Advanced Materials Research
Vols. 123-125
Vols. 123-125
Advanced Materials Research
Vols. 121-122
Vols. 121-122
Advanced Materials Research
Vols. 118-120
Vols. 118-120
Advanced Materials Research
Vol. 117
Vol. 117
Advanced Materials Research
Vols. 113-116
Vols. 113-116
Advanced Materials Research
Vol. 112
Vol. 112
Advanced Materials Research
Vols. 108-111
Vols. 108-111
Advanced Materials Research
Vol. 107
Vol. 107
Advanced Materials Research
Vols. 105-106
Vols. 105-106
Advanced Materials Research
Vols. 102-104
Vols. 102-104
Advanced Materials Research
Vols. 97-101
Vols. 97-101
Advanced Materials Research
Vol. 96
Vol. 96
Advanced Materials Research
Vol. 95
Vol. 95
Advanced Materials Research Vols. 108-111
Paper Title Page
Abstract: Signal processing is an important work of load spectrum generation, while wavelet denoise method is regarded as one of the best method in engineering signal processing. So on the purpose of obtaining a good load spectrum of engineering vehicles, db3 wavelet is selected as the mother wavelet. Then the denoise layer number was determined by some comparisons, as well as a proper threshold and threshold function algorithm. Finally a whole process in denoise of the load spectrum of a wheel loader, which is from the selection of the mother wavelet to the determination of the denoise layer number to the selection of the threshold algorithm and the threshold function algorithm, is depicted in this paper. A new coefficient is introduced and a satisfactory result is got. It is safe to conclude that wavelet denoise method is the relative best selection for load spectrum analysis of engineering vehicles.
1320
Abstract: In last decade, neural networks (NNs) have been proposed to predict credit risk because of their advantages of treating non-linear data with self-learning capability. However, the shortcoming of NNs is also significant due to a “black box” syndrome. Moreover, in many situations NNs more or less suffer from the slow convergence and occasionally involve in a local optimal solution, which strongly limited their applications in practice. To overcome NN’s drawbacks, this paper presents a hybrid system that merges fuzzy neural network and niche evolution particle swarm optimization into a comprehensive mode, named as niche evolution particle swarm optimization fuzzy neural network (NEPSO-FNN), the new model has been applied to credit risk prediction based on the data collected from a set of Chinese listed corporations, and the results indicate that the performance of the proposed model is much better than the one of NN model using the cross-validation approach.
1326
Abstract: In this article a novel scheme of high power mid-frequency pulse power supply is proposed. The supply is made up of two major stages. First stage is dual interleaved buck chopper stage in order to make the DC bus and output pulse voltage controllable. Second stage is a inverter converting the DC voltage into a series of square AC voltage pulse. IGBT module(300A-1200V) is used as the main switch device for the proposed supply is a high power application. As we know large capacity power IGBT module can hardly work as high as 40Khz[1], so to solve this problem, interleaved control scheme is incorporated. Basic ideas are to share the total switching losses. To combine several converters working under certain sequence is the key point. Final output pulse frequency is 20-40Khz,voltage level is 0-800V, and pulse width is 0-90% changeable. The whole system is concise effective. Experimental results verified the feasibility of abovementioned power supply.
1332
Abstract: The characters of C-V model are analyzed in this paper. Using the C-V technique to segment objects from an image, every pixel of whole image needed to be updated in each iterative calculation. The amount of iterative calculation is very large. So a computational method combine C-V model with the narrow band of level set is proposed. The segmentation iterative computation is defined on a narrow band, so the computation complexity is gotten lower. This segmentation algorithm is simulated in MATLAB. The simulation results shows that this segment arithmetic is efficiency, constringency fast and can get object integrally.
1338
Abstract: In general, the road extraction methods in remote sensing images mainly are edge detection, feature integration, and so on. A fast road recognition arithmetic is presented in this paper. First using adaptive binarization arithmetic, the path on remote sensing images is extracted. Then morphological method is used to process image. Finally, the extracted image superimposed with the original and get clear road. Simulation results shows that this algorithm is efficiency, the anti-noise ability is enhance, and more precision.
1344
Abstract: Mathematics tests of multiple-choice items for grades 2 through 6 were vertically scaled with the three-parameter logistic model using two different linking procedures: concurrent and separate by grade bundles. This research implements two designs under the separate by grade bundles procedure: grade bundle of two grades and grade bundle of three grades. All the items were calibrated using the 3-parameter logistic model (3-PLM) in the computer program, Bilog-MG with Grade 4 as the reference group. Under the separate grade-bundles method, the mean/sigma of the ability (i.e., θ) transformation method was applied to link the grade bundles. In general, the three scaling methods performed similarly in item difficulty and discrimination estimates, and in three score scale properties: grade-to-grade growth, grade-to-grade variability, and the separation of grade distributions. As a result, the grade-bundle of three grades design is preferable in the sense that it is more robust to the violation of the unidimensionality assumption over grades than the concurrent method and it yields less linking errors than the grade-bundle of two grades design.
1348
Abstract: Retracted paper: Combined with the idea of the particle swarm optimization (PSO) algorithm, the ant colony optimization (ACO) algorithm is presented to solve the well known traveling salesman problem (TSP). The core of this algorithm is using PSO to optimize the control parameters of ACO which consist of heuristic factor, pheromone evaporation coefficient and the threshold of stochastic selection, and applying ant colony system to routing. The new algorithm effectively overcomes the influence of control parameters of ACO and decreases the numbers of useless experiments, aiming to find the balance between exploiting the optimal solution and enlarging the search space.
1354
Abstract: The paper proposes a network security monitoring protection model with synergetic mechanism based on the basic principle of human immune system and the state quo of network hacking inspection research and the analysis and appraisal on the original artificial immune model. This model proposes human-computer interaction disaster warning system based on computer dangerous operation and the advantage of agent technology and proposes free-state anti-virus technology based on the human body apoptotic cells. The test results show that the methods proposed in this thesis remedy the illegal program escaped from monitoring security scanning and the system security hidden danger caused manually and at last proposes the development trend of the future artificial immunity in computer protection field.
1360
Abstract: This paper describes the method and realization of the objective binary segmented image to obtain the goal of characteristic quantities. The target block of the binary image is formed by pixel labeling. Through using mathematical morphology image processing method to filter out binary image noise, it achieves a clear goal of extracting the boundary. With the license plate character recognition, the experiment shows that the algorithm is effective. All numerical examinations illustrate the high convergence speed and prove the validity of recognition rate.
1366
Abstract: In order to support well some promising dual-use core technology integration items with limited resources, scientific and effective value evaluation model should be constructed by governments. Based on the characteristics of such technology integration project, we build a value evaluation system for dual-use core technology integration, which includes social effects, economic results, technical value, and possibility for technology to be transformed into products etc. as major component. And then, such project evaluation model is established by using gray theory and hierarchy analysis method. By using a case analysis, it reveals and verifies further the operational process of this evaluation model. This model is scientific and feasible. Since it is not perfect, some research works on this model should be done further in future.
1370