Applied Mechanics and Materials
Vol. 555
Vol. 555
Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials
Vols. 548-549
Vols. 548-549
Applied Mechanics and Materials
Vols. 543-547
Vols. 543-547
Applied Mechanics and Materials
Vols. 541-542
Vols. 541-542
Applied Mechanics and Materials
Vol. 540
Vol. 540
Applied Mechanics and Materials
Vol. 539
Vol. 539
Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials Vols. 548-549
Paper Title Page
Abstract: Taking ejection process of the ink droplets from ink-jet nozzle as the prototype, a similar numerical model of droplet ejection was established. The VOF method was applied to track the interface of droplet ejection process and it is shown that the numerical results simulated by the VOF method were accurate and reliable. Six kinds of liquid with different physical properties were chosen as the research object. The numerical results were analyzed and compared. Finally, the effect of the surface tension, viscosity and density on the droplet ejection process was discussed.
1257
Abstract: As the stage of bioinformatics has been upgraded, classification of certain pathogen has been improved into a new manner. The main topic of this research is genetic singularity of HCV (Hepatitis C Virus) and our objective is to assay features of the HCV's amino acid under usage of Support Vector Machine (SVM) algorithm. HCV data used in our experiment has 10 kinds of sequences and 257 kinds of data. According to data analysis, some peculiar genetic patterns of HCV’s linearity that discord pre-existing neural network and C5.0 were found.
1265
Abstract: Extracting and integrating information of complicated model has bottlenecked the intelligence of three-coordinate measuring. Formation mechanism and sweeping procedure of Pro/E swept feature was studied thoroughly. Based on Pro/Toolkit and VS2008, an application program of extracting information of complicated model which is illustrated by an example of teacup is presented in this paper.
1273
Abstract: Inclination measurement errors have a significant effect on the positioning accuracy of an automated ship celestial navigation system using the existing theoretical models. To reduce such undesirable effect, we propose a nonlinear least-squares model based on global optimization and provide a genetic algorithm solution using proportional selection, arithmetical crossover, Gaussian mutation, and elitist strategy. The performance of the model and solution is demonstrated by an instance of simulation experiment. The results indicate that the global near-optimal solution of a ship’s attitude and position can be obtained with accuracy of arc-second level, and the accuracy is better than that of the existing models by one to two orders of magnitude under the same measurement conditions.
1277
Abstract: This paper works on the scheme of multi-band carrier aggregation in satellite mobile communication system. According to the transmission characteristics of carriers in different frequency bands, the transmission parameters of OFDM in different bands have been got. The applicability of the traditional carrier aggregation scheme in satellite mobile communication system has also been discussed. A scheme of the cross band carrier aggregation in satellite mobile communication system and the corresponding synchronization scheme of data symbols are given. Numerical calculation and analysis are given to confirm the rationality and effectiveness.
1282
Abstract: The problem of admission control caused by the limitation of resource in hotspot beams in satellite system is considered in this paper. Based on the idea of borrowing resources from surrounding beams, we give a scheme that the beam reserve resources is borrowed proportionally. After that, the original admission control algorithm based on service priority is modified in order to protect access rate of the low priority service. Simulation results prove that the proved scheme can increases the available beam load capacity effectively and provide a guarantee for the access of those services with low priority.
1286
Abstract: PV system model was set up in Matlab, and improved disturbance observation of MPPT tracking technology was proposed, as well as the reactive decoupling of active inverter control strategy. By the UPI of PSASP, Matlab engine was used in a user program to achieve the cross-platform interactive simulation between PSASP and Matlab simulation software. Controlling the simulation process, the problems of variable transmission has been solved. And the PV systems and PSASP transient stability calculation program can conduct interaction simulation on hybrid step.
1290
Abstract: For the embedded devices Equipped with ARM processors and WinCE operating system,This paper proposes the use of LabVIEW programming software Touch Panel module for network communication programming.This paper describes the use of PB (Platform Builder) tools for WinCE operating system custom-tailoring process.Compared with traditional text-based programming,LabVIEW graphical programming be shorter development cycle, the program interface more image-attracting.Take network communication as an example,the paper demonstrate the use of LabVIEW software written network communication program for embedded devices equipped with WinCE operating system,and achieved between embedded devices and PC data communication via TCP protocol,and get the expected results, provide a fast and reliable method for the next research.
1295
Abstract: Modeling Internet structure as an autonomous system (AS) graph is considered one of the most common methods to study the Internet. AS-graph is constructed by utilizing ASes from the Internet. The AS number was 16-bit address. It reduced the size of ASes scope in one hand and made the AS graph small and easy to be produced and modeled. However, the number of ASes has exceeded the 16-bits limits. The 32-bit addressing has emerged as a method to tackle this problem. This increasing in the AS number scope converted the AS graph into a massive graph with unpredicted number of ASes. In this paper, we attempt to study the impact of 32-bits addresses on the AS graph. Graph parameters have been utilized to measure this impact. To this end, we have constructed two AS-graphs, a 16-bits-AS graph and a full AS graph. We have compared these graphs according to cluster coefficient, betweenness centrality, node degree and average shortest path. Our results demonstrated that the 32-bits ASes are popular. Moreover, these ASes have an effect on reducing the value of the global cluster coefficient and increasing the average shortest path. We observed that the number of vertexes that connect 16-bits and 32-bits ASes is small and requires more inferring.
1299
Abstract: In a Mobile Ad hoc NETwork (MANET), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder (s). The intruder can be an enemy in a battlefield, or a malicious moving object in the area of interest. Unfortunately, many anomaly intrusion detection systems (IDS) take on higher false alarm rate (FAR) and false negative rate (FNR). In this paper, we propose and implement a new intrusion-detection system using Adaboost, a prevailing machine learning algorithm, and its detecting model adopts a dynamic load-balancing algorithm, which can avoid packet loss and false negatives in high-performance severs with handling heavy traffic loads in real-time and can enhance the efficiency of detecting work. Compared to contemporary approaches, our system demonstrates an especially low false positive rate and false negative rate in certain circumstances while does not greatly affect the network performance.
1304