. Based on the model of a real voltage source, the generator generates test sets. With these test sets the quality of the developed algorithms can be analyzed. These algorithms will be developed for the implementation in a smart meter. The smart meter system is used for the disaggregation of electrical appliances in residential buildings. This allows to be closed on energy consumption of the individual appliance. The development of a complete smart meter system is the goal of the research project “Smart Metering” at the University of Furtwangen. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
107. Protective Scheme Design for the Autonomous Operation of a Petroleum Refinery Cogeneration Plant.
- Author
-
Hsu, Cheng-Ting, Tsai, Lian-Jou, and Cheng, Tsun-Jen
- Subjects
PETROLEUM refineries ,COGENERATION of electric power & heat ,CONSUMERS ,MATHEMATICAL models ,ELECTRIC currents ,ELECTRIC potential - Abstract
Abstract: This paper presents the design of tie lines tripping to enhance power system stability for a large industrial customer with cogeneration units. The mathematical models with the corresponding parameters of generation units, excitation systems, governor systems and loads have been identified and verified. To enhance the system stability, the protective scheme by including the directional over current relay, under voltage relay and under frequency relay with proper settings has been applied. Three various external fault cases have been selected to verify the accuracy and effectiveness of the proposed schemes. It is concluded that the system stability of the industrial customer can be improved by the proper design of protective scheme. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
108. Islanding Detection Technique using Grid-Harmonic Parameters in the Photovoltaic System.
- Author
-
Kim, Il-Song
- Subjects
PHOTOVOLTAIC power systems ,ELECTRIC power plants ,ELECTRIC inverters ,ALGORITHMS ,MATHEMATICAL models ,PERFORMANCE evaluation - Abstract
Abstract: Power Conditioning System (PCS) in the photovoltaic system requires reliable islanding detection function (passive or active) in order to know electrical grid status and operate the grid connected inverter properly. This paper proposes a passive islanding detection algorithm based on the grid harmonic components. It utilizes the fact that the equivalent harmonic components at the point of common coupling (PCC) are changed according to the grid connection status. This method shows reduced Non-Detection Zone (NDZ) and fast detection time compared to the conventional approach. The mathematical modeling is performed and verified by experimental result using high performance DSP controller [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
109. “Transient analysis of isolated six-phase synchronous generator”.
- Author
-
Singh, G.K. and Singh, Derminder
- Subjects
ELECTRIC transients ,SYNCHRONOUS generators ,ELECTRIC power production ,MATHEMATICAL models ,SWITCHING circuits ,ELECTRIC leakage - Abstract
Abstract: The present paper describes a mathematical model and detailed transient behavior of a six-phase synchronous generator for isolated energy generation, when subjected to sudden switching of inductive load on either of the winding set or on both the winding sets. The computer model has been developed in rotor reference frame and is worth for the analysis of any arbitrary displacement angle between the two winding sets. The mutual leakage reactance and mutual leakage coupling between the d-q axes of two winding sets have also been considered in the analytical model. It is depicted that there is an interaction between the two windings as the performance of a winding set varies when other is subjected to variation in load. The computer traces for different loading conditions are shown, which agrees well with the established results. Some experimental results are also included. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
110. Analysis of Revenue maximization in Chinese family business based on the delegate - agency relationship.
- Author
-
Xuekao, Guo and Qizhi, Yang
- Subjects
FAMILY-owned business enterprises ,ECONOMIC development ,BUSINESS research ,MATHEMATICAL models ,CONSTRAINT satisfaction - Abstract
Abstract: In China and the rest of the world, family businesses as a unique mode of operation in the economic development of countries has played an important role. This paper studies on the basis of family business research in our country, then bases on the principal - agent relationship, a mathematical model by maximizing the return on the family business is analyzed. Analysts believe that the family business owners and professional managers are to meet the risk-neutral when there is an optimal operation of professional managers, family businesses can maximize returns; and two constraints are given because of the existence of incentive mechanism. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
111. Analysis on Inventory Management Model of a Large Mining Group.
- Author
-
Cui, Liu, Zhao, Yiqing, and Zhang, Linlin
- Subjects
INVENTORY control ,DATA mining ,MATHEMATICAL models ,BUSINESS enterprises ,CUSTOMER services ,INDUSTRIAL efficiency - Abstract
Abstract: Inventory management is a significant activity in enterprise manufacture. It plays a vital role in not only the turnover of circulating fund but also the level of customer service. An increasing number of companies pay more emphasis on tradeoff between lowering inventory cost and advancing customer service level as well as effective and efficient inventory management. This paper attempts to introduce the relative theories of inventory management and conduct a case study through rationally analyzing the certain company''s industry background, business characteristics, material category and inventory features. Finally it concludes on proposing a suitable improved method about inventory management according to its own situation. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
112. The Hierarchical Network Security Protocols Designing based on Public Key.
- Author
-
Liu, Simin and Ye, Junyao
- Subjects
COMPUTER network security ,COMPUTER network protocols ,PUBLIC key cryptography ,COMPUTER network architectures ,COMPUTER security ,COMPUTATIONAL complexity ,MATHEMATICAL models - Abstract
Abstract: This paper proposed a hierarchical network security protocols designing model based on public key, the designing of the protocols is to be completed in several layers. Each sub-protocol achieved a sub-goal that it should complete, and provided data interface to a higher sub-protocol. And then merged the sub-protocol of each layer, to complete the protocols designing. In the previous research, the security of the protocol was always regarded as a whole, which caused the protocols designing to be tremendous complexity. The hierarchical model simplifies the process of security protocols designing, and make the protocols designing more clear or less cost, the security proof more simpler. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
113. Group Buying Development Model Based on Social Networking Site in China.
- Author
-
Xu, Tiansheng, Zuo, Sha, Ning, Hongke, Xu, Jianglong, and Ma, Hui
- Subjects
GROUP theory ,MATHEMATICAL models ,WEBSITES ,STRATEGIC planning ,SOCIAL networks ,EDUCATION research - Abstract
Abstract: Since Groupon launched in November 2008, many deal-of-the-day websites, also called group buying websites in China, are increasing fast and attracting the attention of academic researchers. The paper analyzes the history and development of the group buying websites. A new group buying business model based on the characteristics of SNS is proposed. It can be used not only for the studies of this kind of websites but also for the deal-of-the-day website Companies to decide their strategy. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
114. Research on Automator Modeling Based on EAI Platform.
- Author
-
Xu, Ping
- Subjects
AUTOMATION ,ENTERPRISE application integration (Computer systems) ,MATHEMATICAL models ,SYSTEM integration ,BUSINESS analysts ,EVENT driven systems (Computer science) - Abstract
Abstract: The trend towards heterogeneous environments comes with an increase in importance of Enterprise Application Integration (EAI). Automation systems manage business objects according to business rules, and are event-driven. This means that business objects are processed across business systems in a well-defined logical manner and in response to well-defined events that occur within a business system. In this paper, we gives an overview on the problem of a process automation system in an integrated application environment. Based on this problem description, we give out the EAI Platform Automator Solution. Finally, the approach deals with the model-driven generation of Automator for integration platform. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
115. A New Type of Interactive Interface Design based on ARToolKit.
- Author
-
Jiamin, Liu and Dan, Yang
- Subjects
AUGMENTED reality ,VIRTUAL reality ,COMBINATORIAL optimization ,USER interfaces ,MATHEMATICAL models ,MATHEMATICAL combinations - Abstract
Abstract: Augmented reality (AR) is the technology that places the virtual objects produced by computer into the real world, and constructs the combined scene. ARToolKit is a tool that can provide with more convenient and quick development in AR technology. In this paper, first, optimize the way of modelling the import virtual objects, and then, increase the menu interactive operation between the users and virtual objects, and put forward a new type of interactive interface design combined with GLUI. More convenient can be provided with for users to do better in AR. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
116. Study on Distance Measure Based on Monocular Vision.
- Author
-
Zhang, Lixia, Bo, Yuming, Zhang, Jianfeng, and Zou, Weijun
- Subjects
MONOCULAR vision ,MONTE Carlo method ,COMPUTER algorithms ,EMBEDDINGS (Mathematics) ,PARAMETER estimation ,MATHEMATICAL models - Abstract
Abstract: In view of the monocular measurement of distance, a model of monocular measurement of distance based on particle filter is proposed by introducing particle filter algorithm into the system of monocular measurement of distance in this paper. The mature technique of other ranging methods can be embedded into this model. Then the detection and ranging of a target can be implemented under multi-jamming environment. The concrete realization of monocular measurement of distance based on particle filter and the way of embedding other ranging methods in the platform is mainly discussed in this thesis. The results of experiment show that the detection of frontage obstacle and the estimation of a target could be realized better under the harsh road environment, having high accuracy and efficiency. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
117. Research of Face Detection in Color Image Based on Skin Color.
- Author
-
yuetao, Du and nana, Yang
- Subjects
HUMAN facial recognition software ,COLOR image processing ,HUMAN skin color ,INFORMATION processing ,MATHEMATICAL models ,GEOMETRY - Abstract
Abstract: A face detection method from coarse to fine matching based on color information is described in this paper. Firstly, face candidate regions are found by using the mixed skin model combined YCrCb model and normalized rgb model. Then the candidate region can be determined by using geometry character and mouth information. Experimental results show that the method is effective in many conditions including many faces, different scales and complex background. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
118. The Research of CABC Organization Model.
- Author
-
Xue, Qing and Deng, Qing
- Subjects
COMBAT ,MULTIAGENT systems ,MATHEMATICAL models ,UNIT cohesion (Military science) ,MILITARY administration ,SIMULATION methods & models ,EXPERIMENTS - Abstract
Abstract: In view of hierarchy and grade characteristics in the military organization, the paper studied the CABC (Combat Agent Based Command) organization model according to the organizational view of multi-Agent system. Through building the model, it reflected the organization structure, the organization state of the combat unit and the relationships between units the same as true combat background, which can adapt to combat simulation needs better. By comparing with model experiments, it has obvious advantages in time-cost when the amount of individual is small. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
119. An Agent-based Software System Model.
- Author
-
Yu, Jinwei
- Subjects
MULTIAGENT systems ,COMPUTER software ,MATHEMATICAL models ,SEMANTICS ,MODEL-driven software architecture ,ALGEBRA software ,MORPHISMS (Mathematics) ,COMPUTER software development - Abstract
Abstract: A formal semantic model is proposed in this paper which focus on model-driven development for agent-based systems. Agent models are described with algebra specifications, and morphisms are used to describe the relationships between agent models, and the morphism types imply the different semantics of agent interactions. The typed category theory is used to formally describe agent models and their mapping relations, and thus the precise semantic meanings for them are provided. An agent-based intelligent tutoring system is given as a case to illustrate the application of this approach. The formal semantic model can be used to judge whether a transformation satisfies some property preservation constraints or not, and it can provide an effective support for model-driven agent-based software development. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
120. The Design of Associated Object Model of Software Reuse Framework.
- Author
-
Shou-bai, Xiao
- Subjects
COMPUTER software reusability ,SOFTWARE frameworks ,SEARCH engines ,COMPUTER interfaces ,SOFTWARE architecture ,MATHEMATICAL models - Abstract
Abstract: In order to present the reuse significance of software reuse framework fully, this paper will analyze specifically associated object model mentioned in the article “The overall design of software reuse framework” and blend adddelete-modify mode with search-page-display integrated mode in single object model as browse-edit mode. By appointing the interface template, class design principle and database template of this mode, it can help developers clear minds and complete more complicated functions. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
121. A Discrete Differential Evolution Algorithm Based Operator Allocation Optimization Model for Balancing Control of the Hybrid Assembly Lines.
- Author
-
Zeng, Xianhui, Ye, Chengyang, Wong, Wai-Keung, and Leung, Yung-Sun
- Subjects
DIFFERENTIAL evolution ,COMPUTER algorithms ,COMBINATORIAL optimization ,MATHEMATICAL models ,HYBRID systems ,CONSTRAINT satisfaction ,EMBEDDED computer systems - Abstract
Abstract: This paper investigates the operator allocation problem (OAP) for balance control of a complicated hybrid assembly line which appears in the apparel sewing manufacturing system. Multiple objectives and constraints for the problem are formulated. An optimization model combining the discrete differential evolution (DDE) algorithm and the embedded discrete event simulation (DES) model is proposed to solve the OAP. The DDE algorithm extends the realvalue differential evolution to handle the discrete-value vector by introducing two modified operators, the subtraction and addition operators. During the optimization process, the embedded DES model is used to evaluate the performance objectives by analyzing the dynamic behaviors of the hybrid assembly lines. Extensive experiments are conducted to validate the proposed optimization model. The experimental results show the effectiveness of the proposed algorithm. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
122. Performance Comparing of Messaging System with Different Topologies.
- Author
-
Fu, Yu, Wang, Hong, Dong, Jiankang, and Wang, Jiening
- Subjects
TEXT messages ,TOPOLOGY ,MATHEMATICAL models ,NETWORK routers ,PERFORMANCE evaluation ,APPLICATION software ,SIMULATION methods & models - Abstract
Abstract: Messaging system can be treated as a collection of message channels, ending points, messaging routers, and process management. For a particular application, the implementation style of the underlying messaging system is not unique. However, different approach results in various performance and resource requirements. In this paper, a testing environment is designed to investigate the performance and resource requirements features of various implementation techniques of a message system. The alternative implementation of the message channel, endpoint, routing and process management is organized with the concepts of logical topologies, which present the integration style of a messaging system. The testing experiments are carried along three different topologies: the business process management pipeline, the enterprise service bus, and enterprise service network. The pseudo web service clients and web service providers is implemented to simulate the workload effects of a real environment. From the detailed analysis of the testing results, it is validated that the ESB model provides the most flexible message delivering service with the cost of largest transaction throughput, but consumes the smallest of processor usage and memory occupation. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
123. An Adaptive Steganography for 3D Triangle Models.
- Author
-
Ke, Qi and Dongqing, Xie
- Subjects
ADAPTIVE control systems ,CRYPTOGRAPHY ,THREE-dimensional imaging ,TRIANGLES ,MATHEMATICAL models ,EMBEDDINGS (Mathematics) ,ROBUST control - Abstract
Abstract: In this paper, a new adaptive, high-capacity steganography for 3D triangle models using multi QIM is proposed. Every vertex of a 3D model can adaptively embed variable 3σ (σ ≥ 1) bits using contour space subdivision with low distortion. We first use normal direction of vertexes to estimate the embedding capacity of every vertex with respect to human visual system, then contour space subdivision is used to project the vertex to contour plane, finally at least three bits can be embedded by multi QIM in a vertex. The experiment results show that the proposed technique is adaptive, has high capacity and low distortion, and is robust against affine transformations and vertex reordering attack. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
124. Empirical Research on Dynamic Evaluation Model of Reservoir Environmental Capacity.
- Author
-
Wang, Chengyun, Hou, Lulu, and He, Jiajun
- Subjects
ECOLOGICAL carrying capacity ,MATHEMATICAL models ,ECOLOGICAL impact ,DECISION making ,DYNAMIC models ,EMPIRICAL research ,ENVIRONMENTAL economics - Abstract
Abstract: Based on the latest literature on Environmental capacity and related theories (Bio-Capacity, Ecological footprint), this paper examines the effect on Resettlement Environmental Capacity by taking into account factors from human society, economics, ecological environment, resources, policy and technology. On the basis of ‘nature-ocialeconomic compound system theory’, the author built a conceptual model and a mathematical model for dynamically Evaluating Resettlement Environmental capacity. The model is then adjusted according to data simulation, quantitative analysis and perfected by an empirical research. The model allows us to dynamically monitor, analyze, early-alarm and assess the environmental capacity. Furthermore, it provides a basis for policy decision-making on resettlement planning and management, which is particularly important for regulatory policy and decision making. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
125. Inclusion and Chain Variations of Non-Additive Set Function on T-Tribe.
- Author
-
Shi, Xijun, Sun, Hongxia, and Zhang, Qiang
- Subjects
SET functions ,RELATIONS in group theory ,MATHEMATICAL analysis ,FUNCTIONAL analysis ,MATHEMATICAL models ,NUMERICAL analysis - Abstract
Abstract: In this paper, we make further studies on inclusion variation and chain variation of non-additive set function. First, we redefine the definition of inclusion variation and propose some properties of inclusion variation. Then, we study some properties of chain variation and give the relationship of inclusion variation and chain. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
126. The application of simplex method in the open-pit truck dispatching system.
- Author
-
Wang, Jing and Zhang, Yong-ku
- Subjects
AUTOMOTIVE transportation dispatching ,EXCAVATING machinery ,MATHEMATICAL models ,SIMPLEX algorithm ,LINEAR programming ,COMPUTER scheduling - Abstract
Abstract: A significant performance index in truck dispatching system of strip mines is the utilization of the trucks and excavators, which directly affects the efficiency of the whole production. In this paper, a mathematical model is established by using the simplex method of the linear programming which is in order to reach the minimum total volume. And the optimal solution of the model that is the best logistics scheduling scheme is solved by using the simplex method of the linear programming. Increasing the utilization of excavators and trucks, the method is implemented in the computer truck dispatching of the open-pit mine and achieved good results. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
127. Trustiness Evaluation Model Based on Software Behavior.
- Author
-
Tian, Junfeng and Han, Jine
- Subjects
COMPUTER software testing ,MATHEMATICAL models ,PERFORMANCE evaluation ,INFORMATION technology security ,RELIABILITY in engineering ,SIMULATION methods & models - Abstract
Abstract: Dynamic trustiness evaluation of software has become a hot issue in information security field. In order to improve the accuracy of evaluation, a Trustiness Evaluation Model Based on Software Behavior (TEMSB) is proposed in this paper. TEMSB introduces Software Behavior Trace (SBT) to describe software behavior. SBT consists of operation trace, which is composed by operation sequences of the running software, and function trace depicted by a series of scenes. With the purpose of reducing time and space overheads of trustiness evaluation, we present reduction rules for SBT. In our model, we apply identification evaluation rule and scene evaluation rules to check the practical behavior of software. In particular, we consider a kind of special check points, named as branch points, at which we determine branch directions through scene information. The simulation results indicate the precision and efficiency of TEMSB. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
128. Load Balancing for Device Management Server.
- Author
-
Zhou, Yi, Guo, Shaoyong, Rui, Lanlan, and Li, Wenjing
- Subjects
LOAD balancing (Computer networks) ,CLIENT/SERVER computing ,ALGORITHMS ,REACTION time ,PERFORMANCE evaluation ,MATHEMATICAL models - Abstract
Abstract: This paper introduces a solution, Device Management Load Balancing Solution (DMLBS) which includes system design and load balancing algorithm, to achieve load balancing on Device Management server. Our solution improves both user response time and throughput for a single Device Management server, while exposing one interface to clients. DMLBS achieves its performance by using dynamic adaptive load balancing strategy and designing a mathematic model to measure Device Management server load. With these means, compared to two well-known load balancing algorithms (LeastLoaded and Round-Robin), DMLBS provides outstanding performance on load balancing. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
129. Torpedo Spatial Motion Modeling and Simulation.
- Author
-
Yafeng, Sun, Xiaopin, Yang, and Zhiping, Huang
- Subjects
TORPEDOES ,SIMULATION methods & models ,HYDRODYNAMICS ,MATHEMATICAL models ,C++ ,MOTION analysis - Abstract
Abstract: When sailing in seawater, the forces exerted to torpedo are complicated and can’t be precisely measured, especially the hydrodynamic parameters. So it is very important to establish non-linear mathematics models of torpedo moving characteristics in torpedo weapon development course. Firstly, according to torpedo underwater motion characteristics, this paper analyzes all kinds of forces and moments exerted to torpedo. Then based on momentum theorem and momentum moment theorem, torpedo spatial motion dynamic equations are established. Combining with torpedo kinematic equations and control system equations, simulation program written by standard C language are compiled and carried out successfully in Visual C++ 6.0 compilation environments. Finally several typical simulation figures and analysis are presented. Simulation results show that torpedo spatial motion mathematics models are accord with torpedo motion characteristics in real voyage course, having better usability and expansibility, and can satisfy the design need preferably. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
130. The Digital Tourism Mobile Services Platform Based on the Model of B/S.
- Author
-
Yan, Liang, Wang, Huajun, Miao, Fang, and Wang, Hechuang
- Subjects
TOURISM ,DIGITAL technology ,MOBILE apps ,MATHEMATICAL models ,DIFFERENTIAL equations ,SERVICE industries - Abstract
Abstract: In order to resolve shortcomings of current platform of digital tourism, like poor mobility and real-time differential, we designed a digital tourism system based on the mobile platform. The paper propose a concept that digital tourism mobile services platform based on the model of B/S. Research and realize loading a series of services on the platform. Result of the case shows that these problems can be resolved very well when we used digital tourism service system based on the mobile platform. It is effective argues the feasibility of realization of digital tourism platform server mode and its practical in mobile devices. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
131. Nonlinear Adaptive Control of Induction Motor with Parameters Variation.
- Author
-
Miao, Chang-yun, Huang, Peng, Huang, Lei, and Li, Xian-guo
- Subjects
INDUCTION motors ,ADAPTIVE control systems ,PARAMETER estimation ,NONLINEAR control theory ,MATHEMATICAL models ,COMPUTER simulation - Abstract
Abstract: This paper introduces a scheme of differential geometry and model reference adaptive theory to solve the nonlinear decoupling control problem while the machine parameters vary. As a result, two dynamical decoupled two-order subsystems between flux and speed are deduced. Simulation experiments prove the correctness about the theories and analysis. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
132. A Fast Algorithm for TV − L1 Based on Split Bregman Method.
- Author
-
Wang, Wenbin, Shen, Chaomin, Zhong, Chenying, and Zhang, Guixu
- Subjects
SPLIT Bregman method ,ALGORITHMS ,IMAGE denoising ,MATHEMATICAL models ,ANALYSIS of variance ,IMAGE processing - Abstract
Abstract: The Rudin-Osher-Fatemi (ROF) model is one of the best successful models for image denoising. Recently, the TV-L1 model, which replaces the L2-norm of the standard ROF model with the L1-norm, has been proposed. The L1-norm outperforms the L2-norm for some applications. However, because of the total variation (TV) norm and L1-norm, it is difficult to compute. In this paper, we propose a fast algorithm based on the Bregman / Split Bregman method to solve the TV-L1minimization problem, and show several examples to demonstrate its efficiencies. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
133. A Semantic based Weaving Framework for Model Composition.
- Author
-
Defen, Zhang, Shixian, Li, and Zhong, Ming
- Subjects
COMPOSITION operators ,WEAVING ,MATCHING theory ,COMPUTER algorithms ,MATHEMATICAL models - Abstract
Abstract: Model composition is an important technique in Model Driven Architecture (MDA) and can be used in many different application scenarios to facilitate large complex system development. However, many model compositions are done manually and hence hinder the technique. This paper put forwards a novel semantic based weaving framework for model composition that can identify matching elements and corresponding composition rules. The matching algorithm is based on a thesaurus WORDNET to compute the semantic relationships between two words. The model composition can be accomplished semi-automatically and a detailed weaving process is described through an example. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
134. Calculation Model for Vehicle Resistance Coefficient Based on Road Coasting Test.
- Author
-
Hongliang, Lin and Qiang, Yu
- Subjects
ROLLING friction ,TEST roads ,DRAG coefficient ,MATHEMATICAL models ,LEAST squares - Abstract
Abstract: Rolling resistance and air drag always exist while vehicle running, so they have great influence on vehicle''s dynamic performance and fuel economy. In order to operate vehicle properly and reduce fuel consumption, it is important to determine vehicle''s rolling resistance coefficient and air drag coefficient in a quick and accurate way. Combining theoretical analysis with experimental verification, calculation model based on road coasting test was given by means of least squares method in this paper. And through which vehicle rolling resistance coefficient and air drag coefficient can be determined easily based on one time coasting test. Then by using the test data from some light-duty vehicle, the vehicle''s rolling resistance coefficient and air drag coefficient are calculated according to established model. The computation result shows that rolling resistance coefficient is a linear function of the speed and the air drag coefficient is constant. Finally, the analysis shows that the new calculation model is simple, precise, economic and useful compared with wind tunnel test and other road test models. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
135. Ontology Model for Heterogeneous Data Integration.
- Author
-
Qinghai, Chen, Aiji, Wang, Dongmei, Huang, and Chi, Zhang
- Subjects
DATA integration ,ONTOLOGY ,MATHEMATICAL models ,ENGINEERING design ,DATABASES ,SPATIAL data structures - Abstract
Abstract: Xml file for the heterogeneous data integration can not accurately meet the needs of the users, this paper is based on ontology knowledge development method and technologies, Using ontology knowledge base instead of xml file and build a database of marine heterogeneous metabase. Protégé ontology development platform with the use of OWL ontology language used to describe the library. Through the multi-source heterogeneous data integration of ocean space as an engineering design application cases, the design knowledge sharing, reuse and interoperability of heterogeneous systems are achieved. The prototype system of knowledge integration module and collaborative display multi-source spatial data module of heterogeneous ocean function was verified, Validation results show that the theoretical construction based on ontology knowledge base can effectively serve the collaborative design of complex products. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
136. Studies on Two-stage DEA Model with Preference Information for Multiple Inputs and Outputs System.
- Author
-
Liu, Lixia, Li, Ning, and Lu, Xiaodong
- Subjects
DATA envelopment analysis ,MATHEMATICAL models ,MIMO systems ,STATISTICAL decision making ,INFORMATION processing - Abstract
Abstract: System efficiency is pivotal index to measure a system''s running capability and environment. However, the measurement of system''s efficiency becomes more complicated when the system composed by multiple inputs and outputs vectors. DEA (Data Envelopment Analysis) is a comprehensive appraisal method to calculate multiple inputs and outputs system''s relative efficiency. If a system can be divided into two separated subsystem and each subsystem has multiple inputs and outputs vectors, the original DEA methodology can’t figure out the system''s efficiency. To calculate the efficiency of system, which has two subsystems with multiple inputs and outputs, the two-stage DEA methodologies were introduced in this paper. Under some conditions, the decision makers have some preference in system appraisal, so we added preference information as constraints into programming of two-stage DEA models. To testify the capability of preference constraints, a case analysis was proposed as the application of two-stage DEA with preference information model. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
137. Weaker bisimulation: How to make a.0+b.0 and τ.a.0+b.0 equivalent?
- Author
-
Zheng, Guang, Wu, Jinzhao, He, Xiaojuan, and Lu, Aiping
- Subjects
BISIMULATION ,SCIENTIFIC observation ,COMPUTER operating systems ,MATHEMATICAL models ,CONGRUENCE lattices - Abstract
Abstract: In CCS, weak bisimulation cannot be taken as a congruence relationship because it is not preserved under choice composition. In this paper, we propose weaker bisimulation which is preserved under all operators. Weaker bisimulation is built on the view of observation congruence, but it is not as strict as weak bisimulation. From the practical point of view, it is more intuitive and easy to practice. The transition model for weaker bisimulation is Observable Labeled Transition System which is purely built on the point of observation. As for process terms, we simplify normal process terms by observation function Obsv. All internal actions are abstracted away by function Obsv. Together with Obsv, the Observable Labeled Transition System is perfect to model the weaker process terms. They help to make weaker bisimulation a congruent relationship under all operators in CCS. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
138. The Evaluation Model of E-business Based on Process.
- Author
-
Zou, Zuxu and Deng, Yanbing
- Subjects
ELECTRONIC commerce ,MATHEMATICAL models ,COMPETITIVE advantage in business ,INFORMATION technology ,BUSINESS development ,BUSINESS models - Abstract
Abstract: Enterprises are pushed into a global competition based on Internet with the boom of information technology, and e-Business has been the main platform of businesses. Efficient and effective e-business transformation has been one of the key factors that enterprises gain sustained competitive advantages in this era. It''s also one of the newly emergent interests of IS academicians. But most of the studies are focusing on analyzing the influences of one special e-Business project, or limited to study the influences of the pure online business to the e-Business transformation. No theoretical foundations or methodologies have been established to direct the enterprises e-Business transformation. In our paper, we first establish an e-Business transformation model based on business competence perspective, based on the key capacities of e-Business transformation, several implementation methodologies for the E-Business transformation are also presented. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
139. Assembly Line Balancing Model Based on Ant Colony Optimization Algorithm.
- Author
-
Zheng, Qiaoxian, Li, Yuanxiang, and Li, Ming
- Subjects
ASSEMBLY line balancing ,ANT algorithms ,PRODUCT quality ,TIME delay systems ,MATHEMATICAL models ,PROBLEM solving - Abstract
Abstract: Balancing automobile assembly line can improve production efficiency, stable product quality, decrease production delay; This paper presents a mathematical model and a ant colony optimization (ACO) algorithm for assembly line balancing(ALB).The mathematical model can be used formally describe the problem. In the ACO, a non-symmetric empowering matrix and a precedence task matrix are used to find the feasible solutions for ant colony to solve the problem. The experimental results show that the proposed ACO outperforms the efficiency and effectiveness to ALB-2 problem [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
140. Research on LOD Technology in Virtual Reality.
- Author
-
Xin, Li
- Subjects
VIRTUAL reality ,ALGORITHMS ,REAL-time computing ,QUADTREES ,GRID computing ,MATHEMATICAL models - Abstract
Abstract: Through the research on the existing virtual reality and LOD technology, for the realization difficulties of LOD echnology, this paper presents an optimized algorithm for real-time building terrain multi-resolution model based on errain quadtree, this algorithm uses hierarchical block thinking, through which only one traverse of the quadtree the rid will be generated, thus the system overhead grid caused can be reduced and the rendering speed will be greatly mproved. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
141. A retrieval method of mechanical part based on ontology.
- Author
-
Peng, Wang
- Subjects
COMPUTER-aided design ,PROBLEM solving ,ALGORITHMS ,IMAGE segmentation ,MATHEMATICAL models ,INFORMATION retrieval - Abstract
Abstract: To resolve the problems such as how to implement 3D CAD model retrieval and how to reuse the retrieval results, this paper descripes an ontology-based algorithm for mechanical part retrieval. The mechanical part is segmented into many relevant sub-parts. And then, attach semantic descriptions and annotations to these sub-parts. Finally, evaluate the similarity of the models based on the semantic ontology. This method can efficiently achieve the similarity assessment of the mechanical parts and as well reflect human perceptual similarity. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
142. Research on Group Decision Making based on Linguistic Information Processing.
- Author
-
Xiaopeng, Dai and haibo, Liu
- Subjects
GROUP decision making ,INFORMATION processing ,LINGUISTIC informants ,ROUGH sets ,MATHEMATICAL models ,INFORMATION storage & retrieval systems - Abstract
Abstract: In this paper, to settle the problem of group decision making in terms of partial information formed in a kind of linguistic verdict matrix, a group decision making approach is put forward based on Rough sets using the dominancebased Rough sets model. It is in fact a process of decision making after training. It is especially fit for the issue of best-choosing from large scale schemes. Besides, it can overcome the defects of the previous linguistic decision making approaches and can make the best scheme [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
143. Analysis of Traffic Divergence Behavior Based on the Game Theory.
- Author
-
Xue-wen, Song
- Subjects
GAME theory ,ROAD users ,TRAFFIC engineering ,NASH equilibrium ,PROBLEM solving ,MATHEMATICAL models - Abstract
Abstract: Traffic divergence includes traffic restricted divergence and traffic flexible divergence, which process is regarded as a kind of game behavior between traffic management and highway users. In the paper, based on the game theory, the game model between traffic management and highway users is established and is solved to get Nash equilibrium point. The result from analyzing the model shows traffic flexible divergence based on adjusting highway toll rate has a wide applied future. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
144. Modeling Research of Rectifier for Passive UHF RFID Tags.
- Author
-
Wu, Zhimeng and Feng, Quanyuan
- Subjects
RADIO frequency identification systems ,MATHEMATICAL models ,UHF diodes ,METAL oxide semiconductor field-effect transistors ,PARAMETER estimation ,SYSTEMS design - Abstract
Abstract: This paper presents a simple and accurate mathematical model for rectifiers using diode-connected MOS transistors for passive ultra-high-frequency (UHF) RF identification (RFID) tags. To calculate the efficiency and output voltage we just need a few parameters which make the design of rectifier is greatly simplified. The analysis takes into account the transconductance parameter and body effect, which make the simulation results of the proposed model are very close to those of the actual model based on Hspice simulation even in high rectifier stage situation and the error is less than 10%. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
145. The Study and Implementation on GPS L2C Signal Acquisition Strategy and Generation.
- Author
-
Du, Pengcheng, Zhang, Xiaolin, Su, Linlin, and Yue, Fengguang
- Subjects
GLOBAL Positioning System ,SIGNAL processing ,ACQUISITION of data ,MATHEMATICAL models ,SEARCH algorithms ,SYSTEMS design - Abstract
Abstract: L2C is a new civilian signal, broadcast by the modernized GPS Block IIR-M satellites. In this paper, the structure and mathematical models of L2C signal are analyzed. Based on the serial search algorithm, a new efficiency method of L2C code acquisition was advanced. A L2C signal generator was designed on FPGA with Verilog HDL, which was simulated and synthesized with Modelsim and QuartusII respectively. As the result of the experiments shows, the L2C code can be generated correctly and the L2C signal acquisition could be accomplished within 419ms using this advanced method. The advanced acquisition strategy and the generation of the L2C signal have been used in the civilian real-time dual-frequency GPS receiver. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
146. Framework and Establishment of Embedded Reconfigurable Systems in Application.
- Author
-
Zhiwei, Zhang and Aiguo, Ji
- Subjects
APPLICATION software ,ADAPTIVE computing systems ,EMBEDDED computer systems ,COMPUTER software development ,MATHEMATICAL models ,MATHEMATICAL proofs - Abstract
Abstract: This paper presents the reconfigurable technology of embedded systems based on the component, intends to build a multi-purpose embedded development platform. Based on the life and development process of embedded systems, the primary component model under process is established. The component library system and component library reference model of embedded systems is proposed, that is called three-dimension component library data space model, including life dimension, level dimension and upgrade dimension. The example proves that the embedded reconfigurable system is valid. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
147. Quality attributes, tactics and trade-offs evaluation.
- Author
-
Qureshi, Muhammad Bilal, Qureshi, Muhammad Shuaib, Mumtaz, Smeeta, Khalid, Shafaq, and Nabi, Munira G.
- Subjects
NEW product development ,PRODUCT quality ,QUALITY standards ,MATHEMATICAL models ,APPLICATION software ,PRODUCT design - Abstract
Abstract: Choice of a good quality product is as difficult as to produce a new product. Quality must be measured by the attributes of customer requirements, satisfaction and expectations. Quality model evaluates software quality by using some common attributes as checklist. When two or more components of an entity compete for the quality standards realized at the same time such that one component favors one attribute but refuses the other, then trade-off is made between the attributes to find an appropriate balance between the two. This paper covers different quality attributes, tactics and the trade-offs among them and how to evaluate these attributes so that a product can be designed and turned out to give satisfaction at a price that the user will pay. The solution to these trade-offs is provided by using some methods and models how and when to make these trade-offs and the effects of one attribute on another. The models cover set of realistic assumptions in order to apply the results in practical real life applications. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
148. Four-element connection number based on set pair analysis for underground goaf risk evaluation.
- Author
-
Li, Fanxiu
- Subjects
MINE filling ,RISK assessment ,DYNAMICAL systems ,UNCERTAINTY (Information theory) ,MATHEMATICAL models - Abstract
Abstract: The disposal of underground goaf is a problem of technological difficulty in the mining field in China. A large underground goaf without disposal poses a potential danger of sudden large-scale roof fall. A regular safety assessment of an underground goaf is among necessary measures to insure safe production in underground mines where the open-stopping method is adopted. So the assessment of underground goaf has their special reality and important significance. The goaf is a dynamic and complex diversification process along with the working-face removing. There are many factors influencing underground goaf risk evaluation, and their relative essentialities are different. Underground goaf risk evaluation is a complicated uncertainty system issue. Based on the set pair analysis (SPA), a new model for underground goaf risk evaluation was established by four-element connection number in the paper. And an applied example was studied with more satisfactory results. Compared with the other evaluation methods, this model is perfect, the evaluating result is more reasonable and its resolving power is higher. The obtained results were consistent with the practical condition. It is confirmed that the four-element connection number evaluation on underground goaf risk is feasible. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
149. Safety Evaluation on the Coal Milling and Drying with SDG and CBR.
- Author
-
Xin, Xu, Bei-ke, Zhang, Yan, Xu, and Chong-guang, Wu
- Subjects
COAL mining ,INDUSTRIAL safety ,DRYING ,CASE-based reasoning ,PROBLEM solving ,MATHEMATICAL models ,ORE-dressing ,DECISION making - Abstract
Abstract: Safety evaluation has played an important role in the process safety, which has caused ever-increasing public concern and worry. Because of the virtue of time saving, labor saving, high completeness and high reasoning depth, computer aided HAZOP analysis has become an important branch of recent study. To overcome the shortages in the traditional SDG model, this paper put forward a SDG modeling method integrate smoothly with Case-based Reasoning (CBR) technique based on the present SDG modeling method, which is represented detailed about the idea and procedures of modeling. A case study shows that this method can shorten the cycle of safety evaluation, and improves the operators’ ability to analysis complicated problem. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
150. Integrating Permission Hierarchy with the Core RBAC model.
- Author
-
Liu, Bo, Tan, Mingjie, Yang, Yongqi, and Liao, Juan
- Subjects
ACCESS control ,MATHEMATICAL models ,MANAGEMENT information systems ,COMPUTER security ,DISTRIBUTION (Probability theory) ,IDENTIFICATION cards - Abstract
Abstract: In large enterprise-wide system, there are lots of sensitive and confidential data such as bank account, identity card number and so on, therefore security administration is one of the biggest challenges. This is particularly true for enterprises that are trying to strengthen security in distributed environments. Role Based Access Control (RBAC) has attracted a great deal of attention in recent years, the roles are assigned to users and permissions are assigned to roles in the model, but there are few representations about relations among the permissions. In this paper the permission hierarchies-RBAC model is introduced, based on the core RBAC, this model defines the semantics of partial order to support permissions hierarchies. Finally, we argue the constraints of permissions; some experiments show that PHRBAC is better than others at many aspects, and it is easy to implement in Management Information System. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.