Applied Mechanics and Materials Vols. 198-199

Paper Title Page

Abstract: More and more applications need The ability to customize the architecture to match the computation and the data flow of the application, so increasingly new system implementations based on reconfigurable computing are being considered. Reconfigurable computing has potential to accelerate a wide variety of applications; its main feature is the ability to perform computations in hardware to improve performance, while retaining the flexibility of software solutions. An operating system (OS) for reconfigurable computing uses new versions of algorithms for the scheduling, the operating system must decide how to allocate the hardware at run-time based on the status of the system. This paper discusses the scheduling algorithm for reconfigurable computing platform, covers two aspects of reconfigurable computing: architectures and design methods. The tasks are divided into two categories in this survey, consider the issues involved in reusing the configurable hardware during program execution. And improve μC/OS-II to manage the use of reconfigurable resources, responsible for task scheduling, helping the programmer to concentrate more on application development.
1372
Abstract: In view of the DTV system demand, from the encryption digital television key production, the key protection, the key renewed the entire key management process which transmitted until the key to carry on the discussion, proposed with the commercial CAS different key management strategy, improved the key production and the renewal way, designed has been suitable for the above digital television decipherment scheme key management plan, through from produced the key the method to reduce the correspondence expenses effectively, might transmit under the limited band width most according to Pass through in the ground clear channel simulation transmission, the simulation result indicated that, this plan deciphers effect and the primitive sound/video frequency difference is not big, therefore this plan has the low mistake sensitivity. Through to the simulation result analysis, proved this article designs the decipherment scheme suits the DTTB system compared to wired environment under CAS.
1378
Abstract: When extracting the face image features based on pixel distribution in face image, there always exist large amount of calculation and high dimensions of feature sector generated after feature extraction. This paper puts forward a feature extraction method based on prior knowledge of face and Haar feature. Firstly, the Haar feature expressions of face images are classified and the face features are decomposed into edge feature, line feature and center-surround feature, which are further concluded into the expressions of two rectangles, three rectangles and four rectangles. In addition, each rectangle varies in size. However, for face image combination, there exist too much redundancy and large calculation amount in this kind of expression. In order to solve the problem of large amount of calculation, the integral image is adopted to speed up the rectangle feature calculation. In addition, the thought based on classified trainer is adopted to reduce the redundancy expression. The results show that using face image of Haar feature expression can improve the speed and efficiency of recognition.
1383
Abstract: Wireless sensor networks are widely deployed in various areas of our daily life. The lifetime of wireless sensor networks takes significant effect in the performance of the whole network. Many network protocols are proposed to improve the lifetime of networks, and among them, low-energy adaptive clustering hierarchy (LEACH) is a promising protocol with self-organization of the clusters and periodic rotation of cluster heads selection to distribute energy consumption uniformly. LEACH performs well compared with other protocols on lifetime while it is simplified and has aspects to improve. In this paper, we modified the procedure of cluster heads selection in LEACH and proposed a protocol LEACH-CHE with consideration on the energy consumption of cluster heads. We analyzed LEACH-CHE and with the results of simulations, LEACH-CHE over performs on network lifetime compared with the original LEACH.
1389
Abstract: The existing transportation service system in public travel route can not satisfy the people's actual travel need because of various technologies reasons. In our study, we set the tourist attractions as a vertex, and simplified the traditional algorithm for complex network computing. Aim to use the advantage of Dijkstra algorithm, the Dijkstra algorithm was applied to tourism path search. The experimental results have illustrated that the Dijkstra algorithm can accomplish a good result in search efficiency.
1395
Abstract: According to disadvantages of big steady-state error, low convergence rate, and local convergence of traditional Constant Modulus blind equalization Algorithm (CMA), an orthogonal Wavelet Transform blind equalization Algorithm based on the optimization of Artificial Fish Swarm Algorithm(AFSA-WT-CMA) is proposed. In this proposed algorithm, the weight vector of the blind equalizer is regarded as artificial fish, the equalizer weight vector can be optimized via making full use of global search and information sharing mechanism of artificial fish school algorithm, the de-correlation ability of normalizing orthogonal wavelet transform. The computer simulations in underwater acoustic channels indicate that the proposed algorithm outperforms CMA and WT-CMA in convergence rate and mean square error.
1399
Abstract: With the wide application of data streams mining, the study on data streams classification algorithm with concept drift has become an important piece of work. In light of the characteristics of data streams, this paper puts forward a kind of improved SPRINT classification algorithm adaptive to the occurrence of concept drift. It is proved by experiments that it can automatically adjust the number of training window and new sample during model reconstruction according to the current situation of concept drift and consume less sources and have higher classification accuracy.
1403
Abstract: Continuous Phase Modulation (CPM) schemes belong to a class of constant-envelope digital modulation schemes, the constant-envelope nature of the CPM signals makes them robust for the nonlinear and fading channels, and very useful for the satellite and/or the mobile radio channels. Comparing to PSK modulation, CPM modulation can not only provide spectral economy, but also exhibit a “coding gain”. CPM can be decomposed into a Continuous Phase Encoder (CPE) followed by a Memoryless Modulator (MM), this allows many new coded modulation schemes of combination of convolutional encoder and CPM modulator to be possible, such as serially-concatenated CPM (SC-CPM), SC-CPM with Convolutional Codes over Rings, pragmatic CPM (P-CPM), Concatenation of convolutional endocder and extended CE(CCEC), etc. Some simulations show that these new CPM schemes can offer superior performance.
1408
Abstract: In real production processing, job shop scheduling problem (JSP) is often express as dynamic scheduling problem. In this article a hybrid genetic algorithm and handling strategies are used for real job shop scheduling problem. It gives the scheduling result with the appropriate handling strategies to the stochastic events such as equipment breakdown and urgent orders. The data of Shanghai Shen Mo Die & Mold Manufacturing Co., Ltd (ShenMo) is used for the application of dynamic scheduling simulation, and the results of which show that the proposed method can satisfactorily solve the stochastic events of scheduling.
1413
Abstract: with the parallelism of task implementation, spatial distribution, well system fault tolerant capability and scalability, the multi-agent are widely used in many fields. The multi-agent synchronization control technology has been becoming a hot research at home and abroad. This paper set up unified time and frequency models of both homogenous and heterogeneous-agent, to explore the expression of multivariate time consistency problem. In addition, exploring the received signal strength (RSS) based time synchronization algorithm can enlarge the action range of multi-agent with keeping topologically connection, it also can ensure time synchronization and distance measurement when multi-agent lose satellite positioning function.
1417

Showing 271 to 280 of 352 Paper Titles