Papers by Keyword: Component

Paper TitlePage

Authors: Chun Lin Wang, Tian Fang Zhang, Chun Lei Zhao, Dong Liu
Abstract: The three-dimensional unsteady turbulent flow of rotational flow self-priming pump was simulated by using Reynolds time-averaged N-S equations and the standard k-ε turbulent model, sliding mesh model of static-dynamic coupled models and SIMPLE arithmetic. The static pressure distribution of the pump central rotative surface and relative velocity of the impeller central rotative surface in a complete application cycle were analyzed. The rule of instantaneous head in a impeller channel cycle was studied, and the positions of maximal head and minimal head were analyzed. It revealed that the unsteady method can truly simulate the changes of the rotational flow self-priming pump interior flow, and the unsteady characteristic of interior flow in rotational flow self-priming pump is obvious and it changes as the relative position of impeller and volute change. The change is periodical, and its frequency is relate to the impeller number and the rotate speed of the pump.
Authors: Hong Hua Wu, Jun Chen, Chui Wei Lu
Abstract: Government price control departments must supervise charges of medical services (CMS) and judge whether hospital charges violate the rules. At present, it is still manual operation to supervise CMS. There are heterogeneous data formats and nonstandard name record if we supervise CMS by using the computer. And it is unable to satisfy the customers frequently changeable request and so on. In view of this, the article proposed a solution of hospital price checking system, which adopts component-based way during design process and combines the computer supervise with the artificial auxiliary determination to remedy the defect of machine determination inaccurate. Finally in the movement process the system can react rapidly. The match precision was high, and the processing speed is quick and so on.
Authors: Ai Min Hou, Chuan Fu Hu, Zhi Feng Hao
Abstract: A general depth-first backtracking algorithm for graph isomorphism with the vertex partition and refinement technique is presented in this paper. The time complexity of this nondeterministic polynomial algorithm is O(nα+3) where nα is the number of backtracking points and (h-1)/2α (h+1)/2 for h=logn in the worst cases. The tests on many types of graphs validated the efficiency of this algorithm for graph isomorphism.
Authors: Saeede Ajorlou, Issac Shams, Mirbahador G. Aryanezhad
Abstract: In this paper, a new mathematical programming model is developed to address common issues relating to single-stage CONstant-Work-In-Process based production lines. A Ge-netic Algorithm (GA) approach is then proposed to directly solve the model in order to simultaneously determines the optimal job sequence and WIP level. Unlike many existing approaches, which are based on deterministic search algorithms such as nonlinear programming and mixed integer programming, our proposed method does not rely on a linearized or simplified model of the system. results from a comprehensive numerical example indicate computational efficiency and validation of our method.
Authors: Muna M. T. Jawhar, Monica Mehrotra
Abstract: Security has become an important issue for networks. Intrusion detection technology is an effective approach in dealing with the problems of network security. In this paper, we present an intrusion detection model based on hybrid fuzzy logic and neural network. The key idea is to take advantage of different classification abilities of fuzzy clustering and neural network for intrusion detection system. The new model has ability to recognize an attack, to differentiate one attack from another (i.e. classifying attacks), and the most important, to detect new attacks with high detection rate and low false negative. Training and testing data were obtained from the Defense Advanced Research Projects Agency intrusion detection evaluation data set.
Authors: Ni Zhao, Xun Li
Abstract: Continuous change of business environment of information system requires it timely respond and support these changes. A major challenge faced by information system is system reconfiguration, namely capability to quickly respond to changes of the system. Based on description of the concept of reconfigurable information systems, the idea of component was introduced into design and implementation of Reconfigurable Information System (RIS). Overall architecture and implementation method of reconfigurable information system based on component was analyzed in detail. Specific design of RIS based on component was provided combining with design and development of specific document transmitting system based on CORBA middleware platform.
Authors: Jun Wang
Abstract: This paper puts forward a method for components' damage detection based on optoelectronics imaging technology. According to the collection principle of optoelectronics imaging system, using pixel gray scale difference approach, the method extracts pixel characteristics of the optoelectronics image, which is taken as data foundation of following damage detection. Edge pixel positioning method is adopted to calculate spatial location of optoelectronics data of the components' damaged area edge, thus enabling components damage detection. Experimental results show that the method can improve the accuracy of components optoelectronics damage detection and meets the needs of quality inspection in component production.
Authors: Rui Liu, Jun Zhou, Peng Li
Abstract: This document explains and demonstrates how to build a fault model of any component based on the simulator model. Function unit was considered as the minimum unit when building fault models. The fault model was defined as a uniform style. An example about the control actuator was illustrated. The fault model building method presented in this paper was easy to operate and was of universal appliance.
Authors: Yong Jian Zhao, Hai Ning Jiang, Mei Xia Qu
Abstract: This paper proposes a blind source extraction (BSE) method on the basis of several time-delay autocorrelations from primary sources. This method is a second-order statistic learning algorithm, which can extract a desired biomedical signal while it shows a specific temporal structure. In contrast to conventional BSE methods, it is simple and do not need to choose any learning step size. Computer simulations on biomedical measurements demonstrate its validity and high performance in the process of revealing the underlying desired signal.
Authors: Yong Jian Zhao, Mei Xia Qu, Hai Ning Jiang
Abstract: The famous FastICA algorithm has been widely used for blind signal separation. For every process, it only converges to an original source which has the maximum negentropy of the underlying signals. To ensure the first output is the desired signal, we incorporate a priori knowledge as a constraint into the FastICA algorithm to construct a robust blind source extraction algorithm. One can extract the desired signal if its normalized kurtosis is known to lie in a specific range, whereas other unwanted signals do not belong to this range. Experimental results on biomedical signals illustrate the validity and reliability of the proposed method.
Showing 1 to 10 of 321 Paper Titles