Advanced Materials Research
Vols. 217-218
Vols. 217-218
Advanced Materials Research
Vol. 216
Vol. 216
Advanced Materials Research
Vol. 215
Vol. 215
Advanced Materials Research
Vol. 214
Vol. 214
Advanced Materials Research
Vol. 213
Vol. 213
Advanced Materials Research
Vols. 211-212
Vols. 211-212
Advanced Materials Research
Vols. 204-210
Vols. 204-210
Advanced Materials Research
Vols. 201-203
Vols. 201-203
Advanced Materials Research
Vols. 199-200
Vols. 199-200
Advanced Materials Research
Vols. 197-198
Vols. 197-198
Advanced Materials Research
Vols. 194-196
Vols. 194-196
Advanced Materials Research
Vols. 189-193
Vols. 189-193
Advanced Materials Research
Vol. 188
Vol. 188
Advanced Materials Research Vols. 204-210
Paper Title Page
Abstract: The design and development of novel microelectromechanical systems’ (MEMS) coplanar waveguide (CPW) transmission lines, using microshield and groove, are presented in the paper to operate between 5–60 GHz. The quasi-static capacitances of CPW are calculated using the conformal mapping technique to express the propagation properties, i.e., the characteristic impedance and effective permittivity. Simulation results have shown a considerable loss reduction to levels that compare favorably with the conventional CPW. These transmission lines can be widely used in the development of phase shifters, filters, and antennas, because of their advantages in loss reduction and improvement in the performance.
577
Abstract: In view of the defect that network DEA (data envelopment analysis) can not reflect the network structure when it comes to dynamic evaluation, we proposed a two-stage evaluation method of dynamic network DEA. Time parameter was introduced to network DEA and dynamic network DEA model was established. In order to evaluate the efficiency of dynamic network DEA in several time spans, we built a two-stage evaluation method. In the first stage, dynamic network DEA efficiency matrix was formulated. In the second one, a new input-output DEA unit was set up to evaluate the synthetical efficiency of dynamic network DEA. The two-stage method can manifest the real dynamic property in network DEA, as well as consider the network structure which involves intermediate products by dynamic measure. A numerical example indicated that the two-stage evaluation method can solve dynamic network DEA problem efficiently, it can also provide improved information between inefficient DMU and optimum values by slacks. The new measure can be a good tool of systems analysis.
583
Abstract: For solving the segmentation problem of vessel attachment nodule, a new adaptive bandwidth chosen method based on EM is proposed and apply it into Mean-shift algorithm to segment vessel attachment nodule. This method has some advantages such as time low complexity and correct bandwidth when comparing it to the method of bandwidth chosen based on statistical analysis rule or optimized rule, Imposing the vertical orientation vectors of vessel’s gradient submitting to normal distribution and the vertical orientation vectors of nodule’s gradient submitting to uniform distribution, modeling the nodule connected vessel, and estimating model parameter by EM, extract bandwidth parameter in Mean-shift based on the weight of uniform distribution. The proposed method was tested on synthetic data set and the clinical chest CT volumes, and all the results were correct. The results revealed that the proposed method is successful in segmentation lung vessel attachment nodule.
589
Abstract: In IT industry, the performance of training transfer of basic unit staff plays a very important role in training programs. This article used literature summary and questionnaire survey to carry on an empirical study, and used SPSS statistical analysis tool to analyze the data. This study defines individual characteristic, training climate, especially training design as three main variables. Based on these, the author set up a model about this study, designed the items of the training transfer behaviors of the basic unit staff, and also proposed 3 hypotheses. The analyses conclude that individual characteristic, contents and trainers, and job support and organizational support should be the impact factors.
596
Abstract: This paper focuses mainly on a clustering method for pruning Fully Connected Backpropagation Neural Network (FCBP). The initial neural network is fully connected, after training with sample data, a clustering method is employed to cluster weights between input to hidden layer and from hidden to output layer, and connections that are relatively unnecessary are deleted, thus the initial network becomes a PCBP (Partially Connected Backpropagation) Neural Network. PCBP can be used in prediction or data mining more efficiently than FCBP. At the end of this paper, An experiment is conducted to illustrate the effects of PCBP using the submersible pump repair data set.
600
Abstract: Studying technology of feature analysis, a new method of feature selection based on self -reacting feature weighted is presented, and it is applied into the intrusion feature selection with the technique of feature selection and the technique of SVM classification combined. The method can reduce the time complexity and space complexity with the situation of parameter trying improved. The experiment results show that the detection precision rises obviously, meanwhile, the training time and the test time are also improved variously. The model has the ability to respond quickly with the accuracy and real-time performance of the Intrusion Detection System improved effectively. So, the method can be extended significantly.
604
Abstract: In order to solve some problem of stress sensor in dynamic weigh rail, a new kind of inductive stress sensor based on magnetostriction effect of amorphous alloy was developed. First, the principle of sensor, and inferred its output equation were discussed. Second, the static characteristic experiment and the actual experiment on the material testing machine and the mine haulage rail were separately made. The results of the test have showed that this stress sensor has some characteristics as high measurement sensitiveness and accuracy. Also being simple, convenient and solid to install and use, so it is feasible to apply the sensor for the dynamic weigh rail.
608
Abstract: P2P network is open, anonymous, dynamical in contrast with conventional network. It’s full of dishonesty, deceit, selfishness. It’s necessary to build a robust security infrastructure system. The one important module of security infrastructure is to identify the users in transactions. This paper will propose an identification solution based on PKI. In our algorithm, the peer generates their public-private key pairs by themselves, to issue certificates, and perform authentication without any centralized services. It can realize the identification, meanwhile keep peers anonymous. Moreover, it can limit the quantity of ID that a user applies for; alleviate the risk of Sybil attack.
612
Abstract: The valuation of options is an important research topic of modern options pricing theories. In this paper, an outsourcing decision model is built based on options valuation theory. We classified the cost of outsourcing into three independent spheres including strategic, managing, and executive. Then, we quantified these notional costs by the means of options valuation. Furthermore, we get the boundary qualification of outsourcing in the framework of “cost-benefit” by comparing outsourcing’s general cost with its benefit on the point of numerical cost of risk. A numerical example is given to illustrate the feasibility of the decision-making model.
617
Abstract: The factors which lead to large-area power outages are more than ever, when the complexity of the expansion power system is increasing. Therefore, it is important to assess the vulnerability of the complicated power system. This paper first proposes an objective, practical and adaptive vulnerability assessment system of complicated power system by use of Analytic Hierarchy Process, which based on multi-factors analysis of large-area outages. This system can find out the vulnerability point of the power system,and take advantages of the government, who can over-all plan, correspond and organize the social resource to reduce the vulnerability of power system and prevent large-area power outages, and the power enterprises who can maintaining the stability of power system by technology. Finally, the paper gives an assessment example of provincial power system.
622