Advanced Materials Research Vols. 1030-1032

Paper Title Page

Abstract: Based on the full understanding of the current status of the reactive power optimization study, we propose an improved type of immune algorithm to solve the reactive power optimization problem by introducing the immune clonal selection algorithm (ICSA) genetic manipulation, affinity of mature, cloning and memory mechanism, and use the appropriate operator to ensure that the algorithm can quickly converge to the global optimal solution to improve the efficiency of the algorithm solving and solution accuracy, avoiding the "curse of dimensionality" and precocious problems. ICSA algorithm is proposed to improve the convergence speed simultaneously. Better maintain the diversity of the population. Effectively overcome the premature convergence of evolutionary computation itself is difficult to solve the problem. Four different examples of calculation results show that this method has superior computational efficiency and convergence capability, high quality and are solved, very suitable for solving large-scale power system reactive power optimization problem, with a strong practical value.
1751
Abstract: This paper briefly analyses the principle of MELP vocoder algorithm, and TI's TMS320C5509(C5509) DSP is selected as an implementation platform of 2.4kbps MELP speech-coding algorithm. To ensure the rational and efficient utilization of the limited memory resources, this paper introduces the processing method of MELP algorithm based on frame structure and gives a profound analysis on how to configure its memory space of the selected DSP by analyzing its memory structure and considering the specific circumstances of the MELP vocoder algorithm. Finally, this paper gives the memory configuration during the implementation of MELP vocoder on TI's TMS320C5509 DSP.
1755
Abstract: With the development of information, the number of applications is growing. The questions of cost, support, risk and safety also arise. In order to realize low cost and high efficiency, we have studied the efficient operation technologies, including application isolation technology, virtualization technology, performance evaluation technology, etc. Using these technologies, we have realized efficient integration of operation resources, comprehensive optimization of application performance, and high satisfaction of end users.
1760
Abstract: Aiming at the existing defects of evidence dempster-shafer theory (DST) in dealing with high conflict evidence, we proposed a new method to improve DST. By introducing concept of fuzzy consistent matrix, calculate the weights of factors, and put different sources of evidence into distinguish, and finally cast more than one vote to prevent the phenomenon, the average convergence of evidence. What’s more, the improved DST new method is applied to the rolling bearing fault diagnosis of CNC machine workbench .The test results show that the improved new synthetic formula increases the accuracy of fault diagnosis Ball, the conflict of evidence synthesis results better, to achieve better results.
1764
Abstract: base on the open system of the Mobile environment in its own Mobile IP , Mobile IP faces on “Agent attack”、 “The conversation steal attack”、”Brush-off service attack” and ”Counterfeit attack” , refined schemes is proposed for Shortage of existing security schemes , Analysised its the Structure and security , it gave the realization of security service for Mobile IP Keywords:IPSecurity;Security threats; IKE; security schemes
1769
Abstract: Releasing beacon balloons is an effective way for space TT&C ship to obtain accurate comparison data and an important resource for accuracy evaluation. However, it is hard for theodolite to keep track beacon balloon stably for a long time. Its function has not been realized because the time period of the effective data is so short that it can not satisfy the request of traditional accuracy evaluation test. Aiming at this problem, this paper suggests an assumption of accuracy evaluation based on dynamic time interval non-continuous variable data. Utilizing self–adaptive outlier detection method and fitting residual error method, this paper solves the puzzle of dealing with dynamic time interval data which can not be treated by existing method, and realizes the self-determination of space TT&C ship accuracy evaluation test.
1775
Abstract: This paper presents a fast algorithm for face detection in complex background, in which image color information is used first, project upper part of the partition of face in the gray image to horizontal and vertical direction. Determine the eyes positions by the minimum value, and scope the human eye in the face of prior knowledge to judge and adjust the face region.
1779
Abstract: With the quick development and widespread application of modern information technology, the remote fault diagnosis service has become a reality. The paper focuses on the implementation of remote fault diagnosis system. In order to meet the developments and requirements, the remote fault diagnosis system uses the Web Services technology based on B/S structure, and realizes the distributed and cross-platform remote network communication. In addition, ActiveX control is embedded in web, and this realizes the field data collection, remote audio and video interaction and so on; and this also makes up the insufficiency of B/S structure and lightens the burden of Web server. The system has been greatly improved in the real-time performance of work and security of communication. The system fully meets the requirements of remote fault diagnosis.
1783
Abstract: Detection of rice kernel domestic mainly rely on manual measurement using a ruler or vernier caliper tool, which use the ruler measurement of human error, and the measurement of the twisted grain rice vernier caliper is limited. Manual measurement are difficult problems, but also low efficiency. This study analyzes the current research on appearance quality of rice by using machine vision technology mainly focuses on the aspects of rice kernel, chalkiness, yellow rice and other characteristics, realized the accurate detection and obtain rice information quickly by using the machine vision technology, improves the speed and precision of detection, especially detection effect the grain shape distortions.
1788
Abstract: With the development of Internet virtual network , In the network environment , a variety of pathways and complex application environments enables network worms increased frequency of occurrence. Firstly, the paper summarizes the general research situation of Internet worms, and then expounds the basic definition and the working principle of network worms, finally carries on the simulation of the network worm using UDP protocol. Finally, making a modeling and simulation for using UDP transport protocol network worm. This research provides important support for worm-related research and It’s important for maintaining network security
1792

Showing 381 to 390 of 588 Paper Titles