Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research Vols. 756-759
Paper Title Page
Abstract: In order to develop more energy-saving control algorithm, an electric vehicle air conditioning system model is established. Electric air conditioning system compressor model, compartment thermal load model, heat transfer model, controller model and temperature calculation model are built based on certain pure electric commercial vehicle air conditioning system. A compound control method applying fuzzy and PID theory is put forward in this paper. A secondary development of EV model is established in ADVISOR. As the result shows, the Fuzzy-PID control method is more accuracy and consuming less energy. Optimized control algorithm for air conditioning is realized.
3611
Abstract: In this paper, a new design optimization method-cross entropy methods for passenger flow routing in passenger hubs is employed, in order to develop rational and efficient passenger flow routing program, which will help improving the passenger flow organization. According to the description and characteristics of the problem, we transform the problem into a combinatorial optimization problem, so that it is convenient to explore the best solution. The numerical example declares that the method given above can obtain the optimal solution under the condition of fixed demand. Results show that the cross entropy method is effective, and can be well applied in passenger flow routing design problem. Systematic studying the passenger terminal passenger flow routing design optimization techniques and methods and developing rational and efficient passenger flow routing program will help improving the organization of passenger flow. According to the description of the problem and the characteristics of itself, the paper transforms the problem into a combinatorial optimization problem, so that it is convenient to explore the best solution. The paper also employs the cross entropy method to solve the problems. Numerical example declares that the method given above can obtain the optimal solution under the condition of fixed demand. Results show that the cross entropy method is effective, and this method can be well applied in passenger flow routing design problem.
3617
Abstract: In this paper, we propose a new speech detection method to English-Mandarin code-switching speech. Unlike previous methods, in this method we first train a support vector machine (SVM) model based on feature parameters and Gaussian Mixture Model (GMM) , then integrate the language identification (LID) information based on SVM model and acoustic information into the decoding process. Lastly, we develop a prototype system to present the method. Experiments proved that our method we can improve the accurancy of code-switching speech recognition at a certain degree compared with previous methods.
3622
Abstract: In a real Banach space E with a uniformly differentiable norm, we prove that a new iterative sequence converges strongly to a fixed point of an asymptotically nonexpansive mapping. The results in this paper improve and extend some recent results of other authors.
3628
Abstract: Linear cryptanalysis is a statistical analysis method. Linear cryptanalysis constructs probabilistic patterns first and then distinguishes the cipher from a random permutation using lots of plaintext-ciphertext pairs. Linear cryptanalysis has a big data complexity. Algebraic attack attempts to exploit the algebraic structure of the cipher by expressing the encryption transformation as a set of polynomial equations and then attempts to solve the system to recover the encryption key. Algebraic attacks do not need too much data. This paper combines these two methods by using algebraic techniques in linear cryptanalysis, and proposes a new cryptanalysis method called Algebraic Techniques in Linear Cryptanalysis. This new method is used in the existing linear cryptanalysis of PRESENT. To recover 8-bit key information of 21-round PRESENT, the data complexity is2'and the time complexity is 2'.Compared with the result of linear cryptanalysis, the data complexity is obviously decreased.
3634
An Evaluation Method of Combat Service Operation Performance for Surface-to-Air Missile Based on FNN
Abstract: Firstly, the implication and purpose of the Combat Service Performance Evaluation for Air Defense Missile was elaborated in this paper. Then the Fuzzy Neural Network (FNN) Evaluating Method was put forward to apply to the combat service performance evaluation. Secondly, an evaluation index system was built on the basis of the characteristics of the combat service operator and the combat service process. At last, the correctness and validity were approved though the simulation results.
3640
Abstract: Multicast routing problem is a well know optimization problem for transmitting real-time multimedia applications in telecommunication networks. As the underpinning mathematical model, the constrained minimum Steiner tree problem in graphs is a well-known NP-complete problem. In this paper we investigate a new hybrid GRASP (Greedy Randomized Adaptive Search Procedure) approach where a pilot method is applied to further enhance the search for the Delay-Constrained Least-Cost (DCLC) multicast routing problem. Experimental results demonstrate the efficiency of the hybrid GRASP algorithm and the contributions of the post-processing pilot method to better solutions in most cases. The proposed GRASP approach is a competitive approach in solving the DCLC multicast routing problem.
3647
Abstract: Under the study of Kernel Methods, this paper put forward two improved algorithm which called R-SVM & I-SVDD in order to cope with the imbalanced data sets in closed systems. R-SVM used K-means algorithm clustering space samples while I-SVDD improved the performance of original SVDD by imbalanced sample training. Experiment of two sets of system call data set shows that these two algorithms are more effectively and R-SVM has a lower complexity.
3652
Abstract: With the intensified competition among telecommunications industry, we focused much on the quality of service. Illegal activities, especially dial-back fraud calls, may cause annoyance and inconvenience which will reduce user experience. The detection of dial-back fraud calls is an urgent issue that needs to be addressed. The rapid development of information technology which gives rise to the accumulated huge data will pose a greater challenge. However, traditional detecting methods to identify illegal activities cannot get acceptable accuracy. On the other hand, those methods become very inefficient or even unavailable when processing massive data. In this paper, we introduce a distributed outlier detection approach to locate illegal acts of the illegal users who have the characteristics as outliers. For a higher hit rate, we combine outlier detection with cluster coefficient. Besides, the method exploits parallel computation based on MapReduce in order to obtain vast time savings and improve the processing capability of the algorithm on large data. Extensive experimental results demonstrate the efficiently performances of proposed algorithm according to the evaluation criterions of speedup and scale up.
3659
Abstract: The atmospheric transmittance of infrared radiation is the important parameter on the studies of infrared radiation, the Computation of atmospheric transmittance is professional and complicated and it is inconvenient for the application of engineering and technology. In order to gained the atmospheric transmittance of infrared radiation rapidly when the height of infrared apparatus place and the down range distance between infrared apparatus and infrared object are changed, Lagranges two unknown quantities and three points interpolation is used to computer the interpolations of the atmospheric transmittance of infrared radiation by the MODTRAN software, then the available data of atmospheric transmittance are gained. The experimental results show the interpolation method is effective and valuable in engineering applation.
3665