Advanced Materials Research
Vol. 570
Vol. 570
Advanced Materials Research
Vol. 569
Vol. 569
Advanced Materials Research
Vol. 568
Vol. 568
Advanced Materials Research
Vol. 567
Vol. 567
Advanced Materials Research
Vol. 566
Vol. 566
Advanced Materials Research
Vol. 565
Vol. 565
Advanced Materials Research
Vols. 562-564
Vols. 562-564
Advanced Materials Research
Vols. 560-561
Vols. 560-561
Advanced Materials Research
Vols. 557-559
Vols. 557-559
Advanced Materials Research
Vols. 554-556
Vols. 554-556
Advanced Materials Research
Vols. 550-553
Vols. 550-553
Advanced Materials Research
Vol. 549
Vol. 549
Advanced Materials Research
Vol. 548
Vol. 548
Advanced Materials Research Vols. 562-564
Paper Title Page
Abstract: In this paper, we use the similarity measure of interval-valued fuzzy sets to investigate approximate reasoning of interval-valued fuzzy sets, propose the mathematical model of interval-valued fuzzy control, and investigate its control algorithm.
2111
Abstract: Due to fast receding horizon speed and global optimization of small-world optimization algorithm with real-coding (RSW), a new nonlinear multi-objective predictive controller was presented based on RSW and neural network (NN) identification trained by BP. NN model which was obtained by off-line identification was used to predict the present and future output of the plant, and RSW was applied to receding horizon control. Finally, an application to 500MW unit load control system with multi-objective optimization was given, and simulation results indicated the effectiveness of this new approach.
2116
Abstract: Based on the description of an information object identification system and aggregate analysis of linear & faceted classification methods, an identification hierarchical construction method and a collection object enumeration method are put forward to model the information object identification system. Its system architecture is constructed and identifying nodes and managing nodes are used to define and associate information objects. According to coding theories, the information identification system is mapped into a visual coding rule system on the condition that the information object architecture, code collection and serialization, and coding constraints are retained. According to a dynamic coding rule tree, rule templates, and code generation methods, the corresponding visual interface is developed. Finally, the XML format is used to design a powerful, extensible and flexible data structure to realize the visual coding rule system.
2120
Abstract: Point spread function (PSF) estimation and image restoration algorithm are the hotspots In the research of motion blurred image restoration. In order to improve the efficacy of image restoration, an improved algorithm named quadric transforms (QT) method is proposed in this paper by analyzing the restoration process of motion blurred images. Firstly, Fourier transform and homomorphism transform are applied to the original motion blurred image, and then the Fourier transform and homomorphism transform are used again to the obtained spectrum image. Secondly, the motion blur direction is estimated by Radon transform. Thirdly, the motion blur length is found by differential autocorrelation operations. Finally, utilizing the estimated blur direction and blur length, the motion blurred image is restored by Wiener filtering. Experimental results show that the proposed QT method can get more accurate estimated motion blur angles than the primary transform (PT, that is, Fourier transform and homomorphism transform are used one time) method and can get better restored images under the meaning of peak signal to noise ratio (PSNR).
2124
Abstract: This paper analyzed the function consistency, dominating consistency, state consistency and structural consistency of multi-resolution model based on three principles of the similarity theory. Then, a method of quality evaluation of consistency on state level and structural level are presented. The practice proved that this research is helpful to find the factors which influence the consistency and search for accurate measures to improve the consistency on every level.
2128
Abstract: The detection technique is designed and equipped to ensure the security of the computer system, and to find and report the unauthorized and the abnormal phenomena of the system on time. It is a technique used to detect the behavior that goes against the security principle of the computer system. The author applies the grey theory to build a instrusion detection data based on GM(1,1)model to compensate the data preprocessing model, and an index reducing algorithm which is based on grey relation. They have some characteristics, such as a few samples, low complexity, easy procedural realization, and can solve the renewed samples quickly. We have had a demonstration analysis, which shows that these models can help to reduce the occupied system resources obviously, enhance the timeliness and accuracy, and reduce rate of undetected errors and false retrieval.
2134
Abstract: Aiming at the position problem of emitter on the ground, this paper puts forward one TDOA/AOA combined position algorithm. In this algorithm, one sensor can be placed on one fixed platform on the ground to measure the azimuth and pitch angle between this sensor and the emitter. Another sensor can be placed on one moving platform, and the different TDOA (Time Difference Of Arrival) can be measured at different time, then the LS (Least Square) algorithm can be reached to solve the evaluated value of the emitter’s position. The simulation results show that this algorithm can increase the position precision effectively, especially the more TDOA measurements are used, the more position precision is.
2139
Abstract: UCAV will play a more and more important role in future fight. UCAV efficiency evaluation method is still in the developing stage. UCAV fight elements are analyzed that include reconnaissance elements and attacking to ground elements. Basing on analysis of UCAV reconnaissance efficiency and attacking ground efficiency, UCAV reconnaissance efficiency model and attacking ground efficiency model are constructed. The feasibility and validity of model is validated by arithmetic example.
2145
Abstract: XML is widely used nearly everywhere in modern information technology. However, traditional XML semantic constraints expression and validation is still an open issue since grammar-based or rule-based schema languages have built-in limitations in some syntax constraints expression, and the combined ones with more than two languages to check a XML putting a considerable burden on users. A domain-oriented XML expression and validation approach is proposed, which takes high level business concepts to capture the advanced XML constraints in a compact and easy understand way. Some implementation techniques and advantages are also demonstrated to show the lightweight and pragmatic of this approach.
2149
Abstract: A optimization algorithm is put forward based on the brightness and frequency domain characteristics of macro block, including the algorithm of model segmentation and the prediction algorithm of starting motion vectors(MV). The basic idea of the mode segmentation is that to the unit of 16×16 block, discrete wavelet transform to frames, the after low frequency coefficients as the research object, define the coefficients sum ∑. If ∑ is greater or equal to threshold, the corresponding areas will be divided into texture areas, or smooth areas. The current block is compared with the corresponding block in reference frames. If the result is equal, the current block will be marked to background block, or sport block, and the corresponding segmentation mode is selected at the same time. The basic idea of prediction starting motion vectors algorithm is that base on the marked sport blocks, the starting MV of current block is the median value of MV to adjacent sport blocks in initial MV prediction. The experimental results show that the efficiency of algorithm in this paper has been improved.
2153