Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li

Size: px
Start display at page:

Download "Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li"

Transcription

1 Applied Mechanics and Materials Submitted: ISSN: , Vols , pp Accepted: doi: / Online: Trans Tech Publications, Switzerland Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques Yunzhi Li School of Management and Economics, Beiing Institute of Technology, Beiing, , China Keywords: Information system; Vulnerability; Partial differential equation; Quantitative criteria; Mathematical modeling; VB programming Abstract. The idea of mathematical modeling is used to establish the quantitative model of information system vulnerability assessment, and the model is solved by using the partial differential method. The algorithm is realized by using VB programming, and it obtains the quantitative solution of information system vulnerability. Quantitative assessment of information system security and risk is the difficulty of system vulnerability assessment, and it establishes the risk model of system by means of mathematics modeling idea. The risk model is divided into the actual risk and the potential risk. The paper uses VB programming software, and establishes a quantitative model of information system evaluation by combining with partial differential method, and the algorithm is carried out the eperimental verification by using the method of numerical simulation. Through the calculation, the mathematical modeling ideas can effectively obtain the vulnerability quantitative standard and the risk level of information system, which provides the technical reference for the research of information system security evaluation method. Introduction With the rapid development of the computer network in our country, the main business of more and more fields can t do without a computer, and all depends on the implementation of information system. However, with the security risks being more and more, the security of the applied system is getting more and more attention, so the system we used must go through the security risk assessment. The vulnerability assessment of information system is divided into the qualitative evaluation and the quantitative evaluation, where the quantitative evaluation is the difficulty of information vulnerability assessment [1,2]. With the idea of mathematical modeling, the quantitative criteria of the actual risk and the potential risk is used to build the model for information system vulnerability, and the use of VB software has successfully achieved the algorithm. Application of the Idea of the Mathematical Modeling in the Vulnerability Assessment of Information System The general risk calculation model has four aspects of factors, including risks, threats, vulnerabilities and assets. While information system, as a special risk system, mainly eists the actual risk and the potential risk [3]. Due to the two kinds of the risks have many influence factors, and it should establish mathematical models to get the quantitative criteria [4]. And it obtains the risk evaluation model through the degree of threat and the probability of security incidents occurred, as shown in Figure 1. Figure 1 shows the designed model of information system risk assessment. The hazard identification and the vulnerability assessment are used to carry on the quantitative evaluation on the security of system. Finally, the vulnerability inde of comprehensive evaluation is obtained by using the algorithm procedures. And the safety risk of the system is calculated according to the vulnerability evaluation standard. All rights reserved. No part of contents of this paper may be reproduced or transmitted in any form or by any means without the written permission of Trans Tech Publications, (ID: , Pennsylvania State University, University Park, USA-08/05/16,20:30:23)

2 1954 Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II Fig. 1 The calculation model of risk Design of the Mathematical Model and the Algorithm of the Quantitative Assessment of Information System Vulnerability In the process of the quantitative vulnerability assessment of information system, it can refer to the general risk assessment calculation model, which can conveniently realize the quantitative vulnerability of information system [5,6]. In the general risk assessment model, the calculation principle of value at risk is as shown in formula (1). F = Y ( A, W, V ) = Y ( L( W, V ), F( I a, Va )). (1) Where Y represents the security risk function model of quantitative assessment system. A represents the security authentication system of information system. W represents the potential risk. V a and L represent the vulnerability of information system and the probability of security events occurred. In order to accurately quantify the vulnerability of information system, risk quantification can be written as the potential risk and the actual risk. It is as shown in formula (2). u i = ui + u i. (2) The security defense and vulnerability of the system itself are as shown in formula (3). φ = φ + φ. (3) The formula (1) and (2) are put into the continuous partial differential equations, and then it can get the differential equations as shown in formula (4). Dui φ u u i u l 2 ρ = + µ + δ i + ( ρu iu ). Dt i i 3 l (4) For the quantification of information system, it is mainly to solve the, and the specific formula of solution is as shown in the formula (5). Generally, it uses the method of Boussinesq hypothesis that the mean velocity gradient and the Reynolds stress are approimate as shown. u u i ui ρ uiu µ 2 = t + ( ρk + µ t ) δ i. (5) i 3 i Where it represents the risk parameters and the total energy quantitative equation of information system is as shown in formula (6). c pµ t T ( ρ E) + [ ui ( ρe + p)] = k + u i eff + S h t i + i t ( τ ). (6) Pr i Where (τ represents the quantitative standard. The standard can evaluate the level of the ) i eff safety risks for information system [7]. The program algorithm of security risk assessment is designed by using VB software. And the mainly used program is as follows. #include <stdio.h> void main() u i

3 Applied Mechanics and Materials Vols {int t=1,i=2; do {t=t*i;i++;} while (i<=5); printf("%d\n",t); } #include <stdio.h> void main() {int sum=0; scanf("%d",&i); while (i<=10) {sum=sum+i; i++;} printf("%d\n",sum);}... Eperimental Research on the Mathematical Modeling of Quantitative Vulnerability Assessment for Information System In order to validate the validity and reliability of the mathematical model and algorithm of the quantitative vulnerability of information system designed in the second section, VB programming software is used to design the mathematical model of quantitative vulnerability of information system [8,9]. The used VB program interface is shown in Figure 2. Figure 2 shows the open interface of VB6.0. VB has used the GUI system. GUI system can simply establish the application program, and also can develop quite complicated program, which is a combination of visual components based on the form. VB6.0 has a good compatibility with other softwares. Fig. 2 The interface of VB6.0 professional version Fig. 3 Calculation of the convergence curve Figure 3 shows the convergence curve through the calculation. It can be seen from the chart that when the iteration calculation is at the third step, it can have a stable converge, and it indicates that the algorithm of information system vulnerability assessment has a very good convergence, and the convergence speed of the algorithm is higher. Figure 4 shows a three-dimensional calculation curves of vulnerability assessment. It can be seen from the chart that the fusion of the vulnerability curves and the standard quantitative curve is better, which shows that this system doesn t eist great risk in the quantitative assessment of system, at the same time it is consistent with the safety standard. Table 1 Quantification table of information system vulnerability Vulnerability quantification Quantitative criteria Quantification results

4 1956 Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II Fig. 4 3D calculation curves of vulnerability assessment Table 1 shows the quantitative results of information system vulnerability. It can be seen from the table that the use of the idea of mathematical modeling can effectively quantify the vulnerability of information system, and it can determine the level of information system vulnerability according to the quantitative standard [10,11]. According to the different levels, it can use different colors to label the quantitative results. Fig. 5 3D visualization of vulnerability evaluation Figure 5 shows the visualization results of the quantitative vulnerability of information system. It can be seen that it obtains the corresponding quantitative value of each risk evaluation, and it sets a quantitative standard line [12]. When it is larger than the standard line, the color will gradually appear to be red, which can have eye-catching tips for the operator, so as to have a good realization of the visualization of information evaluation. Summary With the use of the mathematical modeling principle of partial differential equations, the paper designed the quantitative vulnerability mathematical model of information system. The quantitative model included the quantification of the actual risk assessment and the potential risk assessment. The program algorithm of the model was implemented by using VB programming software. In order to verify the validity and reliability of the evaluation method, the information system was carried on the quantitative assessment analysis by using VB software. Through the calculation, it got the calculated residual convergence curve of the algorithm. It could be seen from the convergence results, the residual of the algorithm was smaller, then the accuracy was higher, and the speed of convergence was fast. Through the quantitative assessment of information system vulnerability, it managed to get the risk quantitative standards and the level of vulnerability eisting in the system, which provided technical support for the application of the idea of mathematical modeling in information system. In this paper we establish the cluster algorithm mathematical model of image processing, and introduce it into motion capture of consecutive frame, and use MATLAB programming to realize the function. In this paper, we introduce the X-ray photography technology into motion capture in track and field sports, and use the cluster algorithm to capture the motion continuously, and design using

5 Applied Mechanics and Materials Vols the clustering algorithm of image capture and image processing. We use the MATLAB to test the image effect captured by X-ray photography. Through calculation we find that image enhancement effect is obvious, and it reduces the error of motion capture. It provides a new method for computer image processing in track and field. References [1] Bo Jin, Jiaun Liu. Review on the intrusion detection technology [J]. Journal of East China University of Science and Technology, 2010(1): [2] Jianchun Jiang, Hengtai Ma. A survey of intrusion detection research on network security[j]. Journal of software, 2010(3): [3] Manun Lin, Hualin Qian. Intrusion detection system: principle, intrusion hiding and countermeasures [J]. Microelectronics & computer, 2012(1): [4] Yuanfang Pu, Wei Zhang, Shaohua Teng, Hongle Du. A cooperative network intrusion detection based on decision tree [J]. Journal of Jiangi Normal University: Natural Science Edition, 2010, 34 (3): [6] Houqing Lu, Feng Wang, Yisheng Song, et al. Targets damage assessment system based on compaign simulation [J]. Journal of PLA University of Science and Technology: Natural Science Edition, 2011, 10 (2): [7] Di Wu, Xiaogang Zhao, Fengian Zhu. Simulation study and realization of UAV Ad Hoc network in reencounter scenario [J]. Journal of system simulation, 2011, 20 (23): [8] Zhigao Luo, Binbin Fan, Xiaodong Guo, Xiang Wang, Ju Li. Analysis of the three-dimensional melting flow in inection cavity based on the wavelet finite element [J]. China mechanical engineering, 2010, 20 (10): [9] Xing Zhang, Changiang Shen. A new kind of control module design scheme of the trusted platform [J]. Geomatics and information science of Wuhan University, 2011, 33 (10): [10] Wei Wang, Neng Gao, Lina Jiang. Security demands analysis of cloud computing [J]. Information network security, 2012(30): [11] Huimo Wang, Yu Zhang. Research on the situation data model in oint operations simulation [J]. Acta Simulate Systematical Sinica, 2011, 20 (15): [12] Jun Liu, Zhe Li, Lei Yue. Design and implementation of the self- organization network simulation platform [J]. Computer science, 2011, 35 (1): 24-26, 30.

6 Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II / Study on the Quantitative Vulnerability Model of Information System Based on Mathematical Modeling Techniques /

Customizing dynamic libraries of Qt based on the embedded Linux Li Yang 1,a, Wang Yunliang 2,b

Customizing dynamic libraries of Qt based on the embedded Linux Li Yang 1,a, Wang Yunliang 2,b Applied Mechanics and Materials Submitted: 2014-11-12 ISSN: 1662-7482, Vol. 740, pp 782-785 Accepted: 2014-12-02 doi:10.4028/www.scientific.net/amm.740.782 Online: 2015-03-09 2015 Trans Tech Publications,

More information

Simulation Technology of Light Effect Based on Catia and Workbench Software HongXia Hu

Simulation Technology of Light Effect Based on Catia and Workbench Software HongXia Hu Applied Mechanics and Materials Online: 2014-03-24 ISSN: 1662-7482, Vols. 543-547, pp 3218-3221 doi:10.4028/www.scientific.net/amm.543-547.3218 2014 Trans Tech Publications, Switzerland Simulation Technology

More information

Research Of Data Model In Engineering Flight Simulation Platform Based On Meta-Data Liu Jinxin 1,a, Xu Hong 1,b, Shen Weiqun 2,c

Research Of Data Model In Engineering Flight Simulation Platform Based On Meta-Data Liu Jinxin 1,a, Xu Hong 1,b, Shen Weiqun 2,c Applied Mechanics and Materials Online: 2013-06-13 ISSN: 1662-7482, Vols. 325-326, pp 1750-1753 doi:10.4028/www.scientific.net/amm.325-326.1750 2013 Trans Tech Publications, Switzerland Research Of Data

More information

The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2

The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2 Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 256-259, pp 2898-2901 doi:10.4028/www.scientific.net/amm.256-259.2898 2013 Trans Tech Publications, Switzerland The Analysis and

More information

Effect of Mesh Size of Finite Element Analysis in Modal Analysis for Periodic Symmetric Struts Support

Effect of Mesh Size of Finite Element Analysis in Modal Analysis for Periodic Symmetric Struts Support Key Engineering Materials Online: 2011-01-20 ISSN: 1662-9795, Vols. 462-463, pp 1008-1012 doi:10.4028/www.scientific.net/kem.462-463.1008 2011 Trans Tech Publications, Switzerland Effect of Mesh Size of

More information

Constructing an University Scientific Research Management Information System of NET Platform Jianhua Xie 1, a, Jian-hua Xiao 2, b

Constructing an University Scientific Research Management Information System of NET Platform Jianhua Xie 1, a, Jian-hua Xiao 2, b Applied Mechanics and Materials Online: 2013-12-04 ISSN: 1662-7482, Vol. 441, pp 984-988 doi:10.4028/www.scientific.net/amm.441.984 2014 Trans Tech Publications, Switzerland Constructing an University

More information

Research on the Application of Digital Images Based on the Computer Graphics. Jing Li 1, Bin Hu 2

Research on the Application of Digital Images Based on the Computer Graphics. Jing Li 1, Bin Hu 2 Applied Mechanics and Materials Online: 2014-05-23 ISSN: 1662-7482, Vols. 556-562, pp 4998-5002 doi:10.4028/www.scientific.net/amm.556-562.4998 2014 Trans Tech Publications, Switzerland Research on the

More information

Shape Optimization Design of Gravity Buttress of Arch Dam Based on Asynchronous Particle Swarm Optimization Method. Lei Xu

Shape Optimization Design of Gravity Buttress of Arch Dam Based on Asynchronous Particle Swarm Optimization Method. Lei Xu Applied Mechanics and Materials Submitted: 2014-08-26 ISSN: 1662-7482, Vol. 662, pp 160-163 Accepted: 2014-08-31 doi:10.4028/www.scientific.net/amm.662.160 Online: 2014-10-01 2014 Trans Tech Publications,

More information

Application of Three-dimensional Visualization Technology in Real Estate Management Jian Cui 1,a, Jiju Ma 2,b, Dongling Ma 1, c and Nana Yang 3,d

Application of Three-dimensional Visualization Technology in Real Estate Management Jian Cui 1,a, Jiju Ma 2,b, Dongling Ma 1, c and Nana Yang 3,d Applied Mechanics and Materials Online: 2014-07-04 ISSN: 1662-7482, Vols. 580-583, pp 2765-2768 doi:10.4028/www.scientific.net/amm.580-583.2765 2014 Trans Tech Publications, Switzerland Application of

More information

Keywords: Interactive electronic technical manuals; GJB6600; XML markup language; Automatic control equipment

Keywords: Interactive electronic technical manuals; GJB6600; XML markup language; Automatic control equipment Applied Mechanics and Materials Submitted: 2014-06-11 ISSN: 1662-7482, Vols. 602-605, pp 1165-1168 Accepted: 2014-06-11 doi:10.4028/www.scientific.net/amm.602-605.1165 Online: 2014-08-11 2014 Trans Tech

More information

Applied Mechanics and Materials Vol

Applied Mechanics and Materials Vol Applied Mechanics and Materials Online: 2014-02-27 ISSN: 1662-7482, Vol. 532, pp 280-284 doi:10.4028/www.scientific.net/amm.532.280 2014 Trans Tech Publications, Switzerland A Practical Real-time Motion

More information

The Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network

The Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network Applied Mechanics and Materials Submitted: 2014-06-18 ISSN: 1662-7482, Vol. 665, pp 674-678 Accepted: 2014-07-31 doi:10.4028/www.scientific.net/amm.665.674 Online: 2014-10-01 2014 Trans Tech Publications,

More information

result, it is very important to design a simulation system for dynamic laser scanning

result, it is very important to design a simulation system for dynamic laser scanning 3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation

More information

The RTP Encapsulation based on Frame Type Method for AVS Video

The RTP Encapsulation based on Frame Type Method for AVS Video Applied Mechanics and Materials Online: 2012-12-27 ISSN: 1662-7482, Vols. 263-266, pp 1803-1808 doi:10.4028/www.scientific.net/amm.263-266.1803 2013 Trans Tech Publications, Switzerland The RTP Encapsulation

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

Serial Communication Based on LabVIEW for the Development of an ECG Monitor

Serial Communication Based on LabVIEW for the Development of an ECG Monitor Advanced Materials Research Online: 2013-08-16 ISSN: 1662-8985, Vols. 734-737, pp 3003-3006 doi:10.4028/www.scientific.net/amr.734-737.3003 2013 Trans Tech Publications, Switzerland Serial Communication

More information

Beijing ,China. Keywords: Constitutive equation; Parameter Extraction; Iteration algorithm

Beijing ,China. Keywords: Constitutive equation; Parameter Extraction; Iteration algorithm pplied Mechanics and Materials Online: 2013-01-11 ISSN: 1662-7482, Vol. 281, pp 505-510 doi:10.4028/www.scientific.net/mm.281.505 2013 Trans Tech Publications, Switzerland new method based on interation

More information

Design and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus

Design and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus Advanced Materials Research Online: 2014-04-09 ISSN: 1662-8985, Vols. 912-914, pp 1213-1217 doi:10.4028/www.scientific.net/amr.912-914.1213 2014 Trans Tech Publications, Switzerland Design and Implementation

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System National Conference on Information Technology and Computer Science (CITCS 2012) Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System WANG Tian

More information

Research on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm

Research on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm Acta Technica 61, No. 4A/2016, 189 200 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm Jianrong Bu 1, Junyan

More information

A Digital Menu System Based on the Cloud client Technology Lin Dong 1, a, Weibo Li 1, b, Ping He 2,c,Jia Liu 1,d

A Digital Menu System Based on the Cloud client Technology Lin Dong 1, a, Weibo Li 1, b, Ping He 2,c,Jia Liu 1,d Applied Mechanics and Materials Online: 2012-11-29 ISSN: 1662-7482, Vol. 235, pp 389-393 doi:10.4028/www.scientific.net/amm.235.389 2012 Trans Tech Publications, Switzerland A Digital Menu System Based

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

Research on friction parameter identification under the influence of vibration and collision

Research on friction parameter identification under the influence of vibration and collision Research on friction parameter identification under the influence of vibration and collision Qiang Chen 1, Yingjun Wang 2, Ying Chen 3 1, 2 Department of Control and System Engineering, Nanjing University,

More information

Research on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c

Research on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c Applied Mechanics and Materials Submitted: 2014-07-18 ISSN: 1662-7482, Vols. 644-650, pp 1950-1953 Accepted: 2014-07-21 doi:10.4028/www.scientific.net/amm.644-650.1950 Online: 2014-09-22 2014 Trans Tech

More information

Construction of the Library Management System Based on Data Warehouse and OLAP Maoli Xu 1, a, Xiuying Li 2,b

Construction of the Library Management System Based on Data Warehouse and OLAP Maoli Xu 1, a, Xiuying Li 2,b Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 380-384, pp 4796-4799 doi:10.4028/www.scientific.net/amm.380-384.4796 2013 Trans Tech Publications, Switzerland Construction of

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained

More information

manufacturing process.

manufacturing process. Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel

More information

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2 International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang

More information

Research of Video Surveillance and Diagnosis System for Plant Diseases Based on DM6446 Wang Xiuqing 1, a Qie Xu 1, b Zhang Chunxia 1, c Zhao Na 1, d

Research of Video Surveillance and Diagnosis System for Plant Diseases Based on DM6446 Wang Xiuqing 1, a Qie Xu 1, b Zhang Chunxia 1, c Zhao Na 1, d Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 373-375, pp 892-896 doi:10.4028/www.scientific.net/amm.373-375.892 2013 Trans Tech Publications, Switzerland Research of Video

More information

AN WIRELESS COLLECTION AND MONITORING SYSTEM DESIGN BASED ON ARDUINO. Lu Shaokun 1,e*

AN WIRELESS COLLECTION AND MONITORING SYSTEM DESIGN BASED ON ARDUINO. Lu Shaokun 1,e* Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1076-1080 doi:10.4028/www.scientific.net/amr.971-973.1076 2014 Trans Tech Publications, Switzerland AN WIRELESS COLLECTION

More information

Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology

Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology , pp.49-54 http://dx.doi.org/10.14257/astl.2014.45.10 Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology Ying Xia, Shiyan Luo, Xu Zhang, Hae Yong Bae Research

More information

The Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei

The Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 427-429, pp 2130-2133 doi:10.4028/www.scientific.net/amm.427-429.2130 2013 Trans Tech Publications, Switzerland The Application

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

Realization of Automatic Keystone Correction for Smart mini Projector Projection Screen

Realization of Automatic Keystone Correction for Smart mini Projector Projection Screen Applied Mechanics and Materials Online: 2014-02-06 ISSN: 1662-7482, Vols. 519-520, pp 504-509 doi:10.4028/www.scientific.net/amm.519-520.504 2014 Trans Tech Publications, Switzerland Realization of Automatic

More information

Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4

Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4 5th International Conference on Advanced Engineering Materials and Technology (AEMT 205) Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu,a, Yanhua Gu 2,b

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

NUMERICAL ANALYSIS OF WIND EFFECT ON HIGH-DENSITY BUILDING AERAS

NUMERICAL ANALYSIS OF WIND EFFECT ON HIGH-DENSITY BUILDING AERAS NUMERICAL ANALYSIS OF WIND EFFECT ON HIGH-DENSITY BUILDING AERAS Bin ZHAO, Ying LI, Xianting LI and Qisen YAN Department of Thermal Engineering, Tsinghua University Beijing, 100084, P.R. China ABSTRACT

More information

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan 5th International Conference on Civil Engineering and Transportation (ICCET 205) Traffic Flow Prediction Based on the location of Big Data Xijun Zhang, Zhanting Yuan Lanzhou Univ Technol, Coll Elect &

More information

Study on GA-based matching method of railway vehicle wheels

Study on GA-based matching method of railway vehicle wheels Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(4):536-542 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Study on GA-based matching method of railway vehicle

More information

Location of air-borne SAR imagery without GCPs and error analysis

Location of air-borne SAR imagery without GCPs and error analysis International Conference on Remote Sensing, Environment and Transportation Engineering (RSETE 2013) Location of air-borne SAR imagery without GCPs and error analysis FAN Ning-jun, ZHAO Ling-jun, KUANG

More information

A new improved ant colony algorithm with levy mutation 1

A new improved ant colony algorithm with levy mutation 1 Acta Technica 62, No. 3B/2017, 27 34 c 2017 Institute of Thermomechanics CAS, v.v.i. A new improved ant colony algorithm with levy mutation 1 Zhang Zhixin 2, Hu Deji 2, Jiang Shuhao 2, 3, Gao Linhua 2,

More information

Research on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information.

Research on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information. , pp. 65-74 http://dx.doi.org/0.457/ijsip.04.7.6.06 esearch on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information Zhao Lei, Wang Jianhua and Li Xiaofeng 3 Heilongjiang

More information

The Design of Distributed File System Based on HDFS Yannan Wang 1, a, Shudong Zhang 2, b, Hui Liu 3, c

The Design of Distributed File System Based on HDFS Yannan Wang 1, a, Shudong Zhang 2, b, Hui Liu 3, c Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 423-426, pp 2733-2736 doi:10.4028/www.scientific.net/amm.423-426.2733 2013 Trans Tech Publications, Switzerland The Design of Distributed

More information

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography , pp.37-41 http://dx.doi.org/10.14257/astl.2013.31.09 Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography Lanying Li 1, Yun Zhang 1, 1 School of Computer Science and Technology

More information

CHAOTIC ANT SYSTEM OPTIMIZATION FOR PATH PLANNING OF THE MOBILE ROBOTS

CHAOTIC ANT SYSTEM OPTIMIZATION FOR PATH PLANNING OF THE MOBILE ROBOTS CHAOTIC ANT SYSTEM OPTIMIZATION FOR PATH PLANNING OF THE MOBILE ROBOTS Xu Mingle and You Xiaoming Shanghai University of Engineering Science, Shanghai, China ABSTRACT This paper presents an improved ant

More information

Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm. Yinling Wang, Huacong Li

Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm. Yinling Wang, Huacong Li International Conference on Applied Science and Engineering Innovation (ASEI 215) Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm Yinling Wang, Huacong Li School of Power and

More information

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Zhiyan Zhang 1, Wei Qian 1, Lei Pan 1 & Yanjun Li 1 1 University of Shanghai for Science and Technology, China

More information

A Network Disk Device Based on Web Accessing

A Network Disk Device Based on Web Accessing TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.6, June 2014, pp. 4387 ~ 4392 DOI: 10.11591/telkomnika.v12i6.5472 4387 A Network Disk Device Based on Web Accessing QunFang Yuan 1, Wenxia

More information

Kaiserstr. 10; Karlsruhe, Germany *corresponding Author

Kaiserstr. 10; Karlsruhe, Germany *corresponding Author Applied Mechanics and Materials Online: 2013-09-03 ISSN: 1662-7482, Vol. 391, pp 118-122 doi:10.4028/www.scientific.net/amm.391.118 2013 Trans Tech Publications, Switzerland Time Efficient Testing of Hybrid

More information

Research on Evaluation Method of Product Style Semantics Based on Neural Network

Research on Evaluation Method of Product Style Semantics Based on Neural Network Research Journal of Applied Sciences, Engineering and Technology 6(23): 4330-4335, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: September 28, 2012 Accepted:

More information

Optimal Design of the Data Center Environmental Temperature Monitoring ZhiXiang Yuan 1,2, a, ShuangBo Lai 2,b, Ming Liu 1,c, HuiYi Zhang 1,2, d

Optimal Design of the Data Center Environmental Temperature Monitoring ZhiXiang Yuan 1,2, a, ShuangBo Lai 2,b, Ming Liu 1,c, HuiYi Zhang 1,2, d Applied Mechanics and Materials Online: 2014-05-23 ISSN: 1662-7482, Vols. 556-562, pp 2810-2815 doi:10.4028/www.scientific.net/amm.556-562.2810 2014 Trans Tech Publications, Switzerland Optimal Design

More information

Efficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application

Efficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 3, May 2017 Efficient Path Finding Method Based Evaluation Function in Large

More information

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang

More information

Research of 3D parametric design system of worm drive based on Pro/E. Hongbin Niu a, Xiaohua Li b

Research of 3D parametric design system of worm drive based on Pro/E. Hongbin Niu a, Xiaohua Li b Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vols. 712-715, pp 1107-1110 doi:10.4028/www.scientific.net/amr.712-715.1107 2013 Trans Tech Publications, Switzerland Research of 3D parametric

More information

Design and Application of the Visual Model Pool of Mechanical Parts based on Computer-Aided Technologies

Design and Application of the Visual Model Pool of Mechanical Parts based on Computer-Aided Technologies Design and Application of the Visual Model Pool of Mechanical Parts based on Computer-Aided Technologies Xiaoying Dong, Xia Ye, Qinxian Jiang, Xianghua Zhang and Wei Bi School of Mechanical and Automobile

More information

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management Management Science and Engineering Vol. 8, No. 3, 2014, pp. 11-16 DOI: 10.3968/5520 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org Research on Building Baseline of IT

More information

Research on Algorithm Schema of Parametric Architecture Design Based on Schema Theory

Research on Algorithm Schema of Parametric Architecture Design Based on Schema Theory International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) Research on Algorithm Schema of Parametric Architecture Design Based on Schema Theory Li Zhu 1, a, Nan Zhang

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on

More information

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2 Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu

More information

An energy efficient communication routing Protocol based on LEACH for WSN

An energy efficient communication routing Protocol based on LEACH for WSN Advanced Materials Research Online: 2014-04-28 ISSN: 1662-8985, Vol. 905, pp 595-599 doi:10.4028/www.scientific.net/amr.905.595 2014 Trans Tech Publications, Switzerland An energy efficient communication

More information

Citation for the original published paper (version of record):

Citation for the original published paper (version of record): http://www.diva-portal.org This is the published version of a paper published in Procedia Engineering. Citation for the original published paper (version of record): Zhang, D., Lu, J., Wang, L., Li, J.

More information

A New Method Of VPN Based On LSP Technology

A New Method Of VPN Based On LSP Technology 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing

More information

Keywords: Cloud computing, ZigBee, Smart home, Security cloud

Keywords: Cloud computing, ZigBee, Smart home, Security cloud 2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Design of the Smart-home Security System based on Cloud Computing Yan Wang 1,a,

More information

Application of CAD/CAE/CAM Technology in Plastics Injection Mould Design and Manufacture. Ming He Dai,Zhi Dong Yun

Application of CAD/CAE/CAM Technology in Plastics Injection Mould Design and Manufacture. Ming He Dai,Zhi Dong Yun Advanced Materials Research Vols. 399-401 (2012) pp 2271-2275 Online available since 2011/Nov/22 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.399-401.2271

More information

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems 13 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Fuzzy Double-Threshold Trac Association Algorithm Using

More information

Design of Coal Mine Power Supply Monitoring System

Design of Coal Mine Power Supply Monitoring System 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic

More information

The Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1 and Hou-An DING 1

The Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1 and Hou-An DING 1 2016 International Conference on Control and Automation (ICCA 2016) ISBN: 978-1-60595-329-8 The Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1

More information

A Matlab/Simulink-based method for modelling and simulation of split Hopkinson bar test

A Matlab/Simulink-based method for modelling and simulation of split Hopkinson bar test ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 6 (2010) No. 3, pp. 205-213 A Matlab/Simulink-based method for modelling and simulation of split Hopkinson bar test Yongjian

More information

Design and Implementation of LED Display Screen Controller based on STM32 and FPGA Chi Zhang 1,a, Xiaoguang Wu 1,b and Chengjun Zhang 1,c

Design and Implementation of LED Display Screen Controller based on STM32 and FPGA Chi Zhang 1,a, Xiaoguang Wu 1,b and Chengjun Zhang 1,c Applied Mechanics and Materials Online: 2012-12-27 ISSN: 1662-7482, Vols. 268-270, pp 1578-1582 doi:10.4028/www.scientific.net/amm.268-270.1578 2013 Trans Tech Publications, Switzerland Design and Implementation

More information

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,* 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer

More information

Research Article. ISSN (Print) *Corresponding author Chen Hao

Research Article. ISSN (Print) *Corresponding author Chen Hao Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 215; 3(6):645-65 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Problems and Countermeasures of Information Security of Electric. Power Enterprises in China

Problems and Countermeasures of Information Security of Electric. Power Enterprises in China 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Problems and Countermeasures of Information Security of Electric Power Enterprises in China Haixun

More information

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Feature-Guided K-Means Algorithm for Optimal Image Vector

More information

Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c

Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

Utilizing Restricted Direction Strategy and Binary Heap Technology to Optimize Dijkstra Algorithm in WebGIS

Utilizing Restricted Direction Strategy and Binary Heap Technology to Optimize Dijkstra Algorithm in WebGIS Key Engineering Materials Online: 2009-10-08 ISSN: 1662-9795, Vols. 419-420, pp 557-560 doi:10.4028/www.scientific.net/kem.419-420.557 2010 Trans Tech Publications, Switzerland Utilizing Restricted Direction

More information

Analysis of fluid-solid coupling vibration characteristics of probe based on ANSYS Workbench

Analysis of fluid-solid coupling vibration characteristics of probe based on ANSYS Workbench Analysis of fluid-solid coupling vibration characteristics of probe based on ANSYS Workbench He Wang 1, a, Changzheng Zhao 1, b and Hongzhi Chen 1, c 1 Shandong University of Science and Technology, Qingdao

More information

Algorithm research of 3D point cloud registration based on iterative closest point 1

Algorithm research of 3D point cloud registration based on iterative closest point 1 Acta Technica 62, No. 3B/2017, 189 196 c 2017 Institute of Thermomechanics CAS, v.v.i. Algorithm research of 3D point cloud registration based on iterative closest point 1 Qian Gao 2, Yujian Wang 2,3,

More information

An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li

An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li 3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi

More information

Multi-Objective Optimization of Gatling gun Tripod Based on Mesh. Morphing and RBF Model

Multi-Objective Optimization of Gatling gun Tripod Based on Mesh. Morphing and RBF Model Multi-Objective Optimization of Gatling gun Tripod Based on Mesh Morphing and RBF Model BINBIN HUA, RUILIN WANG, YONGJIAN LI, XIAOYONG KANG, HAO TIAN Department of Mechanical Engineering Shijiazhuang Mechanical

More information

Recovering the Communication of Power System Protection Quickly Via ZigBee Wireless Network for the Intelligent Protection Center Research

Recovering the Communication of Power System Protection Quickly Via ZigBee Wireless Network for the Intelligent Protection Center Research 2016 International Conference on Material Science and Civil Engineering (MSCE 2016) ISBN: 978-1-60595-378-6 Recovering the Communication of Power System Protection Quickly Via ZigBee Wireless Network for

More information

Design of the Software for Wirelessly Intercepting Voices

Design of the Software for Wirelessly Intercepting Voices Advanced Materials Research Online: 2014-05-23 ISSN: 1662-8985, Vols. 926-930, pp 2470-2473 doi:10.4028/www.scientific.net/amr.926-930.2470 2014 Trans Tech Publications, Switzerland Design of the Software

More information

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,

More information

The Application of PLC in the automatic Packing Machine Control System Lixia Guo a, Zhengzhong Li b

The Application of PLC in the automatic Packing Machine Control System Lixia Guo a, Zhengzhong Li b Advanced Materials Research Online: 2013-09-04 ISS: 1662-8985, Vols. 765-767, pp 1813-1817 doi:10.4028/www.scientific.net/amr.765-767.1813 2013 Trans Tech Publications, Switzerland The Application of PLC

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Analysis of the effect of target scattering on the operational effectiveness of seeker

Analysis of the effect of target scattering on the operational effectiveness of seeker 2nd International Conference on Materials Science, Machinery and Energy Engineering (MSMEE 2017) Analysis of the effect of target scattering on the operational effectiveness of seeker Jun-chao Yuan1, a,

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

Fault Diagnosis of Wind Turbine Based on ELMD and FCM

Fault Diagnosis of Wind Turbine Based on ELMD and FCM Send Orders for Reprints to reprints@benthamscience.ae 76 The Open Mechanical Engineering Journal, 24, 8, 76-72 Fault Diagnosis of Wind Turbine Based on ELMD and FCM Open Access Xianjin Luo * and Xiumei

More information

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Meng Fei-xiang 1 Lei Ying-jie 1 Zhang Bo 1 Shen Xiao-yong 1 Zhao Jing-yu 2 1 Air and Missile Defense College Air Force Engineering

More information

Dual-System Warm Standby of Remote Sensing Satellite Control System Technology

Dual-System Warm Standby of Remote Sensing Satellite Control System Technology 2016 3 rd International Conference on Materials Science and Mechanical Engineering (ICMSME 2016) ISBN: 978-1-60595-391-5 Dual-System Warm Standby of Remote Sensing Satellite Control System Technology Fei

More information

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai

More information

Study and Design of CAN / LIN Hybrid Network of Automotive Body. Peng Huang

Study and Design of CAN / LIN Hybrid Network of Automotive Body. Peng Huang Advanced Materials Research Online: 2014-06-30 ISSN: 1662-8985, Vol. 940, pp 469-474 doi:10.4028/www.scientific.net/amr.940.469 2014 Trans Tech Publications, Switzerland Study and Design of CAN / LIN Hybrid

More information

A New Evaluation Method of Node Importance in Directed Weighted Complex Networks

A New Evaluation Method of Node Importance in Directed Weighted Complex Networks Journal of Systems Science and Information Aug., 2017, Vol. 5, No. 4, pp. 367 375 DOI: 10.21078/JSSI-2017-367-09 A New Evaluation Method of Node Importance in Directed Weighted Complex Networks Yu WANG

More information

Wavelength Estimation Method Based on Radon Transform and Image Texture

Wavelength Estimation Method Based on Radon Transform and Image Texture Journal of Shipping and Ocean Engineering 7 (2017) 186-191 doi 10.17265/2159-5879/2017.05.002 D DAVID PUBLISHING Wavelength Estimation Method Based on Radon Transform and Image Texture LU Ying, ZHUANG

More information

The Design of CAN Bus Communication System Based on MCP2515 and S3C2440 Jinmei Liu, Junhong Wang, Donghui Sun

The Design of CAN Bus Communication System Based on MCP2515 and S3C2440 Jinmei Liu, Junhong Wang, Donghui Sun Advanced Materials Research Online: 2014-05-21 ISSN: 1662-8985, Vol. 933, pp 516-520 doi:10.4028/www.scientific.net/amr.933.516 2014 Trans Tech Publications, Switzerland The Design of CAN Bus Communication

More information

An Indian Journal FULL PAPER. Trade Science Inc.

An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-745 Volume 10 Issue BioTechnology 014 An Indian Journal FULL PAPER BTAIJ, 10(), 014 [14449-14454] A simplified diagram multiplication method for displacement

More information