64 results
Search Results
2. Design and Simulation of Voltage Fluctuation Rate Monitor System Based on Virtual Instrument Technology*.
- Author
-
Xinling, Wen and Cheng, Zhao
- Subjects
ELECTRIC power systems ,ELECTRIC potential ,FLUCTUATIONS (Physics) ,ELECTRIC power supplies to apparatus ,COMPUTER input-output equipment ,COMPUTER software ,SIMULATION methods & models - Abstract
Abstract: Electronic power is the most widely used energy, and its application degree has been a mark of country development level. This paper introduces a method of voltage fluctuation rate monitor by using virtual instrument technology. Because virtual instrument technology uses computer own hardware and design graphics procedure frame diagram software to complete, which has many advantages of the simple algorithm and fast speed, etc. Through simulating three-phase voltage of electronic power system, this paper completes voltage fluctuation rate monitor of electronic power system and electronic power quality judgment, as well as verifies accuracy of algorithm diagram procedure. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
3. Emulated Analysis in the Performance of Linear Introduction Motor.
- Author
-
Mei-shan, Jin, Da-chuan, Chen, Jing, Li, Chang-li, Qiu, and jing, Liu
- Subjects
EMULATION software ,COMPUTER software ,MAGNETIC fields ,INDUCTION motors ,FIELD theory (Physics) - Abstract
Abstract: This paper mainly analyses the effects that the secondary material has on the magnetic distribution and operation performance of linear introduction motor. And it narrates the methods to adjust edge effect, uses Maxwell 2D software to emulate the magnetic field generated by linear introduction motor and gives the emulation result. This paper has a certain reference value to design, development and scientific application of linear introduction motor. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
4. Research and Application of a New Fuzz-test Framework.
- Author
-
Tao, Wang, Yanling, Li, Yingli, Ma, and Wei, Guo
- Subjects
FUZZY systems ,COMPUTER software ,COMPUTER security ,SYSTEM integration ,SECURITY systems ,CONCEPTUAL models - Abstract
Abstract: This paper presents a new research for the fuzz-test in the process of validating software security risk, two area and three phrase about the tests of software vulnerabilities. Three phrase are safety testing planning, concomitant testing, integration testing, the two regions are conceptual and action. In this paper, gives a fuzz-test framework of software security testing, through the application of the actual project, the test model can effectively find system vulnerabilities and upgrade the software system security. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
5. Modeling and testing of multi-resolution morphological gradient distance relay algorithm.
- Author
-
Saad, A.A., El-Naggar, M.F., and Shehab_Eldin, E.H.
- Subjects
ALGORITHMS ,ELECTRIC lines ,COMPUTER software ,FAULT tolerance (Engineering) ,POWER system simulation ,COMPUTER networks - Abstract
Abstract: This paper describes modeling and testing of a digital distance relay for transmission line protection using MATLAB/SIMULINK. ATP is used for detailed modeling of a power system network and fault simulation. SIMULINK is used to implement multi-resolution morphological gradient (MMG) relaying algorithm. MMG modeling is an interactive simulation environment for relaying algorithm design and evaluation. The basic principles of MMG relaying algorithm and some related algorithms such as tripping and fault location scheme are also described in this paper. Test results show that MMG relaying algorithm can detect and define fault location accurately within 1 milli-second. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
6. Construction of Network Virtual Laboratory.
- Author
-
Wang, Hongsheng, Du, Huaichang, Xu, Guixian, and Zhang, Mengyue
- Subjects
VIRTUAL reality ,COMPUTER networks ,COMPUTER software ,COMPUTER input-output equipment - Abstract
Abstract: This paper introduces the concept of network virtual laboratory and analyses the key technologies to achieve network virtual laboratory. The construction of software and hardware, the establishment of network virtual laboratory which were performed by technologies of Matlab, virtual instrument, virtual reality, are all discussed in the paper. In the end, I give the general model. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
7. A kind of user behavior authentication model and analysis in cloud computing.
- Author
-
Tian, Li-Qin, Lin, Chuang, Yang, Ni, and Duxiujuan
- Subjects
COMPUTER access control ,MATHEMATICAL models ,CLOUD computing ,COMPUTER security ,COMPUTER software ,ALGORITHMS ,INTERNET users ,PETRI nets - Abstract
Abstract: Currently, the cloud computing is welcome in scholars and enterprise, because of its good features such as low investment, easy maintenance, Flexibility and fast deployment, reliable service. However, when the cloud computing is implemented, the security and credibility is one of the biggest obstacles. In cloud computing, users directly use and operate software of cloud service providers, operating system, even programming environment and network infrastructure, so the impact and breakage users caused for cloud software and hardware resources more serious than the current Internet users to share resources. So whether the behavior and behavior subject is credible or not, how to authenticate and control user behavior, these are important parts of the cloud computing study. This paper presents the concept of user behavior authentication, discusses how to authenticate and control user behavior in the cloud computing environment according to the user''s behavior, include establishment of behavior authentication set, mechanisms of behavior authentication and control, corresponding mode of Stochastic Petri Nets, False Negative rates and algorithm performance etc. Paper lays the theoretical and practical foundation for the real application of cloud computing. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
8. Design and Implementation of BIOS Based on Godson-3A.
- Author
-
Gao, Yuhui, Zhu, Mingfa, Wang, Huixiang, Xiao, Limin, and Ruan, Li
- Subjects
SYSTEMS design ,MICROPROCESSORS ,ELECTRIC network topology ,COMPUTER architecture ,COMPUTER software ,PERFORMANCE evaluation - Abstract
Abstract: Godson-3A as the latest multi-core generation of Godson microprocessor family targets to the low cost servers and high-performance computers. As Godson-3A adopts the scalable mesh of crossbar topology and provides extensive I/O support based on crossbars, we can implement the architectures of servers or computers in various ways. But for each design, the proper design and implementation of BIOS plays an important role in making full use of flexibility provided by the hardware design of Godson-3A. This paper introduces the two-level scalable architecture implemented inside Godson-3A, lists multiple architectures of Godson-3A systems, and discusses the realization of software routing configuration mechanism by the crossbar switch in detail. Based on the above analysis, this paper analyzes the design and implementation of BIOS to realize the correct functions and improve the performance of various Godson-3A systems. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
9. A New Framework for Fine Granularity Scalability Video Coding in AVS.
- Author
-
Wang, Kunpeng, Zhao, Yong, Yuan, Yule, Bai, Xuhui, and Fang, Wei
- Subjects
SCALABILITY ,COMPUTER networks ,VIDEO coding ,MPEG (Video coding standard) ,AVATARS (Virtual reality) ,ALGORITHMS ,COMPUTER software - Abstract
Abstract: Fine scalable video coding is a common method for video quality scalable of H264 and MPEG-4, but it has not been used on AVS as yet. This paper presents a new algorithm of fine granularity scalability based on AVS. The DCT residue coefficients of the FGS enhancement layer proposed in this paper are firstly scanned by zigzag and then scaled with the energy distribution characteristic of frequency domain. Then, the scalable coefficients are coded by bit-plane coding and Exp-Golomb coding. Finally, we simulate the algorithm on the software codec model version rm52k of AVS-P2. The experimental results show that the ameliorated scalable coding method can improve the coding efficiency obviously compared with the original FGS in terms of average PSNR. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
10. Study on the Digital Library System Based on Web Service.
- Author
-
Zhang, Baihua
- Subjects
DIGITAL libraries ,WEB services ,INFORMATION retrieval ,COMPUTER software ,COMPUTER input-output equipment ,SERVICE-oriented architecture (Computer science) - Abstract
Abstract: In this paper, on the basis of integrating resources and providing retrieval services, in accordance with the serviceoriented thinking, it uses the Web Service technology integration to implement the integrated system based on the one-stop digital library. In this paper, it designs and develops based on SOAP, with good cross-platform property and expansibility, to achieve the integration of data resources within a wide range, without any restriction on software and hardware environments in the data source end, and the Web Service of each data source end needs only to follow the established format to develop. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
11. Design and Implementation of Motion Controller Based on ARM and FPGA.
- Author
-
Liu, Peng, Li, Shigang, Wen, Wusong, and Li, Cui
- Subjects
PID controllers ,SYSTEMS design ,TOMOGRAPHY ,COMPUTER software ,COMPUTER input-output equipment ,ADAPTIVE control systems - Abstract
Abstract: This paper takes ARM9 processor-AT91RM9200 and CYCLONE series FPGA-EP1C6Q240C8 as core to design motion control system of Industrial Computed Tomography. This paper introduces Key techniques of motion control system in detail from two aspects of hardware and software, using Adaptive PID Based on Single neuron as motion control algorithm in the system, then give the simulation result of Adaptive PID Control Based on Single neuron, at last list the system operation results. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
12. Developing Situation and Energy Saving Effects for Solar Heating and Cooling in China.
- Author
-
Ruicheng, Zheng, Tao, He, Xinyu, Zhang, Zhulian, Huang, and Yu, Deng
- Subjects
SOLAR heating ,SOLAR air conditioning ,ENERGY conservation ,ENERGY development ,WATER heaters ,COMPUTER software - Abstract
Abstract: In recent years solar hot water systems, solar heating combisystems and solar air conditioning systems have been developed faster in China. Many demonstration projects were built and a technical supporting system including technical code, computer design software and design handbook has been formed. It is introduced that developing situation of technology for solar heating and cooling in China and energy saving effects of some demonstration projects in the paper. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
13. Numerical evaluation on performances of AHU equipped with a cross flow heat exchanger in wet and dry operation.
- Author
-
Beccali, Marco and Finocchiaro, Pietro
- Subjects
HEAT exchangers ,COOLING ,COMPUTER software ,NUMERICAL analysis ,PERFORMANCE evaluation ,ENERGY conservation ,COMPARATIVE studies ,ENERGY consumption ,CASE studies - Abstract
Abstract: In this paper the comparison between the performance of a cross flow heat exchanger in wet and dry operation for air handling process has been investigated. In addition, a case study of application of the component to perform indirect evaporative cooling in a AHU was studied with the software TRNSYS.Using experimental data and an appropriate analytical method, energy saving performances of the system has been evaluated through the entire cooling season for a typical Mediterranean site. Results show that high energy saving potential can be obtained if the component is operated in wet operation in term of reduction of electricity consumption. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
14. Impact of Distributed Generation on Power Distribution Systems.
- Author
-
Balamurugan, K., Srinivasan, Dipti, and Reindl, Thomas
- Subjects
DISTRIBUTED power generation ,ELECTRIC power distribution ,GREENHOUSE gases ,EMISSIONS (Air pollution) ,ELECTRIC potential ,RENEWABLE energy sources ,COMPUTER software - Abstract
Abstract: In order to reduce the green house gas emissions all over the world the investment on renewable energy infrastructure is increasing particularly in the distribution network. The penetration of generating sources in the distribution network changes the characteristics of distribution system and will have impact on various technical parameters based on its size and location in the network. This paper modeled the IEEE 34 Node distribution test feeder using the commercial software package DIgSILENT power factory version 14. Solar photovoltaic generators are introduced as Distributed Generators (DGs) at various nodes and the impacts that DG produces on real and reactive power losses, voltage profile, phase imbalance and fault level of distribution system is studied. Simulated results obtained using load flow and short circuit studies are presented and discussed. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
15. Generating Interface Prototype for EnergyPlus IDD File Using Unified Modeling Language and Coloured Petri-nets.
- Author
-
Abdeldjebbar, Bachkhaznadji and Azeddine, Belhamri
- Subjects
PROTOTYPES ,UNIFIED modeling language ,PETRI nets ,COMPUTER simulation ,COMPUTER software ,HUMAN-computer interaction - Abstract
Abstract: Based on user requirement techniques, this paper suggests a new approach to the generation of a building performance simulation tool interface prototype. This approach requires the Unified Modelling Language (UML) and scenario specifications for analysing user interactions with the computer program core. At the level of user interface specifications, designer can draw interfaces but it is difficult to specify their dynamic behaviour. Coloured Petri-nets are used in specification and check on the behaviour of these interfaces before their implementation. The EnergyPlus input data definition (IDD) file is provided as an example to illustrate the process of generating an executable interface prototype which can be used for scenario validation, and can be evolved towards the target interface tool. The result of the overall approach is a specification consisting of a global coloured Petri-net which can be analysed by means of a simulation together with the generated and refined IDD interface prototype [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
16. Thermoacoustic Solar Cooling for Domestic Usage Sizing Software Part (I).
- Author
-
Konaina, Tareq and Yassen, Nasser
- Subjects
THERMOACOUSTICS ,SOLAR air conditioning ,COMPUTER software ,REFRIGERATION & refrigerating machinery ,TEMPERATURE effect ,HEAT exchangers - Abstract
Abstract: In the project of “Thermoacoustic solar cooling for domestic usage” funded by University of Damascus, which well be built in refrigeration laboratory, it was necessary to start up the project with the ability to use for cooling achieving known temperature and required capacity. As the possible required cooling variable, it was necessary to obtain the sizes of the Thermoacoustic cooler and optimal design pressure as a function of the required cooling capacity in order to insure convenient sound power. In this paper, the modeling equations for design were done and turned into a computer program. The developed program inputs were the possible cooling capacity and some assumptions such as gas and stack type and initial dimensions with the possibility of changes. The outputs were stack, heat exchangers and resonator sizes and acoustics Driver power necessary. The program has been tested on some manufactured models such as Tijani''s 5 watts and Normah Mohd Ghazali''s 5 watts refrigerator, results was satisfactory. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
17. A Method to Improve the Interacting between MATLAB and NI-DAQmx.
- Author
-
Chen, Yimeng and Li, Xuelian
- Subjects
DATA acquisition systems ,COMPUTER software ,COMPUTER science ,HIGH performance computing ,INFORMATION technology - Abstract
Abstract: This paper propose a method to improve the interacting between MATLAB and NI-DAQmx, we built a new Matlab toolkit for data acquisition using the NI-DAQmx drivers. With this toolkit Matlab can support the full functionality of NI-DAQmx and the data acquisition will be more stabile and effective. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
18. A Study of State Educational Loan Demand Diversity and its Influencing Paths–An Empirical Analysis based on SEM Model.
- Author
-
Bing, Zhang
- Subjects
EDUCATIONAL finance ,LOANS ,EMPIRICAL research ,STRUCTURAL equation modeling ,ETHICAL investments ,STATISTICAL correlation ,REGRESSION analysis ,COMPUTER software - Abstract
Abstract: This paper focuses on discussing the impacts of state educational loan on the students’ study and life. At first, it judges if there is correlation between students’ family background, type of the university and educational loan based on social investigation, explore the impacts of education loan on the students’ further education in future and put forwards research hypothesis; then, it collects data by means of large sample investigation, and carries out regression analysis using LISREL software data, conducts hypothesis test, obtains research results and finally analyzes the results and makes reasonable explanations. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
19. Exploration on the Key Issues of Practical Teaching Reform of Computer Network.
- Author
-
Ran, Zhang
- Subjects
COMPUTER networks ,COMPUTER science education ,COMPUTER assisted instruction ,COMPUTER software ,TECHNOLOGICAL innovations ,COMPUTER simulation - Abstract
Abstract: Computer network course is a professional basic course for computer undergraduates. The practical teaching of computer network plays an important role in the whole teaching process. Practical teaching can help students improve their comprehensive quality, cultivate their innovative spirit and enhance their practical ability. This paper analyzes and discusses the main problems existing in practical teaching of computer network, which are experimental contents, experimental scheme, and experimental teaching methods. Based on talents training objectives of school and the thinking of training innovative software talents proposed by the ministry of education, the solutions to the three key problems are proposed, that is, to optimize and perfect the experimental contents, to construct the experimental environment and scheme based on simulation software, and to adopt multiple practical teaching methods. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
20. Numerical Simulation of Casting Filling Process Based on FLUENT.
- Author
-
Yuwen, Xuan-xuan, Chen, Ling, and Han, Yi-jie
- Subjects
NUMERICAL analysis ,SIMULATION methods & models ,FOUNDING ,COMPUTER software ,FINITE element method ,MATHEMATICAL models ,TEMPERATURE effect ,SURFACES (Technology) ,BOUNDARY value problems - Abstract
Abstract: Based on finite element theory, using FLUENT software and three-dimensional model to simulate liquid metal free surface and temperature field of casting filling process numerically. Boundary and initial conditions, such as velocity, pressure, temperature, etc., was reasonably set. The feasibility of using FLUENT to simulate three-dimensional casting was studied; the fluctuation of molten metal free surface was observed; the temperature distribution data on the end of filling was recorded, for further numerical simulation of casting solidification process which provided an accurate initial condition. This paper also predicted defects on casting filling process, and provided a basis for process optimization. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
21. On the Unified Authentication Technology of Network Token.
- Author
-
Chao, Wang, Zhaohe, Huang, and Erbao, Peng
- Subjects
INFORMATION technology security ,COMPUTER access control ,COMPUTER software ,INFORMATION resources management ,COMPUTER network security ,COMPUTER interfaces - Abstract
Abstract: This paper has researches on the achievement of unified authentication. It uses Windows Active Directory as the authentication authority. It uses Kerberos, SPNEGO, JAAS and JGSS to achieve unified authentication service with single sign-on.Through unified management, unified authentication and the integration of application servers to avoid the emergence of non-uniform isolated information resources and to solve the key requirements of the unity of interface integration and safety certification. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
22. Animation Modeling with Chu Art Characteristics Based on Flash Technical Design and Production.
- Author
-
Shiyuan, Deng and Yujie, Shi
- Subjects
COMPUTER-generated imagery ,MATHEMATICAL models ,COMPUTER software ,COMPUTER simulation - Abstract
Abstract: The development of China''s animation should take some excellent artistic forms of our nation into consideration, only those animation works with national characteristics are precious. The designer should comprehend the essence of traditional cultures, combine the traditional artistic elements on modeling and can recreate. This paper creates animation images with Chinese culture characteristics through analyzing the Chu art characteristics and taking them as artistic reference of animation modeling. Its application in the FLASH software and some noticeable problems are considered; and the animation modeling has unique artistic charms and values. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
23. Based on OMAP Platform to Build the Distribution System Network of Relay Protection Devices in Coal Power.
- Author
-
Shao, Xiao-qiang and Ma, Xian-min
- Subjects
COAL mining ,ACQUISITION of data ,COMPUTER software ,FLOW charts ,COAL mining safety ,PERFORMANCE evaluation - Abstract
Abstract: This article has carried on the analysis in view of the coal mine old communication network and the relay protection installment existence''s question, Proposed based on the OMAP platform to build a coal mine power system relay protection program, elaborated the OMAP platform coal mine relay protection principle, To design this equipment''s schematic diagram, and has carried on the performance introduction to this equipment''s main hardware constitution, this paper has developed the data acquisition function software flow chart, it provided the basis for the development new coal mine distribution network relay protection installment. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
24. Numerical Simulation on Distribution Characteristics of Particle Distribution Uniformity in a Radial Style Diesel Particulate Filter.
- Author
-
Jinke, Gong, Chan, Tian, and Gang, Wu
- Subjects
COMPUTER simulation ,PARTICLE size distribution ,DIESEL particulate filters ,MATHEMATICAL models ,SOLID phase extraction ,COMPUTER software ,MATHEMATICAL optimization - Abstract
Abstract: In this paper three-dimensional mathematical model of gas-solid two-phase in a radial style diesel particulate filter (DPF) is established and flow computation software was used to simulating distribution characteristics of gas-solid two-phase and particle distribution uniformity. Several influence parameters such as flow velocity, divergence angle and particle diameter was investigated. Through the verification analysis, the simulation calculation results can reflect the laws of gas-solid two-phase flow inside this DPF .The results indicate that distribution uniformity of particle could be improved by reducing inlet velocity, divergence angle and particle diameter. The study is useful for structural parameters optimization designing and controlling particle regeneration of radial style diesel particulate filter. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
25. Optimization Design of Solar Heating System for Public Bathrooms in the Countryside.
- Author
-
zenghong, Xiao, Zhenhe, Ju, Fiedler, Frank, Bales, Chris, and hong, Xu
- Subjects
MATHEMATICAL optimization ,SOLAR heating ,SOLAR energy ,BATHROOMS ,PUBLIC buildings ,COMPUTER simulation ,COMPUTER software - Abstract
Abstract: The countryside public bathrooms use the solar energy as power it will be profitable on both the environment and the economy. This paper has used Polysun software as the tool for simulation of countryside public bathrooms heating systems performance. Performing a parametric study and to meet a given minimum solar fraction with the lowest cost. Finding optimal operating conditions for the system. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
26. Application of Numerical Simulation on Biomass Gasification.
- Author
-
Che, Deyong, Li, Shaohua, Yang, Wenguang, Jia, Jia, and Zheng, Nan
- Subjects
BIOMASS gasification ,COMPUTER simulation ,CHEMICAL processes ,COMPUTER software ,COMPARATIVE studies ,BIOMASS energy - Abstract
Abstract: Biomass gasification is one of the highest thermal efficiency chemical conversion processes. Numerical simulation is an important tool for study on biomass gasification. In this paper, numerical simulation on biomass gasification technology at home and abroad are reviewed. At the same time, two commercial simulation softwares (Aspen Plus and Fluent) applicated in chemical process was mainly introduced, and both of them were analyzed and compared. Finally it was put forward that a better simulation result could be achieved for biomass gasification if applying Aspen Plus combined with Fluent. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
27. A Gait Planning Method for Biped Heel-and-toe Robot.
- Author
-
Zhang, Qiushi, Chen, Dandan, and Li, Hongmei
- Subjects
MOBILE robots ,ROBOT motion ,ROBOT kinematics ,COMPUTER software ,SIMULATION methods & models - Abstract
Abstract: The paper taking the 6-DOF biped heel-and-toe robot as the research object, according to the expected walking pose and gravity center of the robot, using the Denavit-Hartenberg formula to establish the kinematics model and kinematics equation of the biped heel-and-toe robot. Under the ZMP criterion conditions, the kinematics equations in each discrete point are solved out via the walking pose, and constituted the motion joints curves. The simulation results of motion joints curves from the Matlab proved that the method of gait planning can achieve the aim of biped heel-and-toe robot''s stable dynamic walking. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
28. Evaluations on Current-matching of Multi-junction Photovoltaics under Outdoor Conditions.
- Author
-
Feitknecht, Luc
- Subjects
SEMICONDUCTOR junctions ,PHOTOVOLTAIC power generation ,PREDICTION models ,ELECTRIC measurements ,SEMICONDUCTOR wafers ,COMPUTER simulation ,COMPUTER software ,DATA acquisition systems - Abstract
Abstract: Key differences of precisely measuring currents on wafer based solar cells and multi-junction solar cells are shortly described at the beginning of the paper. In the next section, the impact of precise Standard Test Condition (STC) measurements on the energy yield prediction by PV simulation software is reviewed, with special mention of the Staebler-Wronski Effect. Solar modules containing amorphous silicon absorbers perform in moderate latitudes in a cyclic way: hot season with higher output and cool season with lower output. Both, spectral variations of the irradiance as well as temperature rise during irradiance are reported in literature contributing to this cycling behaviour, which finally is not an issue but a feature of this technology. In consequence, a ‘design to geography’ approach is suggested for module manufacturers, allowing for higher energy yields even without considerably increasing nameplate power under STC. Standardisation, which highlights the energy yield in addition to STC nameplate power, is identified as urgently needed. A better understanding of amorphous silicon based multi-junction PV modules can only be gained, if more spectrally resolved data acquisition is performed and evaluated for high and low geographic latitudes. Instead of a ‘static’ temperature coefficient, amorphous silicon modules are better characterised with the ‘effective’ temperature coefficient which can become positive e.g. in building integrated heat-insulating PV elements. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
29. Numerical Simulation of the Effect of Heat Gains in the Heating Season.
- Author
-
Sikula, Ondrej, Plasek, Josef, and Hirs, Jiri
- Subjects
COMPUTER simulation ,HEATING ,MATHEMATICAL models ,ENVIRONMENTAL engineering of buildings ,COMPUTER software ,ENERGY consumption ,SOLAR radiation - Abstract
Abstract: This paper is concerned with the description and verification of an energy model of a building using the BSim software. The aim is to determine the effect of the basic heat gains on the energy consumption of a building. Simulations were performed on the basis of the actual hourly-interval climatic data over a whole year. It has been found, that the highest heat gain comes from solar radiation. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
30. Multi-Agent based Microgrid Coordinated Control.
- Author
-
Xiaoyan, Zhou, Tianqi, Liu, and Xueping, Liu
- Subjects
MULTIAGENT systems ,GRID computing ,ELECTRIC power ,SIMULATION methods & models ,COMPUTER software ,INTELLIGENT agents - Abstract
Abstract: There are obvious advantages in collaborative work for the system based on the multi-agent technology. According to a concrete microgrid in this paper, multi-agent control system is designed based on the microgrid control goals. The structure of multi-agent microgrid control system and the specific functions of each agent are proposed, expounding the microgrid coordinated control strategies at the grid-connected and islanded state respectively. The model of microgrid based on the multi-agent is established in the MATLAB/SIMULINK. The simulation model has simulated the microgrid''s characteristics of running operation performance both under the grid-connected and islanded situation. Simulation results show that multi-agent microgrid control system can fully satisfy the requirement of power balance control and inhibit frequency fluctuation under the two situation. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
31. A Scalability Design of ASP. NET Page Skin.
- Author
-
Hu, Min and Zhang, Jing
- Subjects
COMPUTER networks ,SCALABILITY ,SKIN effect ,JAVASCRIPT programming language ,MICROSOFT .NET Framework ,COMPUTER software ,DATA structures - Abstract
Abstract: Skin changing is aimed at switching page pattern according to user''s favor. Compared with regular page beautification, it is more comprehensive and profound. In order to make ASP. NET page extremely scalable and change skin, this paper especially attaches importance to master page and the influence that multistage directory has on skin effect. Above all, establish a scheme suitable for skin changing for site structure and define style sheet reference in the form of variable. Then, pay attention to prefix conversion of master page when JavaScript obtains variables and the conversion of relative reference address while evaluating. In the end, implement the effect of ASP. NET page skin with strong scalability. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
32. Task-Based Approach for Software Modeling and Transformation.
- Author
-
Yu, Jinwei
- Subjects
COMPUTER software ,JAVA programming language ,ACTION model (Communication) ,DATA transformations (Statistics) ,WEB-based user interfaces ,CODING theory ,DATA structures - Abstract
Abstract: In this paper, a Java platform specific modeling approach is proposed based on task, which is composed of three parts: static model, action model and presentation model. It can be taken as the target and define mapping rules according to its structure to realize model transformation. This solution can be used widely for suffering little from the domain and some special techniques of target applications. With further research, the work will play a positive role for modeldriven Web application development, model mapping and automatic code generation. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
33. An Agent-based Software System Model.
- Author
-
Yu, Jinwei
- Subjects
MULTIAGENT systems ,COMPUTER software ,MATHEMATICAL models ,SEMANTICS ,MODEL-driven software architecture ,ALGEBRA software ,MORPHISMS (Mathematics) ,COMPUTER software development - Abstract
Abstract: A formal semantic model is proposed in this paper which focus on model-driven development for agent-based systems. Agent models are described with algebra specifications, and morphisms are used to describe the relationships between agent models, and the morphism types imply the different semantics of agent interactions. The typed category theory is used to formally describe agent models and their mapping relations, and thus the precise semantic meanings for them are provided. An agent-based intelligent tutoring system is given as a case to illustrate the application of this approach. The formal semantic model can be used to judge whether a transformation satisfies some property preservation constraints or not, and it can provide an effective support for model-driven agent-based software development. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
34. Research of PMSM Drive Control Software Design Based on MFC.
- Author
-
Gong-ding, Bai and Xiao-feng, Ma
- Subjects
COMPUTER software ,PERMANENT magnet motors ,HYBRID electric vehicles ,DATA transmission systems ,COMPUTER systems ,DIGITAL communications - Abstract
Abstract: Permanent Magnet Synchronous Motor (PMSM) has been widely used in hybrid vehicle industry. A large number of experiments, which are completed with PMSM drive controlled by computer, are needed in its control studies. The speed and reliability of data communication with serial ports between PMSM drive and computer are key points in the experiments. In this paper, a PMSM drive control software based on Microsoft Foundation Classes (MFC) is designed. It had been proved simple and useful with some practical applications. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
35. PCSim: A Multithreaded Full-System Simulator for Embedded Software Development.
- Author
-
Ni, Fan, Gao, Xiaopeng, and Long, Xiang
- Subjects
THREADS (Computer programs) ,SIMULATION methods & models ,EMBEDDED computer systems ,COMPUTER software ,DEBUGGING ,COMPUTER peripherals - Abstract
Abstract: There have been strong demands for a fast full-system simulation platform targeted multicore embedded systems to facilitate software developing and debugging. In this paper, we describe the design and implementation of a fast multithreaded full-system simulator called PCSim as a first step towards such a simulation platform. PCSim models a dual-core PowerPC platform named HPCN-MPC8641D produced by FreeScale with two PowerPC E600 cores and plenty of peripherals. It also models exceptions and interrupts to support whole-system applications including OS. It is based on an interpretive simulation technology to provide flexibility and meanwhile implemented as a multithreaded program to accelerate multicore simulation. It provides three simulation modes: 1) the application mode in which target binary programs run directly on the simulator without any guest OS supports; 2) the full-system mode in which full-system applications including OS are simulated; 3) the CUDA-like mode in which the simulator acts just like the NVIDIA CUDA Device. Currently, PCSim supports several peripherals included in the target platform, and can run a tailored Linux OS with an average execution rate of more than 10.5 MIPS. We instantiate as many as 128 virtual cores to carry out a matrix multiplication computation in the CUDA-like mode and prove it works. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
36. Development of Real-time Software and Stratospheric Airship.
- Author
-
Zhu, Ming and Zheng, Zewei
- Subjects
AIRSHIPS ,COMPUTER software development ,STRATOSPHERE ,FLIGHT control systems ,AERONAUTICS ,SYSTEMS design ,COMPUTER software - Abstract
Abstract: Stratospheric airship is a typical stratospheric platform, and has attracted worldwide research interests for its broad application prospect. In order to design the flight control software of a stratospheric airship, an introduction of realtime software and stratospheric airship is proposed in this paper. The development of real-time software has undergone the historical change which was from the process-oriented design methods to the object-oriented design methods, and all of these methods are prospected in detail. Moreover, a bus structure of flight control system for the stratospheric airship is described, which is the basis for the later flight control software design. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
37. Aerodynamic Characteristics Analysis of the High-altitude Long-range Gliding UUV Based on Cart3D.
- Author
-
Zhu, Xin-yao, Song, Bao-wei, Wei, Jian-feng, and Zhu, Qi-feng
- Subjects
REMOTE submersibles ,AERODYNAMICS ,THREE-dimensional flow ,EULER equations ,ANGLES ,COMPUTER software - Abstract
Abstract: The high-altitude long-range gliding UUV is a new conception UUV which includes unmanned aerial vehicle technology and unmanned underwater vehicle (UUV) technology. This paper simulated the three-dimensional flow field of the high-altitude long-range gliding UUV considering its aerodynamic layout using the software Cart3D, which is based on Euler equations. Then the result was amended with a consideration of viscid. From the simulation, we obtained the curves of drag coefficient, lift coefficient, lift-drag ratio, pitching moment coefficient changing with the angle of attack and the curves of yawing moment coefficient, roll moment coefficient changing with sideslip angle. Finally, its aerodynamic characteristics were analyzed. The results show that the layout of the UUV has a large lift-drag ratio, good longitudinal and lateral aerodynamic characteristics and it can meet the needs of gliding. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
38. MAASS: A Multi-Agent Based Autonomic Storage System.
- Author
-
Wang, Wenfeng and Li, Peiwu
- Subjects
INFORMATION storage & retrieval systems ,AUTONOMIC computing ,MULTIAGENT systems ,CLUSTER analysis (Statistics) ,COMPUTER software ,PROTOTYPES - Abstract
Abstract: Efficiently manage data, uniformly distribute load, gracefully handle node''s join/departure, all these issues are the significant challenges that cluster-based storage systems are confronted with. Agent is a software entity that has the features of autonomy, cooperation, cognition, mobility and etc. In this paper, to achieve the objective of autonomic management, a multi-agent based storage system (MAASS) is presented. First, the architecture of the storage system and the components of agents are illustrated in detail. Second, to provide self-adaptive service, a model of alternate service based on system load is introduced. Finally, a two-stage load balancing scheme is also proposed to balance I/O load and storage resource utilization. A prototype has been developed by this approach in lab. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
39. The Application of Fuzzy Neural Network in Distribution Center Location.
- Author
-
Li, Yongpan and Liu, Yong
- Subjects
FUZZY neural networks ,DATA distribution ,COMPUTER software ,BACK propagation ,COMPUTER algorithms - Abstract
Abstract: In this paper, the establishment of the fuzzy neural network model for logistics distribution center location applied the fuzzy method to the input value of BP algorithm and took the experts’ evaluation value as the expected output. At the same time, using the network learning to get the optimized selection and furthermore get a more accurate evaluation to the programs of location. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
40. E-commerce Network Security Technology Research and Implementation.
- Author
-
Huang, Xiaohan and Zhao, Junzhuo
- Subjects
ELECTRONIC commerce security measures ,COMPUTER network security ,DIGITAL signatures ,COMPUTER access control ,COMPUTER software ,COMPUTER users - Abstract
Abstract: Through the research on the existing e-commerce network security technologies, this paper analyzes the relationship among authentication center, business and customer three entities, and for the security issues existed in e-commerce, presents an improved program through the use of user certificates, authentication, digital signature and other techniques. This program is simple, easy to operate, thus has high practicality and directive significance for enterprises to establish a general e-commerce system. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
41. Search Engine Log based User Behavior Analysis.
- Author
-
Wei, Li, Yan, Yang, Hu, Jin, Long, Tan, Meirui, Ren, and Shoujuan, Zhang
- Subjects
SEARCH engines ,BEHAVIOR analysts ,QUERY (Information retrieval system) ,PROGRAMMING languages ,EXPERIMENTS ,COMPUTER software - Abstract
Abstract: Search engine user behavior analysis is the basis of search engine log mining, laying the foundation for query expansion, etc. This paper analyses the search engine user behavior. Experiments show different user behaviors based on the length of user query strings, the language that users used, the time and cycle that users use search engines and the relations between sessions and query words. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
42. A Solution to a Dos Attack in Wireless Networks.
- Author
-
Jing, Huang and Wen, Wushao
- Subjects
WIRELESS sensor networks ,DENIAL of service attacks ,WIRELESS LANs ,COMPUTER network security ,BROADCASTING industry ,COMPUTER software - Abstract
Abstract: Recently, wireless Local Area Network (WLAN) has gained popularity in a variety of application ranging from government agencies to enterprises due to the advantage of low hardware cost, ease of installation, increased mobility, and network configuration flexibility. Unfortunately, the advent of WLAN arises some issue of security due to the wireless inherent broadcast mechanism. Especially, Dos attacks have become a major threat to current WLAN. Beside the existing common Dos attacks to wireless network, WLAN employ IEEE 802. lli standard is vulnerable to a special Dos attacks, which can be easily carried out by an adversary only with little software. In this paper, we present a solution to such attacks against WLAN in details. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
43. The Evaluation and Improvement of the Whole-decoration Management Process.
- Author
-
Li, Li and Liu, Bingnan
- Subjects
FAILURE mode & effects analysis ,PRODUCT management software ,CASE studies ,FUZZY systems ,FAILURE analysis ,COMPUTER software - Abstract
Abstract: This paper makes residence whole-decoration management as analysis object. As quality fault reflect management problem, it introduce fuzzy comprehensive evaluation into FMEA to analyze the quality problem of decoration and carry out case study. Then integrate FMEA and PDM system to realize emphasis improvement and overall improvement of the whole-decoration management process. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
44. Torsional vibration monitoring platform for turbine generator based on virtual instrument technology.
- Author
-
Chang, Guang, Zhao, Ting, Luo, Liquan, Wang, Yi, and Huang, Baohua
- Subjects
TORSIONAL vibration ,TURBINE generators ,TECHNOLOGY ,COMPUTER software ,SIGNALS & signaling ,ITERATIVE methods (Mathematics) ,PERFORMANCE evaluation - Abstract
Abstract: In order to effectively detect and flexibly analyze the torsional vibration of turbine generator shafts, this paper designs and implements a torsional vibration monitoring platform via virtual instrumentation technology. The platform hardware adopts PXI system. The platform software is developed by LabVIEW language. The monitoring system records speed signals and other signals from the target turbine generators. The system extracts the torsional vibration mode components from the speed signals through iterative filter and analyzes the corresponding characteristics of the mode components. Field tests were conducted in a real power system to verify the performance of the monitoring system. The results show that the torsional vibration monitoring scheme is feasible and the system fulfills the practical application demands. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
45. The Inverter Testing System of Synchronous Motor Based on Modbus Communication.
- Author
-
Wenlun, Cao, Bei, Chen, and Yuyao, He
- Subjects
SYNCHRONOUS electric motors ,ELECTRIC inverters ,PERMANENT magnet motors ,AUTOMATIC control systems ,COMPUTER software ,ELECTRIC potential - Abstract
Abstract: This paper describes not only the hardware architecture of the servo system composed by self-made inverter and permanent magnet synchronous motor, but also its measurement and control system software features. A communication system is built based on the Modbus-RTU protocols which contain the CRC data verification between IPC and the inverter. The measurement and control software of servo system which consists of self-made inverter and PMSM is realized. The results compare with the servo system which consists of Schindler''s ATV31 inverter and SIMO''s asynchronous motor. The experiment parameters include harmonic content which is contained by phase current and voltage, and also the motor speed. The results show that the measurement and control system is stable and reliable. Both the harmonic content of the Inverter output and the motor speed meet the requirements. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
46. Software Size Metrics for Class Diagram.
- Author
-
Chen, Yanyan, Li, Qingyi, and Gu, Xunmei
- Subjects
SOFTWARE measurement ,COMPUTER software ,FUNCTION point analysis ,COMPUTATIONAL complexity ,CHARTS, diagrams, etc. ,SOFTWARE engineering - Abstract
Abstract: Software size is an important attribute in software project planning. Functional Size is defined as a size of software derived by quantifying the Functional User Requirements. Function Point Analysis (FPA) is a standard Functional Size Measurement method. This paper presents a measuring process from Use Case Diagram, Sequence Diagram, and Class Diagram based on FPA. Size metrics for Class Diagram are mainly discussed based classes and relationships. And also an example is given to illustrate this metrics procedure. Finally, a method for only Class Diagram is proposed according to class complexity [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
47. Dynamic credibility detection model base on scene mining for software behavior.
- Author
-
Tian, Junfeng and Wang, Yatao
- Subjects
DYNAMICAL systems ,MATHEMATICAL models ,COMPUTER software ,DATA mining ,PATTERN recognition systems ,COMPUTER algorithms - Abstract
Abstract: Most of the current detection models for software behavior focus on the integrity detecting of its running path, but they rarely consider detecting the function realization integrity in each stage of the software running path. Therefore, dynamic credibility detection model based on scene mining for software behavior called SCDM is proposed in this paper. First of all, this model describes the integrity of various stages’ function implementation by introducing the concept of scene. Secondly, the model used association rules and sequence pattern algorithm in scene mining. Both of the algorithms can extract the hidden and valuable association information from the captured scene information set. And the mining result is used for credibility detection of software behavior. Finally, the results of simulation experiments indicate that CDMBSM model has a good detection performance. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
48. Entropy-based Sequence Clustering Algorithm for Analyzing Software Fault Feature.
- Author
-
Wang, Yanyan, Ren, Jiadong, Liu, Jiaxin, and Wang, Yanning
- Subjects
ENTROPY (Information theory) ,COMPUTER algorithms ,COMPUTER software ,CLUSTER analysis (Statistics) ,MATHEMATICAL sequences ,EXPERIMENTS - Abstract
Abstract: Sequence clustering is significant for analyzing software fault. The existing similarity measures of sequence clustering are inexact for clustering software fault. In this paper, a software fault feature clustering algorithm called ECA is proposed. In ECA the similarity of fault sequence is defined by global and local similarity measure (GLSM) which considers both the items contained in sequence and the order of items occurrence. The clusters are collected according to the entropy of sequences that is computed by global and local similarity. The sequence with the smallest entropy is selected as the centroid of each clustering, and then the clusters are obtained based on the largest similarity between the unselected sequence and the clustering centroid. The optimal number of clusters is determined by the average silhouette coefficient. In order to analyze the fault type, the sequences to be analyzed are matched to each cluster and classed into the most similar cluster. Experimental results show that ECA improves the precision of clustering and reduces the matching scope of the software fault feature. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
49. A general service-based spatio-temporal data analysis framework.
- Author
-
Xu, Jiajia, Wang, Wenjun, Dong, Weishan, Li, Li, and Jiang, Zhongbo
- Subjects
SPATIOTEMPORAL processes ,INDUSTRIAL applications ,PREDICTION models ,DATA analysis ,GEOGRAPHIC information systems ,DATA mining ,COMPUTER software - Abstract
Abstract: During the last decades, spatio-temporal data sets have drawn great attention in research areas and industrial applications. For the purpose of building better predictive models for spatio-temporal data analysis tasks, the data sets are mainly analyzed by traditional Data Mining (DM) tools and Geographical Information Systems (GIS) cooperatively. Usually the geospatial attributes of data need to be generated manually by analyst from GIS. When build/train a model and use the trained model to do prediction, the lack of automation of the geospatial attributes generation makes the task inefficient and hardly repeatable. Still, there are very few tools that can perform spatiotemporal data analysis tasks alone and automate the above procedure. In this paper, we propose a service-based spatio-temporal data analysis framework, which can leverage existing data mining tools and geographical information systems, and perform spatio-temporal data analysis tasks in an integrative manner. In this framework, a data analysis task is divided into traditional data mining tasks and geospatial related tasks, each of which is executed on an existing tool/software. The entire procedure is automated by a bundle of web services. User can analyze data efficiently and repeatably by simply accessing the service. We also develop a discription model based on the Predictive Model Markup Language (PMML) and Keyhole Markup Language (KML) to describe the geospatial related data mining models in our framework. This enables information exchanging capability with other data mining tools and geospatial rendering services. A case study on spatial association rule mining demonstrates the usability of the framework. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
50. Design of Data Encryption in Dynamic Reconfiguration System.
- Author
-
Li, Wancai, Chen, Jianyong, and You, Hongjun
- Subjects
DATA encryption ,ADAPTIVE computing systems ,DYNAMICAL systems ,COMPUTER input-output equipment ,COMPUTER software ,PERFORMANCE evaluation - Abstract
Abstract: The implementation of Computing-intensive tasks which based on reconfigurable computing technology can provide hardwire efficiency and software flexibility. This paper presents a method Based on universal HMI (hardware module interface) design for encryption applications. It can give an effective way to control the status of the user module, independent of the lower level implementation. The validation and performance analysis are also demonstrated by the AES and DES encryption on Xilinx Virtex-2 FPGA. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.