Applied Mechanics and Materials Vols. 48-49

Paper Title Page

Abstract: The major goal of air traffic management is to strategically control the flow of airport traffic. Airport capacity management (ACM) in a dynamic environment is crucial for the optimal operation in airport environment. This paper uses the concept of dynamic receding horizon control (DRHC) to conduct real-time planning for airport capacity management. A gene algorithm is then designed from DRHC point of view. It is shown that DRHC provides a generic and flexible framework for developing real-time allocation algorithms for airport capacity in a dynamic and uncertain environment. Simulation results show that the algorithm is effective and efficient to solve the problem.
561
Abstract: Differential Evolution with Inexact Line Search (DEILS) is proposed to determination of the ground-state geometry of atom clusters. DEILS algorithm adopts probabilistic inexact line search method in acceptance rule of differential evolution to accelerate the convergence as the region of global minimum is approached. More realistic many-body potential energy functions, namely the Tersoff and Tersoff-like semi-empirical potentials for silicon, are considered. Numerical studies indicate that the new algorithm is considerably faster and more reliable than original differential evolution algorithm, especially for large-scale global optimization problem of MBP6/Si(C). Moreover, some ground-state solutions, which are superior to the known best solution given in literature, are reported.
565
Abstract: An alternating high voltage amplifier with four output ranges of 60/120/240/480V at power frequencies based on magnetic coupling and feedback compensation is presented. It is designed for calibration purposes. By the use of high quality transformers, a precise feedback loop and an error-correcting amplifier, a high gain stability and excellent performance over time is achieved. Its measured gain stability of amplitude and phase are within  0.2 V/V and  0.2 rad respectively over hours with a very low total harmonic distortion (THD) of 0.0022%.
569
Abstract: Although road traffic accidents have contingency characteristics, but also can use the method of forecasting theory to forecast. In this paper, we adopt the gray GM (1,1) model and cubic exponent smooth model to optimum combination ,Established traffic accident prediction model based on IOWGA(induction ordered geometric weighted average)and tested this combination forecasting model .Test results show that the combination forecasting model is effective, reliable, high prediction accuracy, can used to real forecast.
574
Abstract: The problem of H-Infinite output tracking control for liner neutral systems with time-varying and nonlinear perturbations is investigated. The purpose of this paper is to ontain a delay-dependent sufficient condition to guarantee H-Infinite output tracking performance and a less conservative result. A liner matrix inequality (LMI) approach is adopted to solve the problem.
579
Abstract: With the data acquisition speed and data-width constantly increasing, how to improve the data processing ability is important in real system. So a high speed system is designed based on FPGA, which is the core logic control device. Each circuit model is discussed in detail, which is designed by VHDL or LPM. And their simulation result is gived in the integration circumstance of MAX+plusⅡ.Compared with DSP, the FPGA data processing system is simpler, more effective and lower cost .
584
Abstract: In this paper, a novel hybrid position/force controller has been proposed for a three degree of freedom (3-DOF) of robot trajectory following that is required to switch between position and force control. The whole controller consists of two components: a positional controller and a force controller. Depending on whether the end-effector is in free space or in contact with the environments during work, the two subcontrollers run simultaneously to guide the manipulator tracking in free space and constraint environments. After the principle and stability of the controller are briefly analyzed, simulation results verify that the proposed controller attains a high performance.
589
Abstract: Using microphone array and beam-forming is an important technology to identify moving noises sources. Capon minimum variation distortion-less response is used proposed to identify the complex noise sources, where many closely distributed noise sources are located nearby. The algorithm is introduced with detail. The identify results is simulated and analyzed with real running vehicle. Comparing the results between common beam forming and Capon method, it shows the Capon minimum variation distortion-less response method has higher resolution and could identify the complex noise distribution of moving vehicles.
593
Abstract: A convertible limited verifier signature (CLVS) can be used to solve conflicts between authenticity and privacy in the digital signatures. In a CLVS scheme, the signature can be verified by a limited verifier. When necessary, the limited verifier can provide a proof to convince a judge that the signer has indeed generated the signature. However, the judge cannot transfer this proof to convince any other party. Also, the limited verifier signature should be converted into an ordinary one for public verification if required. In this paper, we proposed firstly identity-based converible limited verifier signature scheme in the standard model. We give the security proofs of our scheme and show that Our scheme achieved the desired security notions in the standard model (without random oracle).
599
Abstract: A normal model and an immune computation model were modelled to detect recognize and eliminate worms in a static Web system. Immune computation included detecting, recognizing, learning and eliminating non-selfs. The self/non-self detection was based on querying in the self database and the self database was built on the normal model of the static Web system. After the detection, the recognition of known non-self was based on querying in the non-self database and the recognition of unknown non-self was based on learning unknown non-self. The learning algorithm was designed on the neural network or the learning mechanism from examples. The last step was elimination of all the non-self and failover of the damaged Web system. The immunization of the static Web system was programmed with Java to test effectiveness of the approach. Some worms infected the static Web system, and caused the abnormity. The results of the immunization simulations show that, the immune program can detect all worms, recognize known worms and most unknown worms, and eliminate the worms. The damaged files of the static Web system can all be repaired through the normal model and immunization. The normal model & immune computation model are effective in some anti-worm applications.
603

Showing 121 to 130 of 293 Paper Titles