Applied Mechanics and Materials
Vols. 465-466
Vols. 465-466
Applied Mechanics and Materials
Vol. 464
Vol. 464
Applied Mechanics and Materials
Vols. 462-463
Vols. 462-463
Applied Mechanics and Materials
Vol. 461
Vol. 461
Applied Mechanics and Materials
Vol. 460
Vol. 460
Applied Mechanics and Materials
Vol. 459
Vol. 459
Applied Mechanics and Materials
Vols. 457-458
Vols. 457-458
Applied Mechanics and Materials
Vol. 456
Vol. 456
Applied Mechanics and Materials
Vol. 455
Vol. 455
Applied Mechanics and Materials
Vol. 454
Vol. 454
Applied Mechanics and Materials
Vols. 448-453
Vols. 448-453
Applied Mechanics and Materials
Vols. 446-447
Vols. 446-447
Applied Mechanics and Materials
Vols. 444-445
Vols. 444-445
Applied Mechanics and Materials Vols. 457-458
Paper Title Page
Abstract: This paper introduces the control software of SCR system based on the dual-core processor S12XEP100. By the reasonable coordination between the host processor and the coprocessor XGATE, the SCR control system satisfies the increasing demands for real-time. Control performance tests show that the control software of SCR system meets the basic control requirements, also improves the real-time performance of programs effectively, such as urea injection frequency, urea injection quantity and the stability of common rail pipe pressure.
1130
Abstract: This paper focuses on different password guessing attack forms of attacker performed based on the strand spaces model. We extend the attacker’s strand spaces model in order to describe and analyze the guessing ability of the attacker. A protocol has been improved by the use of Hash function. The improved protocol has been proved to resist password guessing attack.
1134
Abstract: An approach identifying the excitation forces based on structural vibrations measured is proposed in the paper. Based on the transfer matrix predicted by FEM/BEM and the vibration vector measured, excitation forces in frequency domain are identified. Further more, acoustic from the underwater structure is predicted by FEM/BEM. To verify the approach, experiment on was carried out for a shaker driven underwater immerged cylindrical model made of steel. Excitations are identified by accelerations measured on the shell. With the forces provided, the radiation of the shell is predicted and compared with that measured. The numerical results are shown to be in good agreement with experimental data.
1139
Abstract: With the rapid development of the automotive industry,there will be automotive electrical presence of strong electromagnetic interference problems. he functionality of the car electronics electromagnetic interference problem has become increasingly prominent, car antenna by the degree of interference is particularly serious, people are urgently looking for a car antenna to solve electromagnetic immunity, which Anosft HFSS software GPS antenna modeling and simulation designing The GPS antenna field pattern and 3D simulation of electromagnetic fields effect analysis designed to provide a theoretical basis for the anti-anti-jamming GPS antenna electromagnetic and provides the premise for the future for other electrical equipment, electromagnetic compatibility research.
1144
Abstract: Using an exponential function to calculate the length of functionalized MWCNTs by various oxidation time and temperature. A scanning electron microscopy (SEM) was used to observed the morphologies of MWCNTs oxidized under various conditions. With the refluxing time and temperature increasing, the length of MWCNTs decreased dramatically.
1148
Abstract: With the level of China's power information technology increased, any information security problem appear in power system are likely to endanger the safe operation of power grid. USB dongle is a popular authentication security tool which can effectively prevent the illegal use of software. In this paper, use electrical simulation training software as an example, apply encryption lock as an important tool for the security protection of electric power simulation training software, introduce the principle and role in information security protection of encryption lock in detail.
1152
Research on Application of Wavelet Denoising Method Based on Signal to Noise Ratio in the Bench Test
Abstract: During the tests of the vehicle automatic transmission bench, the acceleration signal is needed to be denoised. As a means of denoising, wavelet threshold denoising method has small amount of calculation and better filtering effect. However, adopting different wavelet basis functions as well as different threshold rules might have a direct effect on the signal denoising. In this paper, we firstly construct the simulated noisy signal approximated to the observed signal, and then do the signal denoising experiment of parameter matching. Secondly, seven Symlets wavelet basis functions and four classical wavelet threshold rules are selected and tested one by one. Signal to noise ratio (SNR) and root mean square error (RMSE) of the denoised signal, the evaluation indicators, are calculated and carried out in accordance with the merits of denoising effect. Thus the optimal combination of the fixed threshold rule and sym8 wavelet basis function is obtained. Finally, this combination is used in the bench test to denoise the angular acceleration signal, and good filtering effect is achieved.
1156
Abstract: Based on existing software test case designing method, combining artificial intelligence domain knowledge and methods, we design a method of Predicate Calculus for Test case designing, using this method to provide detailed information to testers.
1163
Abstract: This paper proposed a defects extraction method based on one-dimensional adaptive Gaussian filtering. To overcome the difficulties as various defects, low contrast, complex background and overall uneven brightness, this method designed a new one-dimensional adaptive Gaussian filter based on the defect size. According to the gray change of the magnetic tiles surface image in the different regions, we progressed the Gaussian filtering based on the selective one-dimensional scan line by region, and made the width of the filter can automatically adjust with the defect size, simulated the threshold value curve, and extracted the magnetic tiles surface defects. The experiment shows that this method can accurately and quickly extract the various types of defects of the magnetic tile surface.
1167
Abstract: In recent years, the rapid development of information and electronic technology has attracted a lot of suppliers to produce many different sensor devices. This results in a lower price of these sensor devices. Consequently, the application of these control systems is getting popular. In the popularization process of these important information and electronic technology, there is a group of self-less and enthusiastic designers, who release their important research outcomes as Open Source resources. These resources are available to other people and free of charge. In addition to benefitting the users, more various-fields enthusiastic participants are attracted to dedicate themselves to the development of these Open Source resources through this benign interactive way. This leads to a more quickly and more perfect development of the Open Source applications in different fields. The trend of applying Open Source resources to the development in the area of Unmanned Aerial Vehicle (UAV) and Digital photogrammetric processing is clearly and significant.
This study focuses on the surveying of different Open Source resources for constructing a UAV-based photogrammetric data acquisition system. Many available Open Source resources used to construct this system are surveyed, such as the UAV flight control technology and the capture and post processing technology for the digital aerial photos. Two types of UAV photogrammetric data acquisition system based on Open source resources are accomplished as well.
1172