Applied Mechanics and Materials Vols. 121-126

Paper Title Page

Abstract: The detector sets generated by Real-Valued Negative Selection Algorithm (RNSA) are usually numerous, without optimization, and can not work under real-time condition. Thus, a novel approach of detector generation for RNSA based on Clonal Selection and Neighborhood Search (CSNS-RNSA) is proposed. Clonal selection of the immune mechanism is introduced to implement global search in a quasi-random sequence. The Gaussian mutation operator is proposed to get the global optimal detection sets of N-dimensional space through Neighborhood search. The resulting detector sets achieved a good coverage of non-self space, and also significantly reduced the number of detector sets, thus overcome the limitations of original RNSA. Finally, experiments verify the effectiveness of the algorithm.
3736
Abstract: In this paper, a compact and effective web structure mining algorithm is developed according to the hypertext induced topic search (HITS). Firstly, the environments of traditional web structure mining are explored. Secondly, by analyzing the existing techniques, the existing problem and the lack of previous methods are explored. Finally, amid to overcome the deficiency of the traditional method, the paper introduced the time parameter and proposed a novel web structure mining algorithm. It turns out that the proposed algorithm has better effective and accuracy compared to the traditional methods.
3741
Abstract: Based on the principle that the same class is adjacent, an anomaly intrusion detection method based on K-means and Support Vector Machine (SVM) is presented. In order to overcome the disadvantage that k-means algorithm requires initializing parameters, this paper proposes an improved K-means algorithm with a strategy of adjustable parameters. According to the location of wireless sensor networks (WSN), we can obtain clustering results by applying improved K-means algorithm to WSN, and then SVM algorithm is applied to different clusters for anomaly intrusion detection. Simulation results show that the proposed method can detect abnormal behaviors efficiently and has high detection rate and low false positive rate than the current typical intrusion detection schemes of WSN.
3745
Abstract: The equipments in computer rooms are complicated in nature. Many factors may influence their normal operations, for example: voltage, temperature, humidity, and the normalcy of systems. It would be prudent to have a monitoring system to prevent from unpredictable problems. Most monitoring systems in the market can only issue alarms in abnormal situations and then analyze the aftermath. They are also expansive and lack the ability for distant instant control. To tackle this problem, after our successful and practical experiments, we utilize GSM text messaging ability (i.e. SMS, short message service) and make distant monitoring possible. The monitoring system is established with a reasonable price that is well below current market. With this system, the manager/administrator can monitor the real-time status of equipments in computer rooms, send control commands through SMS and then get them executed to solve the problems instantly and effectively.
3750
Abstract: Circulant matrix is a special case of Toeplitz matrix, which is widely used in many domains of specialization, especially in image and digital signal processing. Calculating the inverse of this category of matrices consists of the following three steps: (1) transform the first row vector to frequency space by using DFT; (2) calculate the inverse of each amplitude in the spectrum; (3) apply IDFT to the adjusted spectrum and reconstruct the inverse of the original circulant matrix. This paper implements such a fast algorithm on the GPU, which is proved around five to ten times faster than is executed on the CPU.
3755
Abstract: A BP neural network algorithm which bases on the particle swarm optimization(PSO) is advanced in this paper, Thus formed the PSO-BP network algorithm. It makes use of PSO to reach the global optimization of BP neural network’s weight value and threshold value,and the optimized BP network is used to optimize the automotive suspension. Simulation results shows that this algorithm can improve the weak points of the BP learning algorithm such as the slow convergence rate and the poor global covergence. It can also reduce the number of training and the error obviously.
3760
Abstract: This paper bases on the magnetic method combining the tensor maxwell in considering magnetic saturation method, in considering magnetic saturation effect and actual switched reluctance motor stator and rotor under the premise of very wide, deduces and sets up a analytical models of radial force which can apply directly to switched reluctance motor stator and rotor with unequal extremely arc equal two circumstances analytical models of radial force. This model conforms to the actual switched reluctance motor structure and operation characteristics and structure optimization design for switched reluctance motor, electromagnetic vibration and noise prediction and control provides theory basis. With a prototype as an example, this paper calculated results and the analytical model of the finite element analysis of the results compared to verify the correctness of the analytical model built.
3765
Abstract: The purpose of this study was to establish a complete dynamic analysis method for motorcycle engines to serve as course material for study of machine dynamics. Virtual engine software was also developed for users to understand how engine performance is influenced by parameters such as engine accelerator, engine weight, and flywheel. First we applied the vector-loop approach to deduce the kinematic analysis of engine mechanism. We then applied Newton’s method to analyze the bearing force and friction of each link. Next, we used a power equation to deduce the equation of motion of the system, and used the Runge-Kutta method to perform normal dynamic analysis. Finally, by combining computer programs with the Open Graphics Library (OpenGL), we developed virtual engine software for users to observe motion and performance of engine. The results of this study provide engineers a computer-aided design program for automatic generation of all optimal pipes. It is beneficial to pipe design ability.
3770
Abstract: Titanium Nitride (TiN) coatings with high surface hardness, good wear and corrosion resistance, low friction coefficient have been widely used in many applications such as a hard coating of cutting tool, a diffusion barrier layer. In this work, TiN thin films were deposited by D.C. magnetron sputtering process on SUS 304 steel substrate. Magnetron sputtering provides a wide variation of the deposition parameters which affect the morphology of the films and, consequently, their properties. The effects of substrate temperature on the microstructure and corrosion resistance of TiN films were studied in details using atomic force microscopy and potentiostat test. Considerable improvements in the surface roughness and corrosion resistance were observed when the substrate temperature was increased from C to C.
3779
Abstract: Memory cells of space vehicle computers generate errors in their stored data because of radiation. The main reason of the error is single event upset (SEU). Hamming code which has Capability of correcting one bit and detecting two bits is usually used in space vehicles to secure the memory data. As the density of the memory is more and more high, the possibility of multiple bits upset (MBU) increase and hamming code may be inadequate. In this paper, a (15,8) code is presented which can correct all double-adjacent errors and triple-adjacent errors in addition to signal error correction (SEC) and double error detection (DED). It is a powerful and efficient solution to SEU and MBU.
3784

Showing 721 to 730 of 950 Paper Titles