Applied Mechanics and Materials
Vol. 684
Vol. 684
Applied Mechanics and Materials
Vol. 683
Vol. 683
Applied Mechanics and Materials
Vol. 682
Vol. 682
Applied Mechanics and Materials
Vol. 681
Vol. 681
Applied Mechanics and Materials
Vol. 680
Vol. 680
Applied Mechanics and Materials
Vol. 679
Vol. 679
Applied Mechanics and Materials
Vol. 678
Vol. 678
Applied Mechanics and Materials
Vols. 675-677
Vols. 675-677
Applied Mechanics and Materials
Vols. 672-674
Vols. 672-674
Applied Mechanics and Materials
Vols. 670-671
Vols. 670-671
Applied Mechanics and Materials
Vols. 668-669
Vols. 668-669
Applied Mechanics and Materials
Vol. 667
Vol. 667
Applied Mechanics and Materials
Vol. 666
Vol. 666
Applied Mechanics and Materials Vol. 678
Paper Title Page
Abstract: Presents a fuzzy logic inference algorithm based on the feature of concentration difference to solve the problem of odor source spatial positioning to mobile robot. The algorithm simulates the dynamic stimulation’s behavior of merit, let the robot to make decisions on the direction of travel by sensing the rate of change of concentration in different positions, and finally achieve the function of autonomous positioning to odor source. Let the robot's actual environment as the premise, design a fuzzy inference machine, and determine the fuzzy inference machine’s input variables, output variables, language value of input and output and corresponding fuzzy inference rules. Simulation results show that the proposed fuzzy logic algorithm has a strong applicability on bionic odor source spatial positioning to mobile robot; it can make the robot search to the odor source faster and more accurate.
429
Abstract: By studying the advantages and disadvantages of the conventional automatic linear door systems, it was found that flat permanent magnet linear synchronous motors (PMSLM) can satisfy high-speed long-stroke heavy-load door systems better than other techniques. In order to reach a long lifespan, the authors compared five possible topologies with flat PMLSM, and then designed a kind of magnetically suspended door system driven by a single-sided flat PMLSM and suspended by the normal force of the motor. The results demonstrate that the prototype door system satisfies the requirements.
436
Abstract: According to the propagation characteristics of radio wave in mine tunnels, in order to realize the communication and detection in underground tunnels, a four-arm equiangular spiral antenna is presented in the paper, which based on the principle and structure of traditional two-arm spiral antenna, and reduces the antenna size. CST software is used to construct and simulate the antenna model. The antenna is tested by the PNA3621 vector network meter. Simulation and measurement results show that the antenna has good performance in 652MHz-3.012GHz frequency range, antenna input voltage standing-wave ratio VSWR and return loss RL are ideal, and antenna pattern is better, which agrees well with the simulated results.
447
Abstract: Laser communication with its unique features was more and more get the people’s attention. The emission source of the laser video communication system was studied in this article. The emission source included laser, driver circuit, modulation circuit and filter circuit. The laser model and the parameters of driving circuit were determined according to the characteristics analysis of laser communication. The modulation circuit was designed by using MC1596 chip, and the carrier circuit was designed by QFT-100MH chip. Finally, the commissioning test was carried out, the results show that laser can work stably by the driving circuit, the functions of carrier circuit and modulation circuit is also normal. Therefore, the emission source can be used for laser video communication.
452
Abstract: The first step is cell search procedure for a user terminal in TD-LTE. It’s the premise of the establishment of a communication link between the user terminal and the base station. To detect PCI correctly plays a crucial role in the cell search procedure, and it also affects the mobility of the user terminal. It’s a problem that is worth studying how to determine the PCI planning in TD-LTE. This article first briefly introduces the PCI parameter and the cell research procedure, and specifies the PCI is the important parameter for LTE, and then describes the planning principles of the parameter. Finally, it specifies the suggestions and situations of the PCI planning in test network of TD-LTE.
456
Abstract: By analyzing the priority arbitration bit by bit without destroy in can bus rule, the article elicits the conclusion that if static priority based on the affirmatory system model is used, the lower priority’s messages will be much more delayed, even lose some data when the bus’s bandwidth is widely used and scheduling can’t be modified during the system. The dynamic priority promoting method and math model of SQSA and SQMA is achieved in the article, it analyses the model’s rate of taking in and sending out in large quantities, the largest delay, the problems and solutions when using SQMA. In the end, It is validated that the method of improved dynamic in the article has good performances on the network rate of taking in and sending out in large quantities, the average delay and the rate of network usage by emulational experiments.
461
Abstract: This paper combines an analysis of structural modeling on security vulnerabilities and a focused behavioral model examination to develop a vulnerability model to depict and reason about security vulnerabilities. An in-depth analysis of the structural models and the corresponding diagram of the applications come from the investigation of not only multiple vulnerable operations on multiple objects being involved in exploiting vulnerability but also the vulnerability data and corresponding data flow inspections deriving from behavioral modeling of the application. We also propose a vulnerability model-based security testing approach that automatically generates security test sequences from vulnerability model diagram and transforms them into executable tests on the basis of the vulnerable operations and vulnerability data.
468
Abstract: The benefits of e-government depend on the number of citizens who take advantage of them. The purpose of this research study was to determine barriers to e-government use as perceived by citizens at the municipal level in China , The findings of this study show that, government leaders should work on increasing Internet access, usability of their e-government applications, trust in the Internet, and trust in the perceived capability of their agencies to conduct online transactions securely.
473
Abstract: The advance of wireless communications brings in various schemes of wireless digital communication technology. Analog communication and broadcasting services convert into digital services in many countries. The IBOC (In-Band On-Channel) system has been developed to work in the same band with the conventional analog radio and broadcasting digital signal simultaneously. HDR (HD-Radio) standard of IBOC (In-Band-On-Channel) can use coherent demodulation using pilot sub-carriers. In this paper, the performance of HD radio system is evaluated. To contribute to decision of digital radio standard and design of digital radio transmission network, the simulation results will give a help.
477
Abstract: The election of cluster head (CH) in LEACH lead to CHs nonuniformed distribution and energy consumption disequilibrium and some of the network nodes dead earlier. For the disadvantage, a kind of improvement algorithm based on geography and energy for LEACH router protocol was put forward in this paper, and simulated in the NS2.The new algorithm makes the CHs located in the center of the cluster, avoiding part of nodes far from CH wasting too much energy,and then.The simulation shows that the improved LEACH protocol is more energy-efficient than LEACH, and can prolong the network lifecycle.
482