Applied Mechanics and Materials Vols. 135-136

Paper Title Page

Abstract: Under the condition that the nonlinearity of ship steering model is considered and the assumption that the parameters of the model are uncertain, we proposed an adaptive control algorithm for ship course nonlinear system by incorporating the technique of neural network and fuzzy logic system. In the paper, we presented the structure and characteristics of Adaptive Neuro-Fuzzy Interference System (ANFIS), established the ship course controller, and realized an online learning algorithm to do online parameter estimation. We utilize fuzzy logic to solve the uncertainty problem of control system, neural network to optimize the controller parameters. To demonstrate the applicability of the proposed method, simulation results are presented at the end of this paper. The experiment shows that the ANFIS controller can achieve high performance control under parameter perturbation and other disturbances.
1037
Abstract: With the continuous progress and development of society , people's incomes increase greatly, and more attention is paid to improve the safety of their living conditions as well as the reliability of life quality. An expert system of Security Alarm Monitoring for Smart Home filed based on JESS is demonstrated in this paper, according to the tendency development of security market worldwide and the deep-level development of security technology. The security system proposed in the paper is based on the knowledge of Expert System, Embedded Technology and Wireless Sensor Technology.etc. It mainly includes Access Control Subsystem, Steal Precaution Subsystem, Fire alarm subsystem, Gas Leak Subsystem. etc. The expert system based on Jess rules engine is developed by Java. It is able to detect whether the family members and family situation in a safety state according to the various scenes within a family, then make timely reaction to non-security state and take appropriate measures to ensure security at home guided by a set of procedural rules .The effectiveness and feasibility of this system has be proved by the simulation results.
1044
Abstract: The high frequency of financial crises make the risk management of financial asset become the focus of the financial investors and scholars. The traditional VaR based on assumption about the normal distribution of yield is not suitable for the real thing in China. The characteristics of stock market yield in China is fat tail and non-symmetry. In this paper, the dynamics of VaRs based on TARCH model with the skew t distribution are computed and analysed. And then failure rate of VaRs are compared under normal distribution, student's-t distribution and GED distribution. The results show that the most accurate VaR is the one with the skew t distribution, which describes the reality of the stock market better than others.
1051
Abstract: With a thermo gravimetric analysis apparatus combustion characteristics experiments of coal residue cornstalk and mixtures of them were done at 20 C/min heating rate. Then the combustion characteristic Parameters were obtained by above experiments. The c combustion activation energies were acquired by kinetics analysis. The results show those: the ignition characteristic and synthesis combustion characteristic of coal residue are bad. The ignition characteristic and synthesis combustion characteristic of cornstalk are better. The combustion characteristics of the mixture of coal residue and cornstalk are determined by mixing ratio. The ratio of cornstalk is more and the synthesis combustion characteristic is better.
1057
Abstract: In order to study the rapid and efficient identified method of accident-prone section in montane highway, the method of principal component - gray clustering analysis has been proposed. By deep analysis of the characteristics of accident-prone section, the identified indexes of accident-prone section have been screened out, the reducing dimensionality of principal component analysis and incomplete information processing of gray clustering analysis have been organically integrated, and the clustering weight coefficients are creatively determined based on the information content. Based on data investigation and treatment, using the identified method of principal components - gray clustering analysis, the security level of sections is achieved by programming. The results show that this identified method has high precision and convenience in aspects of aggregative indicators selected and clustering value calculated. The identified method can effectively identify the security level of accident-prone section, and divide the section security level into 4-grade. Aiming at the identified results, the security measures are further researched. So the identified method has practical value.
1060
Abstract: This article has designed a hypothesized outdoor landscape roaming based on 3dsmax and virtools hypothesized landscape roaming method study specifically. It has simultaneously pointed out the modeling and bestows on the material quality, foundation the light the matters needing attention when 3ds max as well as when these two software Intermediate-range enters, derives the method and the skill, finally introduced how to realize hypothesized landscape roaming in virtools.
1067
Abstract: In this paper, we used web Service Bridge to solve the ASP.NET AJAX client cannot directly invoke the remote web service problem caused by the security restrictions of JavaScript. Web Service Bridge makes the AJAX client invoke the remote web services as if it invokes the local web services by defining the local service proxy for remote web service in XML declaration. The example demonstrates that, compared to the traditional method of programming local service proxy, web Service Bridge is more convenient and efficient to implement a large number of remote web service invocations in Mushup application.
1072
Abstract: In order to implement Exam-Integrating system with the function of auto generating papers, in this paper, we propose a program which processes the non-text information in the system such as complex formulas and graphics. The program takes model of reflection technology, with the use of ASP .NET technology and SQL Server 2005 database. The system completes both test library by hand and Exam-Integrating by specified parameters, and then generates the paper by automatically computer type setting.
1077
Abstract: In order to better meet the government, enterprises, schools and other units of information transmission of the security and confidentiality, this paper studies SSL handshake protocol and SSL Record Protocol, authentication technology and PKI technology, based on in-depth study of Web-based Off mode SSL VPN system architecture, gives a more detailed block diagram of the design ideas and design. Finally, a C + + based on the SSL VPN authentication methods, The results of the research staff with the actual VPN network value.
1081
Abstract: Due to the particularity of railway luggage & package shipping organization and large requirement of luggage & package shipping, the problem of making luggage & package shipping plan is increasingly complex. In order to improve the efficiency of making luggage & package shipping plan and assist human work, this paper mainly discusses how to optimize the plan. Based on analyzing the characteristic of luggage & package shipping, this paper analyzes lots of factors that affects the rationality of the plan and establishes an optimization model with the objective of minimizing general cost based on service network, and then develops a Heuristic Algorithm. At last, the application of service network design model for luggage & package shipping and its solution approach are illustrated with the case.
1087

Showing 171 to 180 of 198 Paper Titles